Asymmetric Encryption - Simply explained

SdĂ­let
VloĆŸit
  • čas pƙidĂĄn 29. 10. 2017
  • How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain all of these in plain English!
    💌 Sign up for Simply Explained Newsletter:
    newsletter.simplyexplained.com
    Monthly newsletter with cool stuff I found on the internet (related to science, technology, biology, and other nerdy things)! No spam. Ever. Promise!
    🌍 Social
    Twitter: / savjee
    Facebook: / savjee
    Blog: savjee.be
    ❀ Become a Simply Explained member: / @simplyexplained
    #encryption #simplyexplained
  • Věda a technologie

Komentáƙe • 846

  • @mjk012579
    @mjk012579 Pƙed 3 lety +309

    Very clear and straightforward. I’ve been beating myself over the head with this topic in my fundamentals class and this just made the differences make a whole lot more sense

  • @johnathonbatz662
    @johnathonbatz662 Pƙed 2 lety +40

    the mailbox analogy of everyone knowin the address of the mailbox being the public key, and only the mailbox owner with the keys to his own mailbox as the private key, is a really really really well done analogy. probably the best one ive seen so far with relating public/private keys as a concept to everyday life and making it easier to understand.

  • @SannySinghs
    @SannySinghs Pƙed 6 lety +283

    LoL 221b BakerStreet . I have been trying to understand Asymmetric encryption concept for nearly 3 hours. None of the clips i watch explained as clearly as you do about exchanging public key. Well done. Thank you so much

    • @simplyexplained
      @simplyexplained  Pƙed 6 lety +18

      You're the first one who noticed the address! Thanks for the kind words ;)

    • @JonathanCoffey1087
      @JonathanCoffey1087 Pƙed 6 lety +14

      Same here, this idea helped me a little. Since most of these videos keep mentioning TONS of keys, why not use a lock analogy? We generate a key pair, one public and one private. Think of the public key as the unique "lock" you've just made. You can give that lock to as many friends as you want. If you send me your lock, I can put anything in a box and put your lock on it. Once secured with your custom lock, I can no longer open or see the contents of that box without your key that's paired with that lock.

    • @juancamilo1370
      @juancamilo1370 Pƙed 5 lety +6

      everyone talks about keys here and there but nobody mention the interchange step... good explanation!

    • @teddyboggs1851
      @teddyboggs1851 Pƙed 5 lety +3

      As an American I can honestly say 221 baker is literally the only address I know in that entire country.

    • @TheVirumXD
      @TheVirumXD Pƙed 5 lety +1

      Teddy Boggs Sherlock

  • @kairollmann
    @kairollmann Pƙed 6 lety +757

    And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymmetric encryption and 3) send that (asymmetrically) encrypted symmetric key together with the (symmetrically) encrypted file.

    • @simplyexplained
      @simplyexplained  Pƙed 6 lety +114

      +Kai Rollmann jep, 100% true. Should've added that to the video.

    • @Markd315
      @Markd315 Pƙed 5 lety +19

      And after that, probably how RSA can also be used to sign and verify data integrity.

    • @lallu1122
      @lallu1122 Pƙed 5 lety +13

      I never thought about it! Great!!

    • @sivasankarclouddeveloper1114
      @sivasankarclouddeveloper1114 Pƙed 5 lety +5

      Thank you Kai Rollmann

    • @uayfb1
      @uayfb1 Pƙed 4 lety +1

      I believe that is how Pretty Good Privacy works.

  • @alvfig
    @alvfig Pƙed 6 lety +49

    Great introduction, even for non-technical people. Thanks a lot! I'd love if you could make a similar video to digital signature.

  • @ACEofMCB
    @ACEofMCB Pƙed 6 lety +22

    Awesome explanation and graphics for a visual understanding. I was looking for something simple to show friends and family and you've covered it better than I ever could, thank you!

  • @scienceblossom6197
    @scienceblossom6197 Pƙed 5 lety +8

    It used to be super complicated for me but even watching this awesome video up to 02:16 helped me understand how public/private keys work in general and now it makes TOTAL sense. THANKS!

  • @aditi3112
    @aditi3112 Pƙed 5 lety +6

    Wow..how clearly & beautifully explained. From a long -long time, I was highly confused why 2 keys in asymmetric encryption...never been able to understand...but your explanation made it clear completely. Tons of thanks to you :)

  • @marriagedance8657
    @marriagedance8657 Pƙed 6 lety +13

    You deserve so much more subscribers.. Hats off

  • @supadupaforever
    @supadupaforever Pƙed 6 lety +14

    Thanks for keeping it simple, yet intriguingly educational for a layman curious as to how this technology works in the World Wide Web. Much appreciated sir!

  • @OHTV2016
    @OHTV2016 Pƙed 6 lety +23

    Excellent video, I’ve been watching many videos about this topic and you’re the only one who I actually understood from. Wonderful Job ❀

  • @falmanna
    @falmanna Pƙed 6 lety +337

    Very nice and clear presentation

  • @RM_1964
    @RM_1964 Pƙed 5 lety +2

    Man you explained it in so much simple manner. I don't even need to note it anywhere. It was like a story that's in my head. Thanks a lot sir.

  • @anirudhpathak2559
    @anirudhpathak2559 Pƙed 5 lety +9

    The best and clearest description of public-private key cryptography I have seen so far!

  • @lakerfan4life308
    @lakerfan4life308 Pƙed rokem

    Excellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.

  • @buzztrucker
    @buzztrucker Pƙed 8 měsĂ­ci

    Short, sweet, and to the point. Thanks for this great info condensed in short amount of time.

  • @tmyh
    @tmyh Pƙed 6 lety +3

    Great presentation, you make it easier to figure this new tech for a no-tech person. Keep the blockchain videos coming mate.

  • @ThatTurtleGirl
    @ThatTurtleGirl Pƙed 7 měsĂ­ci +1

    Great video! I couldn't wrap my brain around this concept and the video cleared things right up.

  • @AbhijitChandekar
    @AbhijitChandekar Pƙed 4 lety +1

    This is the best video on public key encryption. What i found was that, many other videos does not mention the fact that the public keys are exchanged between the two parties. Thank you to the maker of this video!!!

  • @chenbiton9469
    @chenbiton9469 Pƙed 5 lety +3

    Really clarified this topic for me. Thank you for this video!

  • @fotoMwahine
    @fotoMwahine Pƙed 2 lety +4

    Thank you so much for this easy to understand explanation. Studying cybersecurity and symmetric/asymmetric encryption; this is right on time. Excellent!

  • @Notaraehs
    @Notaraehs Pƙed 6 lety +5

    Your channel is amazing. Keep them coming!

  • @Nawdiral
    @Nawdiral Pƙed 6 lety +50

    The key words here I was really looking for since a while are: "...algorithm will generate a public and private key that are mathematically linked to each othere. Public keys can be used to encrypt data and only the matching private key can be used to decrypt it.".

    • @futuresocieties.
      @futuresocieties. Pƙed 5 lety

      High levels of security with mathematics.

    • @futuresocieties.
      @futuresocieties. Pƙed 5 lety

      Mathematics that provide high levels of security.

    • @JayLim-bn9fh
      @JayLim-bn9fh Pƙed 3 lety

      Holy lil fuck! Thanks!

    • @TheGadgetwiz
      @TheGadgetwiz Pƙed 3 lety +6

      This kind of irritated me because this was the reason I was watching the video. I wanted to know HOW that part worked. I already knew all the other pieces.

    • @penguin-tc1cx
      @penguin-tc1cx Pƙed 3 lety

      @@TheGadgetwiz this channel and video is called "simply explained" for a reason... if you want to learn the more complex process behind it, you should do research or watch other videos. don't complain lmao

  • @user-uf6fs2rn6s
    @user-uf6fs2rn6s Pƙed 2 lety

    This really helped loud, clear and straight to the point!!! Thank you so much

  • @anandarivu
    @anandarivu Pƙed 6 lety +2

    This is the best video to understand the algorithm. I was always amused at how ssh works with keys. No one ever showed the exchange of public keys.
    Thanks a lot for the video.

  • @phanurutpeammetta2066
    @phanurutpeammetta2066 Pƙed rokem

    After watching so many videos about encryption, this is the first one that makes sense to me. Thanks for the simple explanation and beautiful illustration!

  • @GrantClementi
    @GrantClementi Pƙed 9 měsĂ­ci

    Beautifully put, thank you.

  • @ernestgrouns8710
    @ernestgrouns8710 Pƙed 2 lety +1

    Thank you for explaining this in a way that now makes sense to me!! Much appreciated!!

  • @AmirAli-gv7kn
    @AmirAli-gv7kn Pƙed 4 lety +3

    Thank you. Watching mins before next lecture so that I stay aligned

  • @sabrinemaiz234
    @sabrinemaiz234 Pƙed 5 lety

    its awesome how u explain thank you a lot, its beeing one year trying to unterstand this complex IT Security,but i couldnt with all videos in Internet. u just explain it in few minuts and i didnt need to repeat the video thausend time, thank you a lot for your hard work

  • @mr2_pg
    @mr2_pg Pƙed rokem +1

    Thank you so much for this helpful video. You're communication and explanation skills are on point!

  • @joshvanathan1000
    @joshvanathan1000 Pƙed 4 lety

    Perfect explain !! Thank you for your effort

  • @Yell3x
    @Yell3x Pƙed rokem

    Thank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!

  • @diegoguzman4631
    @diegoguzman4631 Pƙed 5 lety +16

    I was able to understand how asymmetric encryption works in just 4:40 mins! Thanks a lot!!!

  • @lilcoconut3116
    @lilcoconut3116 Pƙed 3 lety +1

    Thanks man... I watched a lot of videos but was not able to clearly understand the exact concept, then I came across your video and yoo!! I understand the concept in no time... Thank you so much 😇😊

  • @benny.6588
    @benny.6588 Pƙed 2 lety

    Excellent, this kind of analogies, depicts better the problem for being understood, as the coffer or something like it, than a plain explanation declaring rules and results, because is better mentally thought in mind...beyond and respecting the math matter that is another more complex and low lever discussion. i love this class of analogy when is well applied. thanks for the video

  • @emufandango
    @emufandango Pƙed 5 lety +2

    You’ve got my sub! Thanks for the video, as I’ve been trying to understand this for quite a while, and no one else has been able to explain it to me. Simply put, Alice is encrypting the file in a way that only Bob can understand, and vice versa.

  • @chamjeewantha
    @chamjeewantha Pƙed 4 lety +1

    Thank you for shearing your knowledge

  • @aparnaiyer1199
    @aparnaiyer1199 Pƙed 28 dny

    Straight to the point ! Gives good groundwork to take this forward!

  • @mkc0321
    @mkc0321 Pƙed 2 lety

    excellent video, i had so much confusion with private and public key stuff ..you explained it so beautifully..your channel deserve the title

  • @mailinlindved6214
    @mailinlindved6214 Pƙed 5 lety

    Very pedagogically explain. Thanks, keep up the good work!

  • @N3vermake
    @N3vermake Pƙed 2 lety

    Thanks, you summed up a 2h lecture in 4 minutes. Lovely!

  • @fatinistiaque5892
    @fatinistiaque5892 Pƙed rokem +1

    This solved my confusion very easily. Great presentation

  • @brolysmash9333
    @brolysmash9333 Pƙed rokem

    Omg, dude, this was so straightforward; thank you very much. Cryptography is one of those areas that blows my mind, and today I understood it with a simple video of you.

  • @lesleykramer7207
    @lesleykramer7207 Pƙed 5 lety +7

    Finally! I understand this! Thanks for a clear, simple explanation.

  • @kaushal4nanda867
    @kaushal4nanda867 Pƙed 5 lety

    Best and simple explanation.. Thank you

  • @adityabhat3108
    @adityabhat3108 Pƙed 4 lety +1

    Thank you.. the concept was really well explained :)

  • @francis191
    @francis191 Pƙed 2 lety

    Clear and concise. To the point with great graphical representation.

  • @eyewaves...
    @eyewaves... Pƙed 2 lety

    Watched some of your videos - they are really cool, informative and accurate enough. Great job and thank you.

  • @abelashenafi6291
    @abelashenafi6291 Pƙed 4 lety +1

    Video truly worth watching. Thanks for the vivid explanation

  • @sina_m_123
    @sina_m_123 Pƙed 9 měsĂ­ci

    great explained!

  • @kisme01
    @kisme01 Pƙed 5 lety +2

    thank you. finally someone who can explain

  • @codecleric4972
    @codecleric4972 Pƙed rokem

    This is probably the best explanation of this on CZcams

  • @MrRahulKumarKandula
    @MrRahulKumarKandula Pƙed 5 lety

    You cleared my confusion. Thanks a ton. Good presentation too.

  • @lorenvanhoff8740
    @lorenvanhoff8740 Pƙed 8 měsĂ­ci

    This really helped me, Thanks!!!

  • @MEME-re5jl
    @MEME-re5jl Pƙed rokem +1

    Thank you this is my first comment in the CZcams you deserve it. Thank you.

  • @theartofhacking6896
    @theartofhacking6896 Pƙed 2 lety +10

    I was always struggling to grasp the concept of asymmetric keys but now, within only 4:40 mins it became crystal clear. Keep it up. :)

    • @brd8764
      @brd8764 Pƙed rokem

      rightly and it is prosper.

  • @theblueraven764
    @theblueraven764 Pƙed rokem

    Brilliant explanation, thanks! I've been wracking my head over this for ages and then I saw this video. It makes way more sense now!

  • @godlychild7925
    @godlychild7925 Pƙed 4 lety

    Fantastically explained! Thank you.

  • @mosespeter9711
    @mosespeter9711 Pƙed rokem

    The is the best video on internet for this topic. Thanks a bunch!

  • @-MikaelaWuisan
    @-MikaelaWuisan Pƙed 2 lety

    Thank youu so much for this easy to understand explanation! Truly truly helpful :)

  • @MegaKalkas
    @MegaKalkas Pƙed 6 lety +9

    You should also mention that encryption works in the other way too. An encrypted message with a private key can be decrypted only by the paired public key and this insures that the sender (or whoever encrypted the message) is indeed trusted.

  • @duyanh2471
    @duyanh2471 Pƙed 2 lety

    thank you so much for explaining this. It took me so long to understand this technical concept until I found your video.

  • @alyssayoung421
    @alyssayoung421 Pƙed 4 lety

    thanks for helping me understand this concept!

  • @ecommercetechbuild1354
    @ecommercetechbuild1354 Pƙed rokem

    Simple and clean explanation. Kudos to you

  • @Chris-ez1ly
    @Chris-ez1ly Pƙed 3 lety

    Very nice job explaining. Thank you for a job well done. Helps a ton.

  • @aqua123670
    @aqua123670 Pƙed 6 lety

    nice explanation, clear and concise, also you put a great analogy there

  • @pranavchebolu7961
    @pranavchebolu7961 Pƙed 5 lety

    This video really helps explain this concept. Awesome presentation

  • @gpardhu
    @gpardhu Pƙed rokem

    blessed are the souls who impart such valuable information for free

  • @at_tap
    @at_tap Pƙed 5 lety

    Very very simple and well explained, thank you

  • @kishcool
    @kishcool Pƙed 2 lety +2

    Great explanation. It would be great to see you explain how you can be sure that you’re using the Alice (or bob) public key and not an attacker public key who would be in the middle.

  • @mrlima2953
    @mrlima2953 Pƙed 2 lety

    Excellent video. The most well explained I have found so far on the internet!

  • @marcinsola4179
    @marcinsola4179 Pƙed 6 lety +3

    Great job! I'm just going through Bitcoin's whitepaper and this video helped me a lot with understanding the mechanism behind bitcoin transactions. Thank you!

  • @user-np5ig1pn1o
    @user-np5ig1pn1o Pƙed rokem +1

    sweet and simple , just what i needed , thanks a ton

  • @penguinmonk7661
    @penguinmonk7661 Pƙed 3 lety

    Thank you, this was a very good refresher and a great example to share with students.

  • @parasjoshi7479
    @parasjoshi7479 Pƙed 6 lety

    ThankU sir for clearing this concept 😊

  • @user-ps3zo7ux1e
    @user-ps3zo7ux1e Pƙed 5 měsĂ­ci

    the only video that explained it properlly, thank you very much!

  • @xuanhoahoang6959
    @xuanhoahoang6959 Pƙed 2 lety

    Really nice vid, clear and straight forward with a non-IT person like me. Thank you very much

  • @vladislavkaras491
    @vladislavkaras491 Pƙed 8 měsĂ­ci

    Thanks for the video!

  • @mrplay.playful
    @mrplay.playful Pƙed 3 lety

    Thank you so much. Well explained. I now understand asymetric encryption

  • @mehul1458h
    @mehul1458h Pƙed 3 lety

    that's very smooth explain of asymmetric encryption.
    I have read many paragraph to learn that but i didn't understand.
    very heplfull. thanks for that

  • @Karen-jj9xe
    @Karen-jj9xe Pƙed 10 měsĂ­ci

    Excellent explanation - greatly appreciated!

  • @morriszhang929
    @morriszhang929 Pƙed 3 lety

    so precisely explained ! thank you

  • @carlosmartin1995
    @carlosmartin1995 Pƙed 6 lety

    Thanks!! You made a great explanation.

  • @samuelodell5215
    @samuelodell5215 Pƙed 5 lety +3

    So helpful, thanks!

  • @joehaynes6829
    @joehaynes6829 Pƙed 5 lety

    Watched three videos on symmetrical Encryption , only this one made sense to me , good video

  • @PatrickHarlen
    @PatrickHarlen Pƙed 6 lety +2

    This is amazing work! Keep going. It's a very helpful content.

  • @tasapornv
    @tasapornv Pƙed rokem

    Thanks for this. It is well explained and very easy to understand. Keep up good work.

  • @cryptocosmos7128
    @cryptocosmos7128 Pƙed 5 lety

    You have definitely lived up to your channel name with this one. Nice work.

  • @anshumanbaruah4161
    @anshumanbaruah4161 Pƙed 5 měsĂ­ci

    Beautifully explained. Thanks!
    I now have a better understanding.

  • @bearlifejourney
    @bearlifejourney Pƙed rokem

    very well-explained video! thank you!

  • @zokir.finance
    @zokir.finance Pƙed 2 lety

    Thank GOD, finally I understood the concept, after days of research, this video and youtube channel should be on top))) Simplicity is genious.
    Thank you so much.

  • @carcamp5451
    @carcamp5451 Pƙed 5 měsĂ­ci

    Damn. I understood after trying to understand for months. You're a life saver. Thanks for your amazing work.

  • @aminekettani3538
    @aminekettani3538 Pƙed 3 lety

    Thank you very much for your videos! They are amazing and give a lot of value

  • @danyellbaptiste1055
    @danyellbaptiste1055 Pƙed 5 lety

    I agree, very well explained. Thank you!

  • @eraykacmaz
    @eraykacmaz Pƙed 5 lety

    The only video that help me to understand the topic really well. "Mathematically linked with each other..." is the key phrase of understanding. Thanks for video.

  • @saar331
    @saar331 Pƙed 5 lety

    Perfect explanation, better than my lecturer and now I got the idea clear.

  • @ttaylor705
    @ttaylor705 Pƙed 5 měsĂ­ci

    Simply explained! I really enjoyed the video. Thanks for this.

  • @gianlucamasini7728
    @gianlucamasini7728 Pƙed 4 lety

    Definitely clear! best compliments

  • @ashleypursell9702
    @ashleypursell9702 Pƙed 3 lety

    great video thank you so much, simple and straight to the point