Symmetrical vs asymmetrical Encryption Pros and Cons by Example

SdĂ­let
VloĆŸit
  • čas pƙidĂĄn 31. 05. 2024
  • Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more.
    In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one.
    Chapters
    0:00 Intro
    1:50 Symmetric Encryption
    9:40 Asymmetric Encryption
    14:40 Symmetric Encryption Pros and Cons
    17:05 Asymmetric Encryption Pros and Cons
    20:20 Summary
    1. Symmetric encryption
    2. Asymmetrical encrypt
    3. Pros and cons of Symmetric vs Asymmetric
    Symmetric encryption
    Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have something I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock.
    The same key you use to encrypt is the same key to Decrypt.
    Examples
    Examples of popular symmetric-key algorithms include
    AES
    Twofish
    Serpent
    DES
    Twofish, Serpent, AES (Rijndael), Blowfish
    CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer+/++ (Bluetooth), and IDEA
    Asymmetrical encryptions
    We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesn't really have my key so we need to encrypt it..
    Also called Public key encryption
    1977
    Rivest-Shamir-Adleman (RSA)
    * Diffie-Hellman key exchange protocol
    * DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
    * ElGamal
    * Various elliptic curve techniques
    * Various password-authenticated key agreement techniques
    * Paillier cryptosystem
    * RSA encryption algorithm (PKCS#1)
    * Cramer-Shoup cryptosystem
    * YAK authenticated key agreement protocol
    So TLS for example first transfer the symmetric key using asymmetrical encryption then communicate all the way using sym encryption
    Symmetric encryption
    pros
    faster
    Can be used to encrypt large data scales
    cons
    Very hard to transport the key 🔑
    ASymmetric encryption
    Pros
    Keys can be shared across a network
    Perfect for encryption small data such as ssh
    cons
    Slow
    Rsa slower then aes
    Cannot be used to
    (1,2)
    Number to power 1 mod 2
    Summary
    Sym. Encryption is used to encrypt large files, same key to encrypt is the same key to deycrpt they are very fast and efficient but keys need to exist on both machines to communicate.
    Asym encryption can one key encrypt another key decrypts public key is
    Stay Awesome!
    Hussein
  • Věda a technologie

Komentáƙe • 119

  • @asfar1984
    @asfar1984 Pƙed 3 lety +50

    This channel is my new addiction, every night before going to sleep

  • @joshuaifara2736
    @joshuaifara2736 Pƙed 3 lety +21

    I love how you're always able to infuse some humor in your videos, it makes them always enjoyable no matter how long they are

  • @vivekbond123
    @vivekbond123 Pƙed 4 lety +25

    I am almost binge watching your channel :)

  • @sreevishal2223
    @sreevishal2223 Pƙed 4 lety +24

    These are the only two person in encryption Alice and Bob.. LMAO.. XD XD
    Nice explanation,great humour..

    • @hnasr
      @hnasr  Pƙed 4 lety +1

      Thanks Sree 🙏🙏

    • @richardmaduka4747
      @richardmaduka4747 Pƙed 3 lety

      LOL don't forget our one and only eavesdropper, Eve

  • @ashishjha9262
    @ashishjha9262 Pƙed 3 lety +1

    I am so grateful for your videos. You explain complex topics in such a lucid way!

  • @mohamedayoup2761
    @mohamedayoup2761 Pƙed rokem +1

    thank you hussein for your great conent, you have a great teaching skills.
    نفŰč Ű§Ù„Ù„Ù‡ ŰšÙƒ

  • @paulo.menezes
    @paulo.menezes Pƙed 3 lety +5

    Your videos are great, man! I laugh and learn at the same time. Thanks a lot! đŸ™đŸ»

  • @Mr.Nzo2030
    @Mr.Nzo2030 Pƙed 3 lety +17

    "It took me 30 fraeking minutes to figure this animation out" LOLOLOLOLOL

  • @tibebetech4867
    @tibebetech4867 Pƙed 5 měsĂ­ci

    Excellent job! AWSOM the way why both symmetric and asymmetric encryption exist!...I actually LOLed (@ 7 min:44 second) when the blue guy comes in intersecting the content decryption KEY....the best comedy in the history of explaining encryption as a communication and content security

  • @MahmoudKhudairi
    @MahmoudKhudairi Pƙed 3 měsĂ­ci

    I love watching this guy, even if I knew AES, RSA and TLS, I still enjoy him

  • @karatechop89
    @karatechop89 Pƙed rokem

    I appreciate the animation and the effort involved; immensely

  • @zeus134jojojo
    @zeus134jojojo Pƙed 3 lety +1

    I loved those power point animations.
    Great Video!

  • @harpindermatharu8320
    @harpindermatharu8320 Pƙed 4 lety +11

    Nice video. I like how you make everything so interesting and how you add soul to networking components, you make them something like fictional movie characters.

    • @hnasr
      @hnasr  Pƙed 4 lety +8

      Thank you appreciate it 🙏 This is my style in teaching I believe tech videos don’t have to be boring. So I try to balance fun and learning without being distracting. Sometimes I succeed sometimes I fail 😅

  • @TheKawasaki250
    @TheKawasaki250 Pƙed 3 lety +2

    I am taking a Sec+ class right now and this video really helped me, and made studying more fun. Never lose your sense of humor! Great videos.

    • @hnasr
      @hnasr  Pƙed 3 lety

      Thanks 😊 all the best in the Secuirty + class

  • @pingu8394
    @pingu8394 Pƙed 4 lety

    You are the best at explaining! Hilarious and compelling!

  • @bijanzohouri98
    @bijanzohouri98 Pƙed 3 lety +1

    Man I enjoyed the way u urself laugh and describe. Not everyone has this talent trsut me. Good job. Subscribed

  • @yashdesai8372
    @yashdesai8372 Pƙed 4 lety +1

    Crystal clear from a beginner's point of view!

  • @pedrosanchezf
    @pedrosanchezf Pƙed 2 lety +1

    7:43 That moment deserves a like on its own!

  • @sravanakumar9326
    @sravanakumar9326 Pƙed rokem

    Wow, what a great video.
    Indeed the graphics are very good and makes us to understand very easily.
    And the way explain describes how passionate you are, to teach the technology.

  • @javadahmadzadeh7129
    @javadahmadzadeh7129 Pƙed 2 lety

    Thank you so much Hussain. I've watched lots of your videos and learned a lot. Ù…Ű§ŰŽŰ§Ű§Ù„Ù„Ù‡

  • @ahmadkhaireldden6682
    @ahmadkhaireldden6682 Pƙed 3 lety +1

    You know, you are perfect and I love the way you explain it

  • @avi12
    @avi12 Pƙed 3 lety

    I would like this video twice
    I love that you linked to an Eddie Woo video, my favorite math teacher!

  • @kerryonyeogo4174
    @kerryonyeogo4174 Pƙed 7 měsĂ­ci

    This guy is so brilliant, wow 👏👏👏. A great educator infact

  • @Finn-jp6pn
    @Finn-jp6pn Pƙed 3 lety

    You made it all really intuitive. Thanks

  • @bhushanmulmule7885
    @bhushanmulmule7885 Pƙed 3 lety +1

    You are just awesome.. never ever ever ever ever found such a crystal clear explanation... Thanks a lot :)

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      Glad it helped

    • @bhushanmulmule7885
      @bhushanmulmule7885 Pƙed 3 lety

      @@hnasr still watching... Just finished sync async! Today have to finish this beginner playlist man.. it's incredible.. haha

  • @siddheshlatkar9839
    @siddheshlatkar9839 Pƙed rokem

    Wish this channel existed when I was in school.

  • @MrLLGO
    @MrLLGO Pƙed 3 lety +1

    Bro i love your humor! Thx. for this tutorial.

  • @mangihuthasudungan2778
    @mangihuthasudungan2778 Pƙed 5 lety +1

    another great video tutorial.. i really appreciated your hard work.... thank you...

    • @hnasr
      @hnasr  Pƙed 5 lety

      Mangihut Hasudungan thank you for watching 😊

  • @bumfuzzle717
    @bumfuzzle717 Pƙed rokem

    lmao "Aladdin is a thief" I knew that magic carpet wasn't his! but great video and explanation, need to pass the Security+ exam

  • @mileyloveable1
    @mileyloveable1 Pƙed rokem

    Thank youu so much. Very nicely explained. Thanks for the animation 😜

  • @amsterdenko9854
    @amsterdenko9854 Pƙed 2 lety

    Best explanation ever, Master!

  • @raghuvallikkat3384
    @raghuvallikkat3384 Pƙed 4 lety +1

    Is my understanding correct?
    In Asymmetric encryption, for a communication betn A&B, both A & B have its own pvt and public keys say PUB_A/PVT_A and PUB_B and PVT_B.
    So if A sends message to B, the message will be encrypted with B’s Public key sothat B can decrypt with its PVT_B.
    And vice versa( when B sends to A , it will be encrypted with A’s public key PUB_A)

  • @bhavulgauri7832
    @bhavulgauri7832 Pƙed 3 lety

    Notes:
    - Symmetic encryption : same key can be used to encrypt and decrypt. All good when you're on one system. But when networking comes into picture, how would you tell other person about this key? If you tell without any encryption then middle-man can sniff this key.
    - Asymmetric encryption : requires public key and private key. public key is what you open to public, so anyone can use that to encrypt when they send messages to you. private key is used to decrypt those messages by your system. Given the mathematical computation it does with primes, it's quite slow, so never gets used for large data.
    What happens in real world? For example in HTTPS -- we use Asymmetric encryption for initiation of communication. So the initial "key" (for symmetric encryption) is shared via asymmetric encryption route. Once that gets transferred, further communication happens via symmetric encryption.

  • @basuv76
    @basuv76 Pƙed 2 lety

    this is really a good video and I learned something new.

  • @surajmittal7572
    @surajmittal7572 Pƙed rokem

    I read somewhere that Diffie-Hellman cannot be used for asymmetric exchange but here he mentioned that as one of the examples of Asymmetric implementations. Can someone explain?

  • @vlad981
    @vlad981 Pƙed 5 lety +1

    Awesome as always :)
    Looking forward for video about tls)

    • @hnasr
      @hnasr  Pƙed 5 lety

      THANKS ! TLS Video is now up :) czcams.com/video/AlE5X1NlHgg/video.html

  • @hansmelo32
    @hansmelo32 Pƙed 4 lety +5

    Awesome. Btw the animations are great! :D

    • @hnasr
      @hnasr  Pƙed 4 lety +2

      Thanks Hans!! 😊

  • @romantsyupryk3009
    @romantsyupryk3009 Pƙed 3 lety

    Thanks so much for this video tutorial.

  • @KTechy-
    @KTechy- Pƙed 8 měsĂ­ci

    Great explanations!

  • @sankettambare7474
    @sankettambare7474 Pƙed 3 lety

    Thanks for the great content. It's a best one for freshers!

    • @hnasr
      @hnasr  Pƙed 3 lety

      Glad it helps ❀❀

  • @soolch
    @soolch Pƙed 4 lety

    LOL... the animation is so cooool... great explanation

  • @trava4156
    @trava4156 Pƙed 4 lety

    very simple, thank you

  • @aryankumar87771
    @aryankumar87771 Pƙed rokem

    magical explanation

  • @Bruh-jw2ze
    @Bruh-jw2ze Pƙed 3 lety

    Bruh that was funny as hell đŸ€Ł
    Keep up the good work 👍

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      Glad you enjoyed :D

  • @benmoyal6107
    @benmoyal6107 Pƙed 6 měsĂ­ci

    great content!i just love it

  • @mojibrahman2893
    @mojibrahman2893 Pƙed 3 lety

    Hello, I have a nano x which is encrypted and has coins loaded. Is
    there a away to decrypt this nano x using any kind of software. I have
    lost contact with the person who sent me nano x which has encrypted
    crypto coins. Your help will be appreciated. Many thanks.

  • @stifferdoroskevich1809
    @stifferdoroskevich1809 Pƙed rokem

    loved the animation!!

  • @samschofficial2539
    @samschofficial2539 Pƙed 3 lety

    kindly sir give me answer to this question based on scenario...
    Consider an army of a country is fighting a war against terrorism in its country. For this, its troops are in critical operations in the remote areas of the country. In order to share the updated information of the situations, there is need of an efficient communication mechanism among the troops. The army is therefore planning to launch an efficient communication application which will facilitate its soldiers to share the instant text as well as the voice messages among them. The application will run on the special purpose mobile devices that will transmit the messages among its users (soldiers) using the Intranet of army. However, to avoid from any possible eavesdropping and leakage of important information, the army wants to implement a proper encryption mechanism in the application to transfer the messages to their intended recipient(s) in encrypted and secured manners.
    After carefully reading the above given scenario and assuming yourself as a network security manager, you are required to suggest the most suitable Encryption technique from the following along with two solid reasons:
    1.Symmetric Encryption
    2.Asymmetric Encryption

  • @kez99
    @kez99 Pƙed 3 lety

    when i want to learn a topic/tech i just add Hussein at the end of the query hoping you already talked about it lol.

  • @shashikantpawar7069
    @shashikantpawar7069 Pƙed 3 lety +1

    Quality đŸ”„ đŸ”„đŸ”„đŸ”„

  • @DanFlakes
    @DanFlakes Pƙed 2 lety

    Props to the animation!

  • @pamudithajayasundara1259
    @pamudithajayasundara1259 Pƙed 2 lety

    Hussein first i would like to thank for this great content.I hava a question.If we send something from server to client ,how the client stores the private key to encrypt.?i understood the way how client sends the requests to the server using public and private key so the server can decrypt the data using stored private key.but how the inverse of this happens?

    • @hnasr
      @hnasr  Pƙed 2 lety

      So the server will use the clients public key to encrypt the data so the client can use its private key to decrypt.
      This means the client should have the server public key and the server should have the client’s public key.
      Normally however this is better done using symmetric encryption and client and server exchange the shared key with key exchange algorithm such as diffi hellman

  • @ramchandrams6139
    @ramchandrams6139 Pƙed 3 lety +1

    Thank you so much for valuable content. You said, In Asymmetric key cryptography, we can use public key to do encryption only. But, I found we can use public key to do both encryption and decryption. Could you please clarify here. Thank you so much once again.

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      the other use case is for digital signature. Where you can encrypt with private key and decrypt with public key.
      You cant use the same public key to encrypt and decrypt otherwise its useless

  • @molekuax8646
    @molekuax8646 Pƙed 2 lety

    Thanks man

  • @nelsonbravo7971
    @nelsonbravo7971 Pƙed 3 lety

    Great video as always, I'm new in all of this, there is a question... what is the relation between this video (symetric, asymetric encryption, RSA, AES, etc) and TLS and it versions, can explain please, and tnx for all you do.

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      TLS uses encryption , check out my TLS video czcams.com/video/64geP_LAZ5U/video.html

  • @ayoubatba9507
    @ayoubatba9507 Pƙed rokem

    dude you're the best 😘😘😘😘

  • @Khaled-ux6bv
    @Khaled-ux6bv Pƙed rokem

    Salam alykom brother, great video :)

  • @xuzhihong3036
    @xuzhihong3036 Pƙed 4 lety

    good job hahaha presentation made it so much easlier

    • @hnasr
      @hnasr  Pƙed 4 lety

      😍😍

  • @robbywood440
    @robbywood440 Pƙed rokem

    Amazing.

  • @life_ofcoder
    @life_ofcoder Pƙed 3 lety

    Hi,
    Beautiful video.. can you share this knowledge with dummy HTTP routes using node.js
    Thanks

  • @LauraMartinez-tj9zd
    @LauraMartinez-tj9zd Pƙed 3 lety +2

    "THIS GUY'S AN IDIOT" lmao I love your explanations and animations. Thank you so so much :D

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      I appreciate you Laura thanks🙏😅😂

  • @karankhemani3175
    @karankhemani3175 Pƙed 4 lety

    Thanks for the video , It was ver helpful ..... r u from India ?

    • @hnasr
      @hnasr  Pƙed 4 lety

      Hello Karan! Thanks for your comment. No I am from Bahrain 🇧🇭

  • @dommikador6524
    @dommikador6524 Pƙed 3 lety

    well done...

  • @rainchai851
    @rainchai851 Pƙed 4 lety +1

    every video is a gold mine

    • @hnasr
      @hnasr  Pƙed 4 lety

      Thanks RAIN! 😊 made me blush

  • @ranjangupta5544
    @ranjangupta5544 Pƙed 2 lety

    One question do we have something similar for algorithms that will be great ....

    • @hnasr
      @hnasr  Pƙed 2 lety

      Didn’t quite get the question?

  • @kurianbenoy2
    @kurianbenoy2 Pƙed 3 lety

    Love animation

  • @tahirdevlog2047
    @tahirdevlog2047 Pƙed 3 lety

    Awesome

  • @santoshpanigrahy
    @santoshpanigrahy Pƙed 3 lety

    Nice explanation Hussein. Can you please help me to understand trust store and key store in the same context?

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      I think I explained it on my JWT video .. youtube "JWT Hussein"

    • @santoshpanigrahy
      @santoshpanigrahy Pƙed 3 lety

      @@hnasr Oh. That's nice. Will see that then. Thank you :)

  • @umeshb8210
    @umeshb8210 Pƙed 3 lety

    Love the accent sir❀

    • @hnasr
      @hnasr  Pƙed 3 lety

      ❀

  • @JamesSmith-cm7sg
    @JamesSmith-cm7sg Pƙed 3 lety

    But Alices public key is still shared over the wire, any middleman can still grab it and decrypt Alice's messages? Also the middleman can pretend to be Bob

  • @luisrosalescarrera5406
    @luisrosalescarrera5406 Pƙed 3 lety

    I've just press the like button for the animation, thank you xDDDDDDDDDDDD

    • @hnasr
      @hnasr  Pƙed 3 lety +1

      🎊🎊

  • @NWigi
    @NWigi Pƙed 3 lety +1

    I like that animation LOL. 😂

  • @PurushotamRai
    @PurushotamRai Pƙed 2 lety

    this guy is awesome, I can't stop laughing... :D

  • @BharCode09
    @BharCode09 Pƙed 4 lety

    You sound like Sal Khan! :) Even the speaking style! Great animation! I totally appreciate that along with the content ..
    Edit: BTW, that guys name is "EVE", the Eavesdropper!

    • @hnasr
      @hnasr  Pƙed 4 lety +1

      Thank you so much for your comment. Some ppl say I look like him Sal Khan too, or maybe thats Kunal Kapoor

    • @BharCode09
      @BharCode09 Pƙed 4 lety

      @@hnasr If you're an Arab, then it's no wonder :D Great content on your channel. Easy to brush up for basics.. Thanks a ton!

  • @sudqi
    @sudqi Pƙed 3 lety

    Asymmetric encryption on its own doesn't solve the problem of sharing keys because you still vulnerable to man in the middle attack which can be solved with certificates

  • @jacksongillet369
    @jacksongillet369 Pƙed 3 lety

    I never thought id ever hear from a real life michael scott

    • @hnasr
      @hnasr  Pƙed 3 lety

      I am not superstitious, Im a little stitious

  • @vim55k
    @vim55k Pƙed 3 lety

    Please add it to TLS playlist

  • @gigiTD
    @gigiTD Pƙed 2 lety

    Like just for the animations😂

  • @amirmohg1319
    @amirmohg1319 Pƙed 2 lety

    Easy peasy Japanesey :')

  • @xfrostbite8328
    @xfrostbite8328 Pƙed 3 lety

    Haha there we go đŸ€ŁđŸ€Ł

  • @feyzakaymakc7385
    @feyzakaymakc7385 Pƙed rokem

    Your explanation is good but you are a complete racist. It is very rude of you to say that the thief is Arab and his name is Aladdin.

  • @emreergul1601
    @emreergul1601 Pƙed 4 lety

    You are sayin lets choice arabic name and you are choosing aladdin and then u are saying this name is appropriate for thief. Ashamed of your racism!

    • @hnasr
      @hnasr  Pƙed 4 lety +1

      emre ergĂŒl Aladdin is a thief in the Disney movie and fyi i am Arab.