Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS

Sdílet
Vložit
  • čas přidán 16. 05. 2024
  • Encryption is how data confidentiality is provided. Data before it is encrypted is referred to as Plaintext (or Cleartext) and the process of encryption turns it into Cipher text. Cipher text should be unintelligible. Only the intended recipient should have the ability to Decrypt data, which turns Cipher text back into Plaintext.
    There are two strategies for Encryption: Symmetric Encryption vs Asymmetric Encryption. In this video we discuss each of their strengths and weaknesses, and provide a simple illustration of them both.
    This lesson is a free sample lesson from the the most effective TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    💬 Join Practical Networking Discord
    / discord
    🖧 Want to learn how how data moves through a network?
    • Networking Fundamentals
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
  • Věda a technologie

Komentáře • 144

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +4

    👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
    ✨ *Full course:* pracnet.net/tls
    💲 *Coupon Code* for 50% off: youtube50

  • @gmeister3022
    @gmeister3022 Před rokem +51

    My friend, I've heard many people tried to explain this, some with many years in the tech industry, but you do it so clearly that you put other explanations to shame. Thanks for this video!!

  • @drakezen
    @drakezen Před 2 lety +25

    Easily one of the best explanations between the two types of encryption. Well done!

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      Thank you kindly, glad you enjoyed it!

    • @solowolf5304
      @solowolf5304 Před rokem

      @@PracticalNetworking I didn't understand the fact that private key is required to decrypt the cipher text, if that is the case then why don't u need to share this private key to the receiver ? How will a receiver decrypt the cypher text without having a private key ?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      @@solowolf5304 Private Keys only exist in Asymmetric Encryption -- which features _two_ keys, a Private Key, and a Public Key. With Symmetric Encryption, there is only 1 key, and you could consider it also "Private".
      Try this video, see if it helps make sense of it: czcams.com/video/_zyKvPvh808/video.html

  • @KENDYJOSEPH-ef8md
    @KENDYJOSEPH-ef8md Před rokem

    One of the best explanations between the two types of encryption. Awesome.

  • @worop
    @worop Před 3 měsíci +1

    This is the best explanation of this concept I’ve seen to date. Great stuff! Thanks! The other videos in this playlist are equally helpful!

  • @x0rZ15t
    @x0rZ15t Před rokem +2

    The way you explained symmetric vs asymmetric encryption was simply magnificent in it's simplicity and effectiveness. Bravo!

  • @RenzoCotta
    @RenzoCotta Před 8 měsíci

    this is one of the best explanations about ssl out there .... thanks a lot

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +7

    🥳🥳- Promotion Ended - Congrats @Scott Sparling 🥳🥳
    For the rest of you, you can use this discount code for $100 off the course: YT100
    classes.pracnet.net/courses/practical-tls
    Subscribe + Notification bell to increase your odds of winning when the next video (and giveaway) releases!
    📢📢 FREE COURSE GIVEAWAY 📢📢
    *A random person from all the comments in the next 7 days on this video will be selected to gain free access to the Practical TLS course.*
    Good luck everyone =)

  • @e2622
    @e2622 Před měsícem

    Sweet jesus, this is the best tutorial on youtube regarding the types of encryption! Thank you!

  • @dustinhxc
    @dustinhxc Před 9 měsíci +1

    Fantastic explanation!!!! Thank you!

  • @peterchmelar8886
    @peterchmelar8886 Před 2 lety +2

    The level of clarity in your explanation is absolute :) Thanks for that

  • @ajayb9392
    @ajayb9392 Před 2 lety +2

    Awesome explanation. As always you make it simpler. Thank you very much for making these contents free for us.

  • @Spellzzzweaver
    @Spellzzzweaver Před 2 lety +3

    The cypher forwards backwards is a genius way of showing asymmetric.

  • @scottspa74
    @scottspa74 Před 2 lety +2

    I NEEDED this video so bad. In college, cybersecurity fundamentals 274, my instructor (highly regarded, consults DHS, etc) could not seem to get it thru to me, or I just couldn't get it. Sooo looking forward to this video. Thank you!

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      You're in for a treat next week then =). And the weeks that follow! Lot's of good stuff coming out.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Congrats! You won free access to the course! Reach out to me on Discord to claim your prize! pracnet.net/discord

  • @aspected
    @aspected Před 3 měsíci +1

    These videos are absolutely fantastic. You explain stuff so well

  • @ragemoody
    @ragemoody Před rokem +2

    This is the third video of yours I've watched today and I'm super impressed by how good your explanations of all these topics are. So many people struggle explaining these concepts but you make it sound very easy. Again, I'm super impressed. I will make sure to share your channel whenever I can, thank you for your work!!

  • @alittax
    @alittax Před 2 lety +6

    Man, this is BEAUTIFUL! I don't say this very often, but your explanations really are that!!! You've probably given us an insight into the minds of those people who have invented these concepts or work with them on a regular basis: I imagine that they have this clear understanding of the concepts! Bravo!

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Thanks for the kind words AlittA. It's nice to hear this content is appreciated =)

  • @GurkanALTAY
    @GurkanALTAY Před 2 lety +2

    Very simple and clear definition. Thanks! 💚

  • @user-cc8kb
    @user-cc8kb Před 6 měsíci

    GREAT explanation! Thanks a lot.

  • @arishkhan8325
    @arishkhan8325 Před 2 lety +1

    Outstanding explanation .all content of this channel are mind-blowing ....thank you for making video for free of cost.

  • @richasharma598
    @richasharma598 Před rokem

    In awe of your explanation.

  • @fashion_walker
    @fashion_walker Před 2 měsíci +2

    My dear , I owe you a bear on this one, I don't know what to say but you are fully gifted with the ability to transfer information, many of your courses make my world flows like a Niagara falls after trying others teaching

  • @Moocow2003
    @Moocow2003 Před 2 měsíci

    thank you! this video broke down the topic really well :)

  • @rockinron5113
    @rockinron5113 Před 5 měsíci

    Great tutorial. Thanks. 👍🏻

  • @pautome461
    @pautome461 Před 2 lety +1

    Great job! I'll recomend your videos to my pupils at school. Thanks

  • @vishalrugle538
    @vishalrugle538 Před 2 lety +4

    The way you explain the concept is highly appreciated. I am commenting on this after going through your courses NAT, NAT on ASA, NAT on IOS ,CCNA Basic videos on CZcams and the one-course INE. Really looking for BGP, Security and F5-related courses from you in the future. I request other audiences to please share and encourage Ed Harmoush so that we will get quality content on a different topic. Thanks a lot Ed.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Thank you for the kind words, Vishal, and for all your support =). I hope the TLS course will free me up to put all my effort into course creation!

  • @ramkowsu5295
    @ramkowsu5295 Před 8 měsíci +1

    Awesome, I watched all outside videos but they are cipher text to me; but your videos are "clear text". Thanks for the great work. Keep up

  • @youthfull3616
    @youthfull3616 Před rokem

    Amazing explanation. ❤

  • @scottspa74
    @scottspa74 Před 2 lety +1

    Super excited for the next video you teased, getting more into public and private, and asymmetric. My understanding is that the primary function of asymmetric keys is to securely share the symmetric key - bit I could certainly have misunderstood (in class). And, that the private key facilitates authentication, in that, since only the sender (encryptor) of a message has their own private key to decrypt said message, that proves it was sent from their machine and that they encrypted it. I don't know if I'm right about all this. I'm sooo hoping you can touch on this in the follow up video. Thanks for the great content.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +1

      We'll be touching on all this in the next two videos, actually. But yes, you're on the right track =)

  • @divyagupta3685
    @divyagupta3685 Před měsícem

    So many praises from the persons from computer technology world but your explanation also made me to understand this topic while I am a layman in this world

  • @lallu1122
    @lallu1122 Před rokem

    Best video i ever watched.

  • @misterkevin_rs4401
    @misterkevin_rs4401 Před 2 lety +1

    One of the best explainations on the topic.

  • @andriykuts1981
    @andriykuts1981 Před rokem +1

    the best explanations of the encryption

  • @TotallyNotAuroras2ndChannel
    @TotallyNotAuroras2ndChannel Před 6 měsíci

    Amazingly done

  • @jaehyi2009
    @jaehyi2009 Před 2 lety +1

    You never disappoint! Thanks again for a great video!

  • @user-vg5gn3zp2m
    @user-vg5gn3zp2m Před 2 měsíci +1

    THANKS

  • @maciejwodecki9294
    @maciejwodecki9294 Před 11 měsíci

    Thank you very much for those videos, they helped me a lot to fill gaps in my knowledge.

  • @maryanne2025
    @maryanne2025 Před 5 měsíci

    Absolutely superb

  • @santoshkumar-dr4qg
    @santoshkumar-dr4qg Před 2 lety +2

    Excellent explanation - I have been trying to learn SSL/TLS for the last few years but am unable to grab a basic understanding.
    A couple of points I would like to highlight that were observed while going through the content.
    > Just enough talk ( not too short or too long videos)
    > Each video is mostly equivalence of reading several pages of the textbooks/articles/blogs
    > Simple demonstrations that can be easily followed.
    > Animations used to lay down the foundation/concepts are very effective.
    > Use of simple English that can be understood by non-spoken English people like me.
    > Along with SSL/TLS, Basic networking concepts are also very effective for people who want to learn how networking works.
    > Last but not the least, author/speaker/teacher also explains international events (like Facebook outage) as an example to let other people understand the concept behind the scene.
    > Even though few videos are long enough but they are very engaging, you will never feel bore.
    So thank you once again for distributing clear and concise knowledge. God bless you.

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      Thanks for the thorough feedback and the kind words, Santosh. That is kind of you to say!
      You're very welcome, I'm so happy you've found a lot of value from this channel =)

  • @wwolfram33
    @wwolfram33 Před 2 lety +1

    This is a great lesson. Thanks Ed!

  • @lahmeurayoub6106
    @lahmeurayoub6106 Před 2 lety +2

    the way your break down things and make them simpler is mind blowing, thanks for sharing with us this video.

  • @adrianairda
    @adrianairda Před 2 lety +1

    Very informative and easy to understand, thank you

  • @hosseinshourabi398
    @hosseinshourabi398 Před rokem +1

    Very well explained.
    Thanks Ed.

  • @rafay1708
    @rafay1708 Před 2 lety +1

    thank you Sir. I love the way you explain. Like always perfect, waiting for next Video.✌

  • @user-iw7wr5yk1d
    @user-iw7wr5yk1d Před 9 měsíci

    thank you very mach for best working

  • @sunyatalove
    @sunyatalove Před rokem +1

    Very good explanation . Am working with symmetric and asymmetric encryption libraries in telecoms systems without knowing the internals. This video gives a really clear explanation

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      Glad these helped you, Kevin. If the work involves SSL/TLS in any way, I'm sure your employer would happily fund the full Practical TLS course =).

    • @sunyatalove
      @sunyatalove Před rokem +1

      @@PracticalNetworking Yes i will enroll for sure

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      @@sunyatalove Excellent. Looking forward to having you in class =)

  • @adnanfaridi
    @adnanfaridi Před rokem

    Better than many books sold on the market.

  • @lallu1122
    @lallu1122 Před rokem

    Great work-

  • @utoobbott8817
    @utoobbott8817 Před 11 měsíci +1

    I have shared your video with my friends!! Excellent video!!!!!

    • @PracticalNetworking
      @PracticalNetworking  Před 11 měsíci

      Thank you kindly, Uto. Thank you for supporting the channel with shares =).

  • @silverbell6160
    @silverbell6160 Před rokem +1

    Excellent! Thank you!

  • @IliyaDamyanov
    @IliyaDamyanov Před 7 měsíci +1

    This is very good video.

  • @ROckOn66000
    @ROckOn66000 Před 9 měsíci +1

    You are amazing. May ALLAH (GOD) gives you success. You explained the complex things into simple and understandable words.

  • @robertapalmert
    @robertapalmert Před rokem

    Thank youu!

  • @NW-lj6oo
    @NW-lj6oo Před 2 lety +1

    Excellent and simple explanation.

  • @TotallyNotAuroras2ndChannel
    @TotallyNotAuroras2ndChannel Před 6 měsíci

    Nice. This is more than what I learned in my Master's cryptography course. LOL. No wonder college is nor worth it anymore.

  • @haroldhale3964
    @haroldhale3964 Před 2 lety +1

    Thank you.✌🏾

  • @xcelnt2000in
    @xcelnt2000in Před 2 lety +1

    Very well explained...Thanks

  • @realnanact
    @realnanact Před 2 lety +1

    Very informative. Keep it up.,Sir.

  • @adedejiemmanuel1
    @adedejiemmanuel1 Před 2 lety +1

    Another great video. Thank you

  • @runner4102
    @runner4102 Před rokem +2

    Thanks!

  • @randyg666
    @randyg666 Před rokem +1

    Man this was great!!!!

  • @NikhodeCastro
    @NikhodeCastro Před měsícem

    Hi! I have something to ask, if the Symmetric Encryption called Caesar Cipher can I know what method called for Asymmetric Encryption?

  • @JordanScanlon
    @JordanScanlon Před 6 měsíci

    It will be interesting to see how quantum computing affects the industry.

  • @dalao3
    @dalao3 Před rokem +1

    You are excellent ...

  • @TotallyNotAuroras2ndChannel
    @TotallyNotAuroras2ndChannel Před 6 měsíci

    Aaaah public vs private greatly explained.

  • @NikhodeCastro
    @NikhodeCastro Před měsícem

    Hi! I have something to ask, if the Symmetric called Caesar cipher, can I know what is called for Asymmetric?

  • @a143r
    @a143r Před 2 lety +1

    Excellent we need more videos

  • @blackberry9283
    @blackberry9283 Před měsícem

    Please explain Chiper Text Expansion ?

  • @Gerry_Raserole
    @Gerry_Raserole Před 9 dny

    Nice 1....I should have been here earlier!!!

  • @jonathannagy786
    @jonathannagy786 Před rokem +2

    At 8:07, the data is encrypted with the public key to be later decrypted with the private key. What is it that prevents someone from decrypting it with the public key?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      Answered around 6:00~ -- the math features trap door algorithms which can only go one way. Knowing the public key does not let you decrypt the content back into clear text.

  • @davinderkumar903
    @davinderkumar903 Před 5 měsíci

    Wow, thanks :)

  • @yadgayan
    @yadgayan Před rokem +1

    what if user use asymmetric encrypt key to decrypt pkt? or we cnt decrypt with with encrypt key?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      The key itself is completely different. You won't be able to decrypt with an asymmetric key something that was encrypted with a symmetric key.

  • @duggy2114
    @duggy2114 Před rokem +1

    How can we have 'h' in the cipher "khoor" when we shift forward the letters in the word hello by 3 positions for symmetric encryption? Shouldn't the result be "knqqt"?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      Hrmm... how are you getting N / Q / T for the letters E / L / O? By my calculation, shifting 3 from E / L / O gets H / O / R

    • @duggy2114
      @duggy2114 Před rokem

      @@PracticalNetworking Thanks! I misunderstood because I thought my current position will be used as a point of reference instead of the letters in the message.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem +1

      @@duggy2114 There it is ;) GLad you figured it out now! Cheers, Duggy!

  • @nocare3356
    @nocare3356 Před 2 lety +1

    Iam learning this lesson today…. CZcams algorithm is cryzy 😜

  • @vanweldenpaul
    @vanweldenpaul Před 3 měsíci

    Hello, diffie-Hellman is not a asymmetric ecrypition algorithm. It is a key exchange algoritm. Paul

  • @menofy22
    @menofy22 Před 3 měsíci

    WDF TPD What does it mean ?

  • @basmamjouel2893
    @basmamjouel2893 Před rokem +1

    i didn't quite undertsand why not move backwards with the asymetric encryption.

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Asymmetric Math uses trap door functions that can only be done in one direction.
      Actually, when I talked about TLS with David Bombal, I provided an example of the "can't go backwards" with Asymmetric encryption. The exact portion starts around the 12 minute mark in this video: czcams.com/video/25_ftpJ-2ME/video.html

  • @SpencerBoucher
    @SpencerBoucher Před 2 lety +1

    Nice

  • @Don-Carillo
    @Don-Carillo Před 2 lety +1

    Thanks 😊.

  • @prasadfalke376
    @prasadfalke376 Před 2 lety +1

    This person is god.

  • @Nunesi
    @Nunesi Před rokem +1

    👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻❤️

  • @ahmetkarakartal9563
    @ahmetkarakartal9563 Před 15 dny

    THANK YOU SO MUCCCHHH, I WİLL BUY YOUR COURSES IF I HAVE MONEYYYYY

  • @skeletron9505
    @skeletron9505 Před rokem +1

    el barto was here

  • @Gorlung
    @Gorlung Před 5 měsíci

    Still unclear. Why an attacker couldn't take the public key (5) and decrypt the "hello" going back and not forward, ignoring the asymmetric decryption algorithm?

    • @grandevalpha
      @grandevalpha Před 24 dny

      For the symetric one? The key is shouldnt be sent together with the data itsel

  • @shanebutler9876
    @shanebutler9876 Před 7 měsíci +1

    Thanks!

    • @PracticalNetworking
      @PracticalNetworking  Před 7 měsíci

      Thank you for supporting the channel, Shane.

    • @shanebutler9876
      @shanebutler9876 Před 7 měsíci +1

      It is by far the best content I have ever come across bar none in this space, keep the content coming 🤩🤩🤩

    • @PracticalNetworking
      @PracticalNetworking  Před 7 měsíci

      @@shanebutler9876 =) I'll do my best.
      If you enjoyed this video, consider the full TLS course. It's the same quality instruction covering the entire TLS ecosystem =).