Комментарии:
so this NEEDS then one way encryption? Like there's no wsy for this to work without it
ОтветитьThank you
ОтветитьI understand that the more complicated explanation for this and yet fully appreciate your simplified description. Even when they full description of how it works is provided in chinhoyi start with your simplified description and then move on from there. Perfect perfect. Nice work!
ОтветитьiIcan't for the life of me find the most commonly used functions for asymmetric encryption. Can somebody help me out?
ОтветитьThis is so clever and a very nice explanation as well
Ответитьi still don't understand how it works.
ОтветитьGold this Video is!! Making sense of the PKI within 3 minutes!!! So great to be alive at this time!
Ответитьthank you for the gem! , easily explained !
Ответитьthe force is with this one
Ответитьabsolutely brilliant presentation. a clear, concise overview of the technology anyone can understand, in just five minutes.
Ответить🙏
ОтветитьBut if you use the same public key every time people will be able to crack it? So you need to make a new every time.
ОтветитьIf I'm there right from the beginning, when you and X exchanged your public keys, wouldn't I be able to read what you send to one another?
i can't find a concrete example. Everyone explains the process, no one offers an example.
Amazing Explanation Bro
ОтветитьThank you for simplifying
ОтветитьNice explanation! 😃
ОтветитьAwesome explaination, keep it up!
ОтветитьYou know you’ve come to the right person to learn about Bitcoin and Cryptocurrency, when he started to explain how money works. There’s respect in explaining something that might be common sense to some, but not to others
ОтветитьInvesting is a way to set aside money while you are busy with life and have that money work for you so that you can fully reap the rewards of your labor in the future. Invest wisely.
Ответитьwooow now that's interesting!! I'm taking a university course on Cryptography almost finished with it, and I just understand this concept now haha. Well explained thank you so much!
Ответитьsomething encrypted with the pubkey can't be decrypted with the pubkey?
ОтветитьThe best explanation of the basic concepts ever! Thank you
Ответитьthis was super easy to follow -- thank you!!
ОтветитьThis is a beautiful explanation
Ответитьwhat does the G in PGP mean?
Ответитьbrilliant.... thanks
ОтветитьThey've made crypto easy to buy and greed rules
ОтветитьWell explained in a simple, easy to grasp format!
ОтветитьInteresting 😇
ОтветитьThis made my day.
ОтветитьGenius and brilliant
ОтветитьBefore this video, I didn't know that I didn't know what is Public/Asymmetric Encryption. Beautiful Explanation.
Ответитьjust marvelous... Effortless learning...
Ответитьamazing and clear explanation
ОтветитьAppreciate your video a lot! Now I got the AHA moment
Ответитьel barto was here
ОтветитьI really appreciate the maker. It awesome
ОтветитьI love this video
ОтветитьGreat explanation!
ОтветитьThank you for this explanation. Really, really helpful, especially because the digital signing part is also clearly explained.
ОтветитьGenius
ОтветитьWish I've found this before I've tortured some poor tech souls to death with my questions about PKE. But it would have been also nice if you told about public key fingerprint and the common practical ways of veryfying it. Because it's not so obvious, for those who hasn't used PKE before the problem of how to send it so that no one could tamper with the fingerprint if you need to verify fingerprint (and for that - to send it) in order to be sure that there's no tampering. Or, what's the point of sending your PK fingerprint in text in the same message where you send the PK itself if the bad actor can theoretically switch the real PK with this own and also change the fingerprint for it in that same message?
ОтветитьI didnt get it...
ОтветитьAlgorithm.
ОтветитьEncrypted comment complimenting you on a job well done: "xyadkn;oiu0184i4\][sh[pisjeer[t9ipo"
Ответить28th Constitutional Amendment: Right to Encryption
Kidding, you already have that right
...or do you?
now i can safely say i know symmetric and asymmetric key cryptography
ОтветитьThis is the best explanation on the internet.
ОтветитьGreat video. When I don't understand something, I look for a different explanation and then I usually find it was very simple, but bad explained the first time.
Ответить