Asymmetric Encryption - Simply explained

Asymmetric Encryption - Simply explained

Simply Explained

6 лет назад

1,319,698 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

berat29 şen
berat29 şen - 02.10.2023 21:08

burda türk varmı

Ответить
iam saboo
iam saboo - 01.10.2023 17:04

omg thank you very much saved me bro ....I can understand much better now

Ответить
Patrik Schnell
Patrik Schnell - 25.09.2023 11:46

i am a noob and so i wonder, when emails use pgp or gpg as asymmetric encryption, why is sending data via email still unsecure in general?

Ответить
Sabrina Emily
Sabrina Emily - 20.09.2023 21:28

Great video! I couldn't wrap my brain around this concept and the video cleared things right up.

Ответить
Verbois Interne
Verbois Interne - 20.09.2023 17:42

Fails to explain how something can be encrypted with a key that can't be used for decryption.

Ответить
Gopesh Khandelwal
Gopesh Khandelwal - 20.09.2023 14:45

odin project

Ответить
Loren Vanhoff
Loren Vanhoff - 18.09.2023 16:44

This really helped me, Thanks!!!

Ответить
lee herfel
lee herfel - 13.09.2023 15:20

thanks

Ответить
Shanza Za
Shanza Za - 12.09.2023 14:20

Woah thank you so much
Helps a lot for someone who usually doesn't understand a thing 💀🙏🏻

Ответить
Kalashnikov
Kalashnikov - 04.09.2023 21:51

Lets change it into "Public Locks and Private Keys"

Ответить
buzztrucker
buzztrucker - 02.09.2023 23:24

Short, sweet, and to the point. Thanks for this great info condensed in short amount of time.

Ответить
Vladislav Karas'
Vladislav Karas' - 24.08.2023 19:08

Thanks for the video!

Ответить
Grant Clementi
Grant Clementi - 17.08.2023 03:40

Beautifully put, thank you.

Ответить
Sina Majidi
Sina Majidi - 02.08.2023 16:55

great explained!

Ответить
Slimi Abdennabi
Slimi Abdennabi - 01.08.2023 12:03

Thank you very much

Ответить
no
no - 30.07.2023 22:35

So basically, you use somebody's public key to encrypt messages that only they can decrypt with their private key.

Ответить
queen queents
queen queents - 18.07.2023 00:35

great work thanks for good exmplain. finally i understand how is it working

Ответить
Musikkontext Scarabino
Musikkontext Scarabino - 12.07.2023 14:54

Am I the only one who doesn't get, how Alice's Encryption Program knows, what Bob's Private Key will look like?

Ответить
Karen
Karen - 09.07.2023 00:01

Excellent explanation - greatly appreciated!

Ответить
INTELLIGENT ROCKY
INTELLIGENT ROCKY - 02.07.2023 08:15

watched 2 times and uderstood succesfully

Ответить
KDSP gaming
KDSP gaming - 29.06.2023 04:05

Well explained......

Ответить
Tracy Rowe
Tracy Rowe - 28.06.2023 04:01

How Do you Unencrypted it with your private key? I'm weird, do you keep your key

Ответить
ChangeNow
ChangeNow - 20.06.2023 01:33

amazing video

Ответить
Samo
Samo - 19.06.2023 00:34

thank you very much for such a good explanation

Ответить
Kushal prasad
Kushal prasad - 17.06.2023 04:26

Fantastic explanation

Ответить
Aviraj Bevli
Aviraj Bevli - 01.06.2023 15:16

I think what you meant to say was that bitcoin uses cryptography for creating digital signatures, and digital fingerprint of blocks. The bitcoin network does not use encryption. Anyone can see the data written on the blockchain. Having said that, implementations of wallets tend to use encryption to secure keys. However, wallets are not directly a part of the bitcoin network!

Ответить
Yell3x
Yell3x - 17.05.2023 14:01

Thank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!

Ответить
Overcomer Idemudia
Overcomer Idemudia - 06.05.2023 21:42

Thanks for sharing

Ответить
Zeghart
Zeghart - 04.05.2023 20:07

Anyone here from The Odin Project? Keep it up, we can do it! :)

Also thanks for the video, the concept seemed almost alien to me but you've explained it in such a clear way that anybody could understand it

Ответить
GoatGrabber
GoatGrabber - 13.04.2023 17:26

I am confused about something. If the attacker only steals Alice's private key, how can the attacker decrypt messages sent by Alice? If Alice sends a message to Bob, then only Bob's private key can decrypt the message. Correct? So why is the video claiming that the attacker able to decrypt messages that Alice sends to Bob, without having Bob's private key? Alice will need Bob's public key to encrypt the message she sends to Bob, and only Bob can decrypt it.

Ответить
Yang Liu
Yang Liu - 13.04.2023 12:28

i think this one is the best in explainations.

Ответить
Néstor Feliciano
Néstor Feliciano - 06.04.2023 15:54

crystal clear

Ответить
Daniel Crompton
Daniel Crompton - 03.04.2023 20:35

When they swap keys, could a hacker not intercept them and decrypt the message?

Ответить
CrewRanger Gaming
CrewRanger Gaming - 30.03.2023 21:09

fuck, Alice and Bob are at it again.

Ответить
ROHAN KULSHRESHTHA
ROHAN KULSHRESHTHA - 23.03.2023 09:22

sweet and simple , just what i needed , thanks a ton

Ответить
Amirtharaj Vellingiri
Amirtharaj Vellingiri - 19.03.2023 17:47

Awesome...

Ответить
Abdulhakim Roshan
Abdulhakim Roshan - 16.03.2023 14:05

thanks well explained

Ответить
Josh Morgan Tech
Josh Morgan Tech - 07.03.2023 10:05

Great 🤝

Ответить
Mohamed Afthab E K
Mohamed Afthab E K - 02.03.2023 16:57

Thanks Boss.

Ответить
Lakerfan4life
Lakerfan4life - 01.03.2023 01:57

Excellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.

Ответить
Imran Pasha
Imran Pasha - 28.02.2023 07:56

simple and clear explanation ♥♥

Ответить
Fortytwo Labs
Fortytwo Labs - 15.02.2023 11:34

Assumption that Private key can not be derived using public key goes wrong in Post quantum world. That is where whole RSA security collapses.

Ответить
Aron Vasilev
Aron Vasilev - 10.02.2023 11:06

Finally, someone explains to me how it works. Thanks a lot!

Ответить
Lizard Lime
Lizard Lime - 10.02.2023 07:43

How does Alice knows how to encrypt the message that only Bob's private key can unlock? Surely Alice got to know Bob's private key somehow right?

Ответить
Akbar Khan
Akbar Khan - 08.02.2023 12:43

thank you !

Ответить