Тёмный

Asymmetric Key Cryptography 

Computer Science (Kevin Drumm)
Подписаться 216 тыс.
Просмотров 11 тыс.
50% 1

This video is about asymmetric key cryptography; an extremely important aspect of computer science and cyber security. It covers the fundamental principles of asymmetric key cryptography, including the use of a public encryption key and a private decryption key. It explains that this concept is behind the RSA algorithm, something that is essential for secure communications over the Internet.

Опубликовано:

 

5 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 19   
@billchen4923
@billchen4923 3 года назад
You really explain such a hard topic so clearlly and logically. I got it after watching this video.
@bowesterlund3719
@bowesterlund3719 3 года назад
Yes! Finally! The key aspect (pun intended) that the other explanations lack is in the order the public keys are exchanged. Thank you sir!
@frogspawn8
@frogspawn8 5 лет назад
BEST EXPLANATION EVER!!!
@ComputerScienceLessons
@ComputerScienceLessons 5 лет назад
THANKS. :)
@avinashpowar8768
@avinashpowar8768 2 года назад
best video which clear the confusion between symmetric and asymmetric encryption technique
@ComputerScienceLessons
@ComputerScienceLessons 2 года назад
Thank you :)KD
@crapgazm
@crapgazm 4 года назад
You channel is the best. Keep up the good work.
@ComputerScienceLessons
@ComputerScienceLessons 4 года назад
Thanks. You are too kind :)KD
@himanshisharma5225
@himanshisharma5225 4 года назад
Finally Understood it! Thanks a lot sir!🙂
@ComputerScienceLessons
@ComputerScienceLessons 4 года назад
You're very welcome :)KD
@joandaniel7916
@joandaniel7916 Год назад
Thank you for explained broo
@ComputerScienceLessons
@ComputerScienceLessons Год назад
You're welcome :)KD
@miguel19892509
@miguel19892509 4 месяца назад
thank you so much
@kingtut6619
@kingtut6619 4 года назад
What is the difference with how keys are exchanged versus when digital signatures are being used?
@xigbar7637
@xigbar7637 5 лет назад
Can you make a guide on cyber security?
@ComputerScienceLessons
@ComputerScienceLessons 5 лет назад
I'm going to do a few more videos on symmetric key cryptography including the basics for the Feistel cipher, and I plan to do a pencil a paper version of RSA for more advanced students.
@taipizzalord4463
@taipizzalord4463 3 года назад
@@ComputerScienceLessons Yes please a guide on cyber security would be much loved.
@amirrezaa974
@amirrezaa974 4 года назад
But isn't it possible for bad guys to intercept the message and use the public key that was sent to generate their own message and send it to receiver, if so, how can you trust that the message was sent?
@ComputerScienceLessons
@ComputerScienceLessons 4 года назад
Good question. The answer is digital certificates. See the next video in the series. :)KD
Далее
Digital Signatures and Digital Certificates
11:22
Просмотров 180 тыс.
Тренд Котик по очереди
00:10
Просмотров 302 тыс.
Symmetric Key Cryptography: The XOR Cipher
7:46
Просмотров 36 тыс.
Asymmetric Key Cryptography: The RSA Algorithm by Hand
10:08
Cryptography: Crash Course Computer Science #33
12:33
Просмотров 839 тыс.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
SHA: Secure Hashing Algorithm - Computerphile
10:21
Просмотров 1,2 млн
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 346 тыс.