Public Key Encryption (Asymmetric Key Encryption)
In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.
The public key encryption is also called asymmetric key encryption because two different keys are used.
Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
In this video, I will use an example to demonstrate how to use public key.
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Please leave comments, questions and
please subscribe!
Видео Public Key Encryption (Asymmetric Key Encryption) канала Sunny Classroom
The public key encryption is also called asymmetric key encryption because two different keys are used.
Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
In this video, I will use an example to demonstrate how to use public key.
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Please leave comments, questions and
please subscribe!
Видео Public Key Encryption (Asymmetric Key Encryption) канала Sunny Classroom
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![What is digital signature?](https://i.ytimg.com/vi/TmA2QWSLSPg/default.jpg)
![Private Key Encryption (Symmetric Key Encryption)](https://i.ytimg.com/vi/vk3py9M2IfE/default.jpg)
![Proxy server](https://i.ytimg.com/vi/f-oCTcf5k_0/default.jpg)
![Public Key Cryptography - Computerphile](https://i.ytimg.com/vi/GSIDS_lvRv4/default.jpg)
![](https://i.ytimg.com/vi/R0gzvbwMPU4/default.jpg)
![PKI - trust & chain of trust -why, who and how?](https://i.ytimg.com/vi/LPxeYtMDxl0/default.jpg)
![How Quantum Computers Break Encryption | Shor's Algorithm Explained](https://i.ytimg.com/vi/lvTqbM5Dq4Q/default.jpg)
![Asymmetric Encryption - Simply explained](https://i.ytimg.com/vi/AQDCe585Lnc/default.jpg)
![Kerberos - authentication protocol](https://i.ytimg.com/vi/_44CHD3Vx-0/default.jpg)
![OSI Model](https://i.ytimg.com/vi/nFnLPGk8WjA/default.jpg)
![The RSA Encryption Algorithm (1 of 2: Computing an Example)](https://i.ytimg.com/vi/4zahvcJ9glg/default.jpg)
![Firewall](https://i.ytimg.com/vi/RV2QznoyEBU/default.jpg)
![How SSL certificate works?](https://i.ytimg.com/vi/33VYnE7Bzpk/default.jpg)
![Hashing vs Encryption Differences](https://i.ytimg.com/vi/GI790E1JMgw/default.jpg)
![DNS recursive query vs. Iterative query](https://i.ytimg.com/vi/PS0UppB3-fg/default.jpg)
![What is a TLS Cipher Suite?](https://i.ytimg.com/vi/ZM3tXhPV8v0/default.jpg)
![How asymmetric (public key) encryption works](https://i.ytimg.com/vi/E5FEqGYLL0o/default.jpg)
![128 Bit or 256 Bit Encryption? - Computerphile](https://i.ytimg.com/vi/pgzWxOtk1zg/default.jpg)
![Digital Certificates Explained - How digital certificates bind owners to their public key](https://i.ytimg.com/vi/5rT6fZUwhG8/default.jpg)
![PKI: self-signed digital certificate?](https://i.ytimg.com/vi/oplVr3Ha174/default.jpg)