Public Key Encryption (Asymmetric Key Encryption)

Sdílet
Vložit
  • čas přidán 27. 06. 2017
  • In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.
    The public key encryption is also called asymmetric key encryption because two different keys are used.
    Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
    In this video, I will use an example to demonstrate how to use public key.
    Playlist: Basic Cryptography
    • Private Key Encryption...
    Advanced Cryptography:
    • What is digital signat...
    Please leave comments, questions and
    please subscribe!

Komentáře • 230

  • @tedwoodpeacock4689
    @tedwoodpeacock4689 Před 5 lety +145

    When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!

  • @Ada-hd3zp
    @Ada-hd3zp Před 10 měsíci +4

    Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!

  • @mountain_del1863
    @mountain_del1863 Před 3 lety +5

    Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the process.....not the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again

  • @mattredgate5740
    @mattredgate5740 Před 2 měsíci

    Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.

  • @joshkdasan2517
    @joshkdasan2517 Před 4 lety +8

    Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it , hence the confusion . Thank you for clearing that.

    • @AliShaikh_744
      @AliShaikh_744 Před 2 lety

      Yes such an important part.

    • @greymind0072
      @greymind0072 Před rokem

      one of the most crucial thing to be mentioned explicitely. That's why sunny is a great educator , look at all his videos.

  • @tonydebaka3967
    @tonydebaka3967 Před rokem +2

    i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done

    • @maicakhylafrancisco3163
      @maicakhylafrancisco3163 Před rokem

      Heey, same here! I've watched really lots of videos only to search another and another. And so the search continues until I've watched this video. Thankful that I have found this!

  • @christopherbrooks5269
    @christopherbrooks5269 Před 4 lety +1

    Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.

  • @proptbro
    @proptbro Před 6 lety +30

    Best explanation on youtube thanks for clearing my confusion

  • @jamesharris3109
    @jamesharris3109 Před 5 lety +14

    I would love to see more videos about different algorithm types. Your explanations are so easy to understand. Thanks again Sunny!

  • @ESEben10
    @ESEben10 Před rokem +1

    Such a clear explanation about asymmetric key encryption! Thank you for the video!

  • @Bchicken2
    @Bchicken2 Před rokem

    Sunny, I love your smile and friendly aura. Your work is honest charity and I admire that.

  • @jiukam856
    @jiukam856 Před 2 lety

    Actually very clear and get to the point despite not native English... Great work!

  • @zoozoo1060
    @zoozoo1060 Před 5 lety +2

    I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.

  • @luisdelorbe6838
    @luisdelorbe6838 Před 2 lety

    My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing.
    One more time, professor Sunny, congrats!!... Please do not stop your videos!!

  • @chillasey
    @chillasey Před 2 lety +1

    Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!

  • @Userforeverneverever
    @Userforeverneverever Před 4 lety

    Great job on the video! I hope your channel grows!

  • @adamtechdays
    @adamtechdays Před 5 lety +24

    Sunny, your explanation on such a technical subject is excellent. Keep up this great work.

  • @Deltainteractive
    @Deltainteractive Před 5 lety

    Excellent work Sunny! Please keep making these videos.

  • @Hanna-yn5ou
    @Hanna-yn5ou Před 5 lety +3

    These videos by Sunny are fantastic! SOOO helpful! Thank you!

  • @mugume
    @mugume Před 3 lety +2

    As always, you do an awesome job Sunny. Thank you so much for your wonderful videos. Keep going bro!

  • @vinaygupta2436
    @vinaygupta2436 Před 3 lety

    Never quoted in any document that the receiver initiate the key pair generation.. that's very important to understand assymetric encryption and u have nailed it..

  • @uzmamahfooz2305
    @uzmamahfooz2305 Před 4 lety

    My O Levels books didn't explain this topic so well. Great job!

  • @user-lm2jp8qp5i
    @user-lm2jp8qp5i Před 7 měsíci

    Very informative and clearly explained. Great job! Thank you

  • @Sats33
    @Sats33 Před 5 lety +4

    Thank u so much. I am really able to understand the concept in a clear way. I watched many videos of yours and u are a great teacher!!! U're brilliant . I loved ur simple yet on to the point teaching...

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety +1

      Thanks a lot for saying so nice things. I hope my own students think so :)

  • @smtownish
    @smtownish Před 5 lety +2

    Great explanation. Easy to understand

  • @wrenches5243
    @wrenches5243 Před 2 lety

    Sunny thank you so much for making these videos. It has helped me tremendously.

  • @Ghost_Unknown_Fade_Away_
    @Ghost_Unknown_Fade_Away_ Před 10 měsíci

    This channel is a gem. Thank you so much.

  • @vikasbhardwaj455
    @vikasbhardwaj455 Před 5 lety +1

    By far the best explanation that i have come across. Subscribed to your channel. Please keep publishing.

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety

      Thank you Vikas for leaving nice comments. I will do, sir.

  • @thilininisansala9649
    @thilininisansala9649 Před 3 lety

    Your explanation is very clear professor sunny. Thank you very much. Grate work

  • @_Anna_Nass_
    @_Anna_Nass_ Před rokem

    The animations are very helpful, thank you!

  • @ing.sebastianfernandezverg2245

    your videos makes to me want watch more and more, your explanations are very simples, a lot of thanks!!.

  • @xcoverx2525
    @xcoverx2525 Před 5 lety +1

    Perfect Simple And Easy To Understand. Thank you Sunny

  • @thuynguci99
    @thuynguci99 Před 2 lety

    Thankyou very much, all your videos are amazing!

  • @chandanisanthiyagu3786
    @chandanisanthiyagu3786 Před 4 lety +2

    Really appreciate your dedication. Thank you for your clear explanations.

  • @andydrexx1928
    @andydrexx1928 Před 3 lety +2

    Bless you! Bless you! finally I've found a good explanation for Asymmetric cryptography. Thanks a lot!

  • @Anas-qv2lj
    @Anas-qv2lj Před 3 lety +1

    Thank you so much, You are my first reference when I need clear explanation about anything related to networks. God bless you Mr. Sunny

    • @sunnyclassroom24
      @sunnyclassroom24  Před 3 lety

      Glad it was helpful!

    • @sunnyclassroom24
      @sunnyclassroom24  Před 3 lety

      I create this for learning channel to beginners. spread this channel to the people who want to learn networking.

  • @razlouk
    @razlouk Před 3 lety

    Sunny your videos are so good!! Thank you so much!!

  • @a-face9333
    @a-face9333 Před 5 lety +1

    One of the best explanation of asymmetric encryption.

  • @techgeek6773
    @techgeek6773 Před rokem

    fantastic explanation sunny thank you a million!

  • @kubranilgunkaraca
    @kubranilgunkaraca Před 4 lety +1

    Your explanations are very understandable.

  • @ece7700
    @ece7700 Před 12 dny

    Thank you very much for this clear explanation

  • @alisongibbs6451
    @alisongibbs6451 Před 3 lety

    Great concise explanation

  • @jamesharris3109
    @jamesharris3109 Před 5 lety +1

    Love your videos man! I hope to see more.

  • @sabbeneinnab.9253
    @sabbeneinnab.9253 Před 2 lety

    I like the way you explained the public key 😉 keep the good work,👍🏿

  • @dmytroshchotkin2939
    @dmytroshchotkin2939 Před 4 lety

    Such a good and clear video. Bravo!

  • @sankalppotdar9950
    @sankalppotdar9950 Před 5 lety +5

    very informative, thank you for your video, simple explanation for a complex subject

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety +1

      You are welcome. And thank you for leaving nice feedback!

  • @christianheredia1029
    @christianheredia1029 Před 3 lety +1

    great explanation and great way to explain. thanks for sharing your knowledge and help the community.

  • @levyax1964
    @levyax1964 Před 11 měsíci

    Thank you so much Prof. Sunny!

  • @ifargantech
    @ifargantech Před 3 lety

    My teacher! what a great aexplanation!

  • @imena476
    @imena476 Před 5 lety +3

    Thank you so much professor ! I wish I had you in college..
    God bless you°°

  • @kidgurupratyush2288
    @kidgurupratyush2288 Před 6 lety +2

    Wow amazing information :)
    Thank you

  • @surgingcircuits6955
    @surgingcircuits6955 Před 4 lety +1

    Thx! Do you have to use a service to create/use these keys? Or, are their apps for Mac and PC that can be used?

  • @arsenmkrtchyan4832
    @arsenmkrtchyan4832 Před 3 lety

    The best
    Only you have such content and only you can tech me topics i dont grasp

  • @sarahm578
    @sarahm578 Před 3 lety +1

    Thank you alot sunny, you are the best teacher, I enjoy learning from your videos, , thanks again

  • @waiphyotun7633
    @waiphyotun7633 Před rokem

    best teacher out there.. and catching tune at start of videos

  • @Fashoda225
    @Fashoda225 Před 6 lety +1

    Very good lesson..everything is clear. Thank you and want to have more video from you.

    • @sunnyclassroom24
      @sunnyclassroom24  Před 6 lety

      Many thanks, Essanin Arnaud, for your encouragement. I will do my best. I have at least 50 videos ready to be made and uploaded. I have already made animation parts for lessons. Many thanks. I will find time to make videos at the end of the semester ( I am teaching computer at University of Saint Mary by the way) or during the Christmas break.

  • @themindhealer6912
    @themindhealer6912 Před 2 lety

    Much better explanation than in universities

  • @jadissa7464
    @jadissa7464 Před 3 lety +1

    Best Tutorials ever, well designed and clear steps
    Thank you, God Bless

  • @SM-kl2cc
    @SM-kl2cc Před 3 měsíci

    You're cool, Sunny ♥ Thank you for making these lessons

  • @ciscoliveciscolive8048

    Excellent instructions

  • @johnnkoh2601
    @johnnkoh2601 Před 4 lety

    Hi Sunny, as always, thank you. Just a question, I tried to understand why it would be problematic if the sender is the one creating the keys but I could not think of any logical answer. Can you help, please?

  • @sabujdeeptudu6215
    @sabujdeeptudu6215 Před rokem

    THIS IS WHAT I NEEDED. THANKS

  • @shamyzazaki8845
    @shamyzazaki8845 Před 4 lety +1

    good explanation and easy to understand bcos you use a simple English. keep up the good work. and thank you for making me more understand

  • @Faruk-zt5iw
    @Faruk-zt5iw Před 2 lety

    Thanks for the good explanation

  • @rajeshgeorge6093
    @rajeshgeorge6093 Před 3 lety +1

    superb explation. thanks for simplifying the topic .

  • @osraneslipy
    @osraneslipy Před 3 lety

    Love your videos!

  • @TheWholeBits
    @TheWholeBits Před 3 lety +1

    Excellent explanation!!!

  • @QaAutomationAlchemist
    @QaAutomationAlchemist Před 4 lety

    Really great and clear video... thanks a lot.

  • @jananiwelaratne279
    @jananiwelaratne279 Před 2 lety

    very well explained using videos. Thanks alot sir

  • @HorseyWorsey
    @HorseyWorsey Před 2 lety

    Me: *Need random IT concept explained*
    Sunny: "Hello, this is Sunny. Welcome back"

  • @tinashemuwodzeri9812
    @tinashemuwodzeri9812 Před 3 lety +1

    This is on point sunny

  • @nandaanbu5305
    @nandaanbu5305 Před 4 lety

    Extraordinary teaching sir....

  • @ArpanDasS
    @ArpanDasS Před 4 lety +1

    Explained very well... Thank you sir...

    • @sunnyclassroom24
      @sunnyclassroom24  Před 4 lety +1

      You are welcome and thanks for taking the time to write a nice comment.

  • @LunaIthil
    @LunaIthil Před 4 lety +1

    best explaination on youtube. congrats

  • @satishdhoni4096
    @satishdhoni4096 Před 5 lety +1

    Tq sir .....love 😍👏👌🙏🙏🙏🙏 From India

  • @ylbong954
    @ylbong954 Před 4 lety +1

    Exellent, clear and simple to understand. Thank you!
    Do you have any of Active directory video?

  • @kirstenmeates8248
    @kirstenmeates8248 Před 6 lety

    Great video Sunny

  • @Pilgrim182
    @Pilgrim182 Před 3 lety

    Super understandable.

  • @vivekprajapati7911
    @vivekprajapati7911 Před 5 lety

    thanks sir you are new hope in my learning.....

  • @NickEnchev
    @NickEnchev Před 5 lety +1

    great videos!

  • @flashpundit
    @flashpundit Před 6 lety

    vry vry concise and apt explaintation

  • @ouardiakhiter2563
    @ouardiakhiter2563 Před 3 lety

    Thanks very interesting!

  • @psoidonym2389
    @psoidonym2389 Před 2 lety

    Sunny, I got one question. The public and private key used here. Are those the same public an private key used for digital signature? Or are public and private key used for digitalsignature different from those used for encryption?

  • @heshanyodagama8886
    @heshanyodagama8886 Před 4 lety +1

    Nice lecture...well explained

  • @Daniel_CLopes
    @Daniel_CLopes Před 4 lety +1

    Hi Professor Sunny! Always good to be back to your videos!! I only have one question:
    The private/public key pair is created using RSA algorithm (most likely) and the keys are distributed by Diffie-Hellman algorithm, correct?

  • @kasunharshana5250
    @kasunharshana5250 Před 6 lety +1

    Thanks.simple and good video

  • @asoteico9528
    @asoteico9528 Před 4 lety +1

    Great Sunny !
    🥇🎖🏅!

  • @kworgz
    @kworgz Před 4 měsíci

    YOU ROCK SUNNY!

  • @suga3202
    @suga3202 Před 4 lety +1

    Awesome video 👍👍👌 I understood easily thq sir 🙏😍

  • @frannelk
    @frannelk Před 3 lety +1

    Master explanation brother :-)

  • @dinethlive
    @dinethlive Před 3 lety +1

    Wow amazing explanation

  • @aousabbas954
    @aousabbas954 Před 2 lety

    Thank you very much

  • @thisaraharshana2168
    @thisaraharshana2168 Před 3 lety +1

    sir thank you for clear explanation

  • @athisii_ekhe6167
    @athisii_ekhe6167 Před 5 lety +1

    great job! thank you.

  • @abdulqadirabdulhamid4080

    Good explanations sir 🤳🤳
    👍👍

  • @petruconiuc4618
    @petruconiuc4618 Před 3 lety

    So like, before a message can be send the sender let the receiver know that he wants to send a message -> the receiver like: "ok. grab the public key from this url so i know it is you" -> the sender grabs the public key from the url where it is stored, encrypts the message using the public key and finally sends the actual meesage? but how is this done? maybe some JSON file with all needed info like: {sender: , receiver: , public_key_url: } ?

  • @gabrielphilips6980
    @gabrielphilips6980 Před rokem

    So if a public key is used to encrypt the message sent, what prevents someone to decrypt and read it?

  • @armmokh7098
    @armmokh7098 Před 2 lety

    was awesome

  • @user-gl9yg9vs6s
    @user-gl9yg9vs6s Před 3 lety

    Hi Sunny, thank you for all your helpful and dedicated work for explaining Network concepts. In this video, I did not understand the point from @1:30 where Mary as the receiver creates a pair of keys. If she is the receiver then why does she generate the two keys? I thought this would be up to the Sender, in this case Tom. Would you be kind enough to elaborate on that? Many thanks

    • @edmilson2712
      @edmilson2712 Před 2 lety +2

      Hello, let me try to help here:
      Before understanding this use case, you need to understand how asymmetric keys work.
      In asymmetric key, It is necessary to work with a pair of keys:
      - one private key, that you must keep secret. (so only you will know this one)
      - one public key, that you can share with anyone who wants to communicate with you. (many people will know this one)
      How to use them?
      - If you encrypt with the public key, only the private key will decrypt
      - If you encrypt with the private key, only the public key will decrypt
      So what?
      To ensure confidentiality:
      - Mary sents her public key to Tom
      - Tom encrypts the message with Mary´s public key
      Who in the whole world is able to decrypt a message with Mary´s public key?
      - Only Mary can do it because she has the private key!
      Later on, when Mary wants to send an encrypted message to Tom she must use Tom's public key, so:
      - Tom sends his public key to Mary
      - Mary encrypts the message with Tom´s public key.
      - Only Tom can decrypt that message using his private key!
      As you can see, to have a privacy bidirectional conversation:
      - Tom must have a pair of keys and Mary must have a pair of keys.
      - Both senders must use the public key of the other end to encrypt and ensure privacy.
      Another use case:
      How If Tom encrypts with his private key?
      - Anyone with the public key will decrypt, right?
      - Wait, because many people know Tom's public key, so privacy is not ensured!
      - Right, in this case, the asymmetric keys do not ensure privacy, however, it ensures authenticity, because if a message can be decrypted with Tom´s public key, we can ensure Tom is the sender of such message. This is the principle of digital signature.
      I hope this helps.
      Edmilson

  • @dhanush2715
    @dhanush2715 Před 4 lety +1

    So if Alice wants to reply to bob's message should they use a different pair
    of keys