Public Key Encryption (Asymmetric Key Encryption)
Vložit
- čas přidán 27. 06. 2017
- In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.
The public key encryption is also called asymmetric key encryption because two different keys are used.
Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
In this video, I will use an example to demonstrate how to use public key.
Playlist: Basic Cryptography
• Private Key Encryption...
Advanced Cryptography:
• What is digital signat...
Please leave comments, questions and
please subscribe!
When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!
Thanks a lot for your encouragement and kind words. I appreciate it very much.
I also mentioned the same thing in other video
I agree keep up the good work
Agree
Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!
Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the process.....not the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again
Glad I could help
Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.
Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it , hence the confusion . Thank you for clearing that.
Yes such an important part.
one of the most crucial thing to be mentioned explicitely. That's why sunny is a great educator , look at all his videos.
i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done
Heey, same here! I've watched really lots of videos only to search another and another. And so the search continues until I've watched this video. Thankful that I have found this!
Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.
Best explanation on youtube thanks for clearing my confusion
Many thanks!
I would love to see more videos about different algorithm types. Your explanations are so easy to understand. Thanks again Sunny!
I will put them in my to-do-list.
Such a clear explanation about asymmetric key encryption! Thank you for the video!
Sunny, I love your smile and friendly aura. Your work is honest charity and I admire that.
Actually very clear and get to the point despite not native English... Great work!
I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.
Same for me.
My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing.
One more time, professor Sunny, congrats!!... Please do not stop your videos!!
Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!
Great job on the video! I hope your channel grows!
Sunny, your explanation on such a technical subject is excellent. Keep up this great work.
Thanks a lot.
Excellent work Sunny! Please keep making these videos.
These videos by Sunny are fantastic! SOOO helpful! Thank you!
You are very welcome!
As always, you do an awesome job Sunny. Thank you so much for your wonderful videos. Keep going bro!
Thanks, will do!
Never quoted in any document that the receiver initiate the key pair generation.. that's very important to understand assymetric encryption and u have nailed it..
My O Levels books didn't explain this topic so well. Great job!
Very informative and clearly explained. Great job! Thank you
Thank u so much. I am really able to understand the concept in a clear way. I watched many videos of yours and u are a great teacher!!! U're brilliant . I loved ur simple yet on to the point teaching...
Thanks a lot for saying so nice things. I hope my own students think so :)
Great explanation. Easy to understand
Sunny thank you so much for making these videos. It has helped me tremendously.
This channel is a gem. Thank you so much.
By far the best explanation that i have come across. Subscribed to your channel. Please keep publishing.
Thank you Vikas for leaving nice comments. I will do, sir.
Your explanation is very clear professor sunny. Thank you very much. Grate work
The animations are very helpful, thank you!
your videos makes to me want watch more and more, your explanations are very simples, a lot of thanks!!.
many thanks!
Perfect Simple And Easy To Understand. Thank you Sunny
You are welcome!
Thankyou very much, all your videos are amazing!
Really appreciate your dedication. Thank you for your clear explanations.
My pleasure!
Bless you! Bless you! finally I've found a good explanation for Asymmetric cryptography. Thanks a lot!
You're very welcome!
Thank you so much, You are my first reference when I need clear explanation about anything related to networks. God bless you Mr. Sunny
Glad it was helpful!
I create this for learning channel to beginners. spread this channel to the people who want to learn networking.
Sunny your videos are so good!! Thank you so much!!
One of the best explanation of asymmetric encryption.
Many thanks!
fantastic explanation sunny thank you a million!
Your explanations are very understandable.
Thank you very much!
Thank you very much for this clear explanation
Great concise explanation
Love your videos man! I hope to see more.
I am glad you like them.
I like the way you explained the public key 😉 keep the good work,👍🏿
Such a good and clear video. Bravo!
very informative, thank you for your video, simple explanation for a complex subject
You are welcome. And thank you for leaving nice feedback!
great explanation and great way to explain. thanks for sharing your knowledge and help the community.
Thank you so much Prof. Sunny!
My teacher! what a great aexplanation!
Thank you so much professor ! I wish I had you in college..
God bless you°°
Wow amazing information :)
Thank you
Thx! Do you have to use a service to create/use these keys? Or, are their apps for Mac and PC that can be used?
The best
Only you have such content and only you can tech me topics i dont grasp
Thank you alot sunny, you are the best teacher, I enjoy learning from your videos, , thanks again
You are very welcome!
best teacher out there.. and catching tune at start of videos
Very good lesson..everything is clear. Thank you and want to have more video from you.
Many thanks, Essanin Arnaud, for your encouragement. I will do my best. I have at least 50 videos ready to be made and uploaded. I have already made animation parts for lessons. Many thanks. I will find time to make videos at the end of the semester ( I am teaching computer at University of Saint Mary by the way) or during the Christmas break.
Much better explanation than in universities
Best Tutorials ever, well designed and clear steps
Thank you, God Bless
You're very welcome!
You're cool, Sunny ♥ Thank you for making these lessons
Excellent instructions
Hi Sunny, as always, thank you. Just a question, I tried to understand why it would be problematic if the sender is the one creating the keys but I could not think of any logical answer. Can you help, please?
THIS IS WHAT I NEEDED. THANKS
good explanation and easy to understand bcos you use a simple English. keep up the good work. and thank you for making me more understand
You are welcome!
Thanks for the good explanation
superb explation. thanks for simplifying the topic .
Glad it was helpful!
Love your videos!
Excellent explanation!!!
Glad it was helpful!
Really great and clear video... thanks a lot.
very well explained using videos. Thanks alot sir
Me: *Need random IT concept explained*
Sunny: "Hello, this is Sunny. Welcome back"
This is on point sunny
Thank you for watching!
Extraordinary teaching sir....
So nice of you!
Explained very well... Thank you sir...
You are welcome and thanks for taking the time to write a nice comment.
best explaination on youtube. congrats
Thanks a lot.
Tq sir .....love 😍👏👌🙏🙏🙏🙏 From India
Exellent, clear and simple to understand. Thank you!
Do you have any of Active directory video?
Great video Sunny
Super understandable.
thanks sir you are new hope in my learning.....
great videos!
vry vry concise and apt explaintation
Thanks very interesting!
Sunny, I got one question. The public and private key used here. Are those the same public an private key used for digital signature? Or are public and private key used for digitalsignature different from those used for encryption?
Nice lecture...well explained
Thanks a lot.
Hi Professor Sunny! Always good to be back to your videos!! I only have one question:
The private/public key pair is created using RSA algorithm (most likely) and the keys are distributed by Diffie-Hellman algorithm, correct?
I believe you are correct!
@@sunnyclassroom24 Thank you!!
@@Daniel_CLopes YOu are welcome!
Thanks.simple and good video
Many thanks for your kindness.
Great Sunny !
🥇🎖🏅!
YOU ROCK SUNNY!
Awesome video 👍👍👌 I understood easily thq sir 🙏😍
You are welcome!
Master explanation brother :-)
Happy to help
Wow amazing explanation
Glad you liked it!
Thank you very much
sir thank you for clear explanation
You are welcome
great job! thank you.
you are welcome!
Good explanations sir 🤳🤳
👍👍
So like, before a message can be send the sender let the receiver know that he wants to send a message -> the receiver like: "ok. grab the public key from this url so i know it is you" -> the sender grabs the public key from the url where it is stored, encrypts the message using the public key and finally sends the actual meesage? but how is this done? maybe some JSON file with all needed info like: {sender: , receiver: , public_key_url: } ?
So if a public key is used to encrypt the message sent, what prevents someone to decrypt and read it?
was awesome
Hi Sunny, thank you for all your helpful and dedicated work for explaining Network concepts. In this video, I did not understand the point from @1:30 where Mary as the receiver creates a pair of keys. If she is the receiver then why does she generate the two keys? I thought this would be up to the Sender, in this case Tom. Would you be kind enough to elaborate on that? Many thanks
Hello, let me try to help here:
Before understanding this use case, you need to understand how asymmetric keys work.
In asymmetric key, It is necessary to work with a pair of keys:
- one private key, that you must keep secret. (so only you will know this one)
- one public key, that you can share with anyone who wants to communicate with you. (many people will know this one)
How to use them?
- If you encrypt with the public key, only the private key will decrypt
- If you encrypt with the private key, only the public key will decrypt
So what?
To ensure confidentiality:
- Mary sents her public key to Tom
- Tom encrypts the message with Mary´s public key
Who in the whole world is able to decrypt a message with Mary´s public key?
- Only Mary can do it because she has the private key!
Later on, when Mary wants to send an encrypted message to Tom she must use Tom's public key, so:
- Tom sends his public key to Mary
- Mary encrypts the message with Tom´s public key.
- Only Tom can decrypt that message using his private key!
As you can see, to have a privacy bidirectional conversation:
- Tom must have a pair of keys and Mary must have a pair of keys.
- Both senders must use the public key of the other end to encrypt and ensure privacy.
Another use case:
How If Tom encrypts with his private key?
- Anyone with the public key will decrypt, right?
- Wait, because many people know Tom's public key, so privacy is not ensured!
- Right, in this case, the asymmetric keys do not ensure privacy, however, it ensures authenticity, because if a message can be decrypted with Tom´s public key, we can ensure Tom is the sender of such message. This is the principle of digital signature.
I hope this helps.
Edmilson
So if Alice wants to reply to bob's message should they use a different pair
of keys