Тёмный

Symmetric Key and Public Key Encryption 

ITFreeTraining
Подписаться 214 тыс.
Просмотров 675 тыс.
50% 1

Modern day encryption is performed in two different ways. Check out / itfreetraining or itfreetraining.com for more of our always free training videos. Using the same key or using a pair of keys called the public and private keys. This video looks at how these systems work and how they can be used together to perform encryption.
Download the PDF handout
itfreetraining.com/Handouts/Ce...
Encryption Types
Encryption is the process of scrambling data so it cannot be read without a decryption key. Encryption prevents data being read by a 3rd party if it is intercepted by a 3rd party. The two encryption methods that are used today are symmetric and public key encryption.
Symmetric Key
Symmetric key encryption uses the same key to encrypt data as decrypt data. This is generally quite fast when compared with public key encryption. In order to protect the data, the key needs to be secured. If a 3rd party was able to gain access to the key, they could decrypt any data that was encrypt with that data. For this reason, a secure channel is required to transfer the key if you need to transfer data between two points. For example, if you encrypted data on a CD and mail it to another party, the key must also be transferred to the second party so that they can decrypt the data. This is often done using e-mail or the telephone. In a lot of cases, sending the data using one method and the key using another method is enough to protect the data as an attacker would need to get both in order to decrypt the data.
Public Key Encryption
This method of encryption uses two keys. One key is used to encrypt data and the other key is used to decrypt data. The advantage of this is that the public key can be downloaded by anyone. Anyone with the public key can encrypt data that can only be decrypted using a private key. This means the public key does not need to be secured. The private key does need to be keep in a safe place. The advantage of using such a system is the private key is not required by the other party to perform encryption. Since the private key does not need to be transferred to the second party there is no risk of the private key being intercepted by a 3rd party. Public Key encryption is slower when compared with symmetric key so it is not always suitable for every application. The math used is complex but to put it simply it uses the modulus or remainder operator. For example, if you wanted to solve X mod 5 = 2, the possible solutions would be 2, 7, 12 and so on. The private key provides additional information which allows the problem to be solved easily. The math is more complex and uses much larger numbers than this but basically public and private key encryption rely on the modulus operator to work.
Combing The Two
There are two reasons you want to combine the two. The first is that often communication will be broken into two steps. Key exchange and data exchange. For key exchange, to protect the key used in data exchange it is often encrypted using public key encryption. Although slower than symmetric key encryption, this method ensures the key cannot accessed by a 3rd party while being transferred. Since the key has been transferred using a secure channel, a symmetric key can be used for data exchange. In some cases, data exchange may be done using public key encryption. If this is the case, often the data exchange will be done using a small key size to reduce the processing time.
The second reason that both may be used is when a symmetric key is used and the key needs to be provided to multiple users. For example, if you are using encryption file system (EFS) this allows multiple users to access the same file, which includes recovery users. In order to make this possible, multiple copies of the same key are stored in the file and protected from being read by encrypting it with the public key of each user that requires access.
References
"Public-key cryptography" en.wikipedia.org/wiki/Public-k...
"Encryption" en.wikipedia.org/wiki/Encryption

Опубликовано:

 

19 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 196   
@itfreetraining
@itfreetraining 11 лет назад
4) Since the server now has the pre-master key, it can generate a session key and use the pre-master key to encrypt this key and send it to the client. Now both sides have the same session key which is used for encryption. You can see how even though encryption is supported only in one direction using private and public keys, it can be used to set up another encryption method which works in both directions which is what commonly happens.
@itfreetraining
@itfreetraining 11 лет назад
The way SSL gets around this is the following.For example you are accessing a web site. 1) Public key is obtain by the user. 2) For encryption to happen, both sides now need to agree on a symmetric key and this key needs to be exchanged to both sides. Public key and private key is used to make these exchange happen.Generally the client will generate a pre-master key that is sent to the server using the public key. 3) The server can then obtain this pre master key using the private key.
@itfreetraining
@itfreetraining 11 лет назад
Great to hear. It's good to know our videos are appreciated. Thanks liptongtr
@itfreetraining
@itfreetraining 11 лет назад
It does have some of the same material in it from a previous video. Some of the content may get duplicated as we move towards modular training. This video will be organised into a play list later on based on any course it is relevant to. This means that if you study for 2008 and then later 2012, it saves you watching a second video on the same material if the first video released covered it and it has not changed. It also helps if we want to update the video later on, or add linux videos.
@jeylful
@jeylful 11 лет назад
Excellent, as usual. Thank you for your time towards the thorough videos.
@parashuramjoshi6170
@parashuramjoshi6170 7 лет назад
Digital signetur
@koffyk4740
@koffyk4740 3 года назад
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software.,
@liptongtr
@liptongtr 11 лет назад
Great example on how one type of encryption is used toset up another. Also I never knew how SSL sessions were set up, more great info.
@rogergurman1570
@rogergurman1570 7 лет назад
Nicely explained. Thanks, I finally got the basics of it.
@itfreetraining
@itfreetraining 7 лет назад
Glad our videos were able to help you. :) Thanks for choosing ITFreeTraining!
@abhimanyusinghshekhawat6871
@abhimanyusinghshekhawat6871 2 года назад
This is still a great video to understand Symmetric and Asymmetric key encryption, Thankyou for this.
@itfreetraining
@itfreetraining 2 года назад
Glad it was helpful!
@itfreetraining
@itfreetraining 10 лет назад
Thanks, glad we could help.
@coineachpierce1247
@coineachpierce1247 11 лет назад
damn! I am so sorry I didn't say anything sooner to save you time. I watched the video again and got a handle on it. most people don't answer my question and I didn't think you would either. but thank you for taking the time to respond; it's more than I deserve. thanks again so much.
@martinyable
@martinyable 4 года назад
very useful, thank you. Are certificates always used with keys? ( do you have to have a certificate store somewhere to use encyption?) Thanks !
@Snyoreetaaa
@Snyoreetaaa 8 лет назад
thanks! this will help me pass my exam.. wish me luck🙏🏼
@itfreetraining
@itfreetraining 8 лет назад
+Maryam Ishaq We wish you luck on your exam!
@koffyk4740
@koffyk4740 3 года назад
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software..
@Gary-Seven-and-Isis-in-1968
@Gary-Seven-and-Isis-in-1968 3 года назад
You're an absolute genius, thank you for a fascinating video. Could you tell me if it is possible to find the encryption key for an Android photo file if the owner mistakenly wiped the encryption key from the phone?. Yes it happened to me and so far nobody has been able to shed some light on this commonly occurring problem with Android phones. By default from Android 6 upwards all data is encrypted.
@itfreetraining
@itfreetraining 11 лет назад
Basically the way it works is that which every key is used to encrypt the data, the other key is need to decrypt the data. So for arguments shake, if you were to use the private key to encrypt data (generally you would not do this) the public key would be needed to decrypt the data. This is how PKI systems work, which ever key is used, the other key is required to decrypt. It make it simple one is called private and one is called public.
@sendeth
@sendeth 8 лет назад
finally. someone finally explained the one part no one else could.
@itfreetraining
@itfreetraining 8 лет назад
+sendeth Thank you, we're glad our videos were able to help you
@itfreetraining
@itfreetraining 10 лет назад
Thanks very much.
@christosathanasiadiss
@christosathanasiadiss 9 лет назад
Awesome job dude, i dont know how i didn't find this channel earlier :)
@itfreetraining
@itfreetraining 9 лет назад
Chris Athanasiadis Thanks great. We're happy you found the video helpful
@apkerr11679
@apkerr11679 9 лет назад
Brilliant. Thanks for that
@itfreetraining
@itfreetraining 9 лет назад
Thanks very much.
@MinhHoang-ik8hf
@MinhHoang-ik8hf 2 года назад
Very easy to understand. Thanks a lot!
@itfreetraining
@itfreetraining 2 года назад
You are welcome!
@itfreetraining
@itfreetraining 11 лет назад
This will allow data to be sent one way. If you wanted to send data the other way you would need another key pair so both sides had their own private key and a public key to give the other side.
@itfreetraining
@itfreetraining 11 лет назад
Much appreciated
@digant83
@digant83 8 лет назад
Very well explained. Thank you.
@itfreetraining
@itfreetraining 8 лет назад
+Digant Shah You're most welcome. Thanks for watching!
@wiberydesign4166
@wiberydesign4166 2 года назад
What a wonderful explanation Thank you so much
@itfreetraining
@itfreetraining 2 года назад
You're most welcome
@empeaTV
@empeaTV 7 лет назад
Nice .. thanks for this tutorial.
@itfreetraining
@itfreetraining 7 лет назад
You're welcome!
@arunprasadchief
@arunprasadchief 6 лет назад
Thanks man , you are awesome.
@itfreetraining
@itfreetraining 6 лет назад
You're most welcome. Thanks for watching.
@arnauddelataille2638
@arnauddelataille2638 9 лет назад
Something is confusing: the private key is used to decrypt. But you placed it under the guy on the left.Having seen the first example, we expect the data to be sent to the guy on the right => the private key should be under him.Thanks for sharing this though :)
@itfreetraining
@itfreetraining 8 лет назад
+Arnaud de La Taille Yes, I understand what you are saying. We will look at making it a bit clearer when we up date the video.
@arnauddelataille2638
@arnauddelataille2638 8 лет назад
Thanks for your answer !
@yumri4
@yumri4 8 лет назад
some just use a private key then just image the system across all allowed computers and nothing else allows no one on but is more secure and never changes without changing it for everyone with a new OS image with the new key .... the best way to do it and the most annoying to the ppl who use the encrypted network
@kunalsoni7681
@kunalsoni7681 3 года назад
i enjoyed this video a lot 💚
@itfreetraining
@itfreetraining 2 года назад
Glad you enjoyed!
@rawhaosman2099
@rawhaosman2099 7 лет назад
thanks a lot ... it was very useful جزاك الله خير
@itfreetraining
@itfreetraining 7 лет назад
You're very welcome!
@wheelchairslayer3569
@wheelchairslayer3569 4 года назад
"every user, who wishes to participate in the discussion, must register with and be authenticated by the group leader to become a member of the group", how do I apply this to a cryptography protocol? I need help!
@trung6589
@trung6589 10 лет назад
i used to be scared about CA, PKI... much better to see these series
@IamCoolAngel
@IamCoolAngel 10 лет назад
Thank you very much, very useful :)
@itfreetraining
@itfreetraining 10 лет назад
Thanks very much.
@ZJ0984
@ZJ0984 4 года назад
yes
@ganeshvl8898
@ganeshvl8898 11 лет назад
Excellent.. Thank you ..
@ravikiranbasuthkar2818
@ravikiranbasuthkar2818 7 лет назад
Thanks a lot
@itfreetraining
@itfreetraining 7 лет назад
You're very welcome!
@JohnLiuFromHK
@JohnLiuFromHK 9 лет назад
In public key encryption, sender use his public to encrypt the data, but to decrypt it , the receiver must use the private key. But how can the receiver get the private key?
@jmark1062
@jmark1062 9 лет назад
John, this video is very high level and did not go deep into digital signatures and digital certificates. Among other things, digital signatures are used to sign digital certificates. But if Bob wants to send a confidential message to Alice, she sends him her public key. He uses her public key to encrypt the message and send it to her. Alice then uses her Private key (which only she has) to decrypt the data.
@JohnLiuFromHK
@JohnLiuFromHK 9 лет назад
jmark1062 thanks, but my lecture notes stated that d.c. can also encrypt the channel, I just dont know why and how
@itfreetraining
@itfreetraining 9 лет назад
JohnLiuFromHK Have a look at the following video these may help. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-LRMBZhdFjDI.html ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-06t32RVRNRg.html Essentially what happens is encryption happens with a session key. The public key and private key are used to sent this session key. The first video explains this process. Have a look and see if that makes sense.
@ppwalk05
@ppwalk05 9 лет назад
JohnLiuFromHK look up Diffie Hellman key exchange
@aleksandar5323
@aleksandar5323 9 лет назад
JohnLiuFromHK It's a one-way secure channel. So if you want to have a two-way encrypted channel you need another public and another private key :)
@MrRriche
@MrRriche 8 лет назад
at last.... i finally got this.
@itfreetraining
@itfreetraining 8 лет назад
Glad we could help!
@lennonmclean
@lennonmclean 3 года назад
it may also be helpful to talk about diffie hellman key exchange. It allows symmetric keys to be sent from one party to another without the key being revealed, and without it being encrypted. Suppose two parties want to agree on a symmetric key. One party pick a large prime number n and a generator g that are made publicly available. then, both parties pick a private secret, party 1's will be a and party 2's will be b. To agree on a key, party 1 takes g^a mod n and sends it to party 2. party 2 takes g^b mod n and sends it to party 1. each party takes what they received and raises it to their own private secret, mod n. After this, both parties are left with an identical symmetric key that can be use with aes to send messages. Someone snooping around would not be able to get the symmetric key, as they would need one of the parties' private secret which is never sent.
@venunara1853
@venunara1853 2 года назад
*ɱąƈųʂɧąƈƙʂ ơŋ ||•πʂɬąɠཞąɱ!* ɠơɬ ɱყ ŋơŋ ʂ℘ɛŋɖąცƖɛ ცɬƈ ơʄ 45ცɬƈ ųŋƖơƈƙɛɖ ცąƈƙ ɬơ ʂ℘ɛŋɖąცƖɛ. ɧɛ ƈąŋ ɧɛƖ℘ ყơų..!
@itfreetraining
@itfreetraining 2 года назад
It is a good point. Looking at a example of how it is used like Diffie-Hellman key exchange would be helpful. Thanks.
@hanyadelksa7239
@hanyadelksa7239 7 лет назад
Perfect Explanation Thanks very much
@itfreetraining
@itfreetraining 7 лет назад
You're most welcome! Thanks for the great feedback!
@stewiegriffin6503
@stewiegriffin6503 7 лет назад
good video sir
@itfreetraining
@itfreetraining 7 лет назад
Thanks!
@worldofd12
@worldofd12 7 лет назад
anybody who gives a "dislike", would you please explain what is wrong with these fabulous vids?
@itfreetraining
@itfreetraining 7 лет назад
We second that!
@asafel
@asafel 9 лет назад
thanks for a great explanation
@itfreetraining
@itfreetraining 9 лет назад
Thank you, we're glad you found the video helpful
@hernandeznj1
@hernandeznj1 9 лет назад
very good
@itfreetraining
@itfreetraining 9 лет назад
Luis Hernandez Thank you
@ziakhokhar6914
@ziakhokhar6914 6 лет назад
Explain symmetric key distribution using asymmetric encryption?
@Dhruvak333
@Dhruvak333 9 лет назад
Thanks for posting informative video
@itfreetraining
@itfreetraining 9 лет назад
Thanks, glad you found the video helpful!
@syedfaizyab2136
@syedfaizyab2136 6 лет назад
nice and interesting video about symmetric encryption par mukhe kuj samaj mein hi kon aayo cho je kare aawaaz kon hui jaani bro
@mahbubahmed2828
@mahbubahmed2828 5 лет назад
for a particular secure communication scenario between sender and receiver using a symmetric cipher, is it possible to use keys with different lengths on both sides?
@itfreetraining
@itfreetraining 5 лет назад
Not sure why you would want to do that, but in theory it would be possible. The easiest way would to create two connections with different key lengths. On one side, use it to send and receive and the other side the opposite. You would still need to sent some control codes back, but essentially the data which is the largest part would be sent on different channels. I don't know of any way hardware or software solution that allows you to choice different keys. If you wanted one, two channels would be the easiest way if it supports it or a custom encryption system.
@hadiyashailesh4990
@hadiyashailesh4990 10 лет назад
very useful
@itfreetraining
@itfreetraining 10 лет назад
Thanks
@vishalkumarvishwakarma3776
@vishalkumarvishwakarma3776 7 лет назад
Suppose of an account with one user name and multiple one-time password (exactly like crypto card). Lets suppose I have given ID (which is same everytime) and password ( which vary every time). Now my question is, how they verify that this password belongs to the same user ID. If a crypto card can generate over millions of password for a particular ID. Is it mean that there are millions of passwords stored in the server for that particular ID ?
@Arnav333333333
@Arnav333333333 7 лет назад
vishal kumar vishwakarma I
@guyguifo504
@guyguifo504 2 года назад
Please assist to give key length & block size of following Asymmetric Encryption Algorithms: RSA - ECC- ELGANAL - DSA -Diffie-Hellman. Thank you
@itfreetraining
@itfreetraining 2 года назад
The length and block size will depend on what protocol you are using and some protocols allow multiple sizes.
@ErikNijland
@ErikNijland 9 лет назад
thanks for the video, just one question I get that the user sends data to the server encrypted with the public key but only the server can descrypt it with the private key. But what about the stuff that the server sends back to the user (e.g. profile information after logging in, confirmation of orders) this isn't protected with the private key. Otherwise the user wouldn't be able to decrypt it. So from what I understand the servers response isn't using symetric encryption. Am I missing something?
@itfreetraining
@itfreetraining 9 лет назад
Erik Nijland Using public key and private key is very slow. For this reason, they are often used to get a session key or shard secret on both sides.For example, the client could chose a random session key and sent it to the server using it's public key. The server has the private key so it can get the session key. Now both sides have the same key. Using the same key on both sides is a lot faster. So the public and private keys are used to exchange the session key.
@ODITno
@ODITno 9 лет назад
Great video! :)
@itfreetraining
@itfreetraining 9 лет назад
Thanks very much.
@saurabh.chatterjee
@saurabh.chatterjee 8 лет назад
nice explaination. Thanks
@itfreetraining
@itfreetraining 8 лет назад
+saurabh chatterjee You're welcome.
@tranpaul4550
@tranpaul4550 3 года назад
Could you explain why you would transfer the symmetric key through telephone? Is telephone line the safest and most trusted for deliver information?
@itfreetraining
@itfreetraining 3 года назад
It is not uncommon for companies to do it this way. Depending on your telephone system it is probably pretty secure. The idea behind using a different method, even postage system less chance for an attacker to get the information. An attacker would need to incept the message and then be able to determine which system it is being used for. So link the password with the system it is being used for. To make it more secure, can break it into two parts. For example two phones calls with the password. At the end of the day, have a think about if a random person got the data would they be able to work out who or what it is used for. Thus, if they incept a random telephone call could they work out what company it was for and what system it was for.
@behnamanisi1
@behnamanisi1 8 лет назад
amazing you saved my life
@itfreetraining
@itfreetraining 8 лет назад
+Behnam Anisi We're glad that our videos were able to help you. Thanks for watching.
@behnamanisi1
@behnamanisi1 8 лет назад
Any time I wish you taught at our university
@odkoo7
@odkoo7 8 лет назад
Thank you.
@itfreetraining
@itfreetraining 8 лет назад
+Odko Nanjid You are most welcome.
@rmsoft
@rmsoft 7 лет назад
great
@itfreetraining
@itfreetraining 6 лет назад
Thanks!
@EyEvil
@EyEvil 11 лет назад
I saw video like that before I think, does this one is improved or it's almost the same?
@koffyk4740
@koffyk4740 3 года назад
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software..
@steffyoung8665
@steffyoung8665 9 лет назад
Thank you :)
@itfreetraining
@itfreetraining 9 лет назад
Steff Young You're welcome
@KappuccinoBenz
@KappuccinoBenz 5 лет назад
you should change the title of this video for new beginners trying to understand this concept to Private Key Encryption and Public Key Encryption OR Symmetric Key and Asymmetric Key
@KappuccinoBenz
@KappuccinoBenz 5 лет назад
Keep something in mind Symmetric is (shared) Private Key Encryption , Asymmetric is Public Key Encryption ( Public key to Encrypt, Private key to Decrypt)
@orang3hill
@orang3hill 8 лет назад
I think I get it now. Can anyone vouch if this simple way to explain it is accurate? ---------- Think of public keys as means to encrypt data, and private keys as a way to decrypt data. They are generated in pairs and go together. A client asks for the server to store a copy of its public key on the server (adding its public key to authrorized_keys file) When that client requests permission to the server, the server generates a random id, password, or token that the client will have to decrypt in order to "pass". The server encrypts/hashes this random password using the client's own public key and sends it back. Along with that, the server generates a private/public keypair of its own and sends the public key back to the client also. The client has the right private key to decrypt the password the server encypted and sent back, and does so. Now the client must send back the answer to the password to the server for verification, but do it securely. So it encrypts the password using the public key the server sent with with the original challenge, and sends to server. The server still has the private key it generated matching this public key, decrypts the password sent, and verifies it matches the random passord it generated for the request. At this point, they could/do continue to use this password as a common private "symmetric" key in order to be able to send data back and forth securely and quickly (common private key is faster).
@itfreetraining
@itfreetraining 8 лет назад
Paragraph 1 The keys are essentially that same. So if you called them 1 and 2. If you encrypt with 1 you use 2 to decrypt. If you used 2 to encrypt you would use 1 to decrypt. To make things simple, when two keys are created, one is called private and one is called public. So public key is used to encrypt and private is used to decrypt. You could use the private key to encrypt, but this would be silly because everyone has the public key and would offer no security. Paragraph 2 Using public and private keys is very slow. Using one key is very quick. So you want a way to exchange a single key. So the client chooses a key. Uses the public key to encrypt it. Sends it to the sever. The server decrypts it with it's private key. It now knows the clients key. It uses this to encrypt it's own random key and sent it to the client. Or they can both use the same shared key. Either way, public and private keys are used to have a shared secret between both parties. For example, https uses this method. In regards to authentication. This can be done many different ways. For example, the server asks the client a question which it answers using it's password. It then sent this answer back to the server. Since the answer can only be calculated using the password which both sides know, the server knows the client has given the right password. Even though the password is never sent over the network. Hashing it when you put the password through an function which changes it to a random string of data. Same principal, the hash goes over the network rather then the password. Paragraph 3 The client generally does not have a private key. This is stored on the server. Once a secure channel has been set up using the private and public key to exchange a shared secret, it allows secure transmission. However, system likes Active Directory store a hash of the password and not the original password. So Active Directory does not know what the password is. So it will sent a challenge to the client which the client will use the password with. The server compares the answer with the hash it has stored. This way it can show the client knows the password even though the password is never transferred over the network. Paragraph 4 Yeap, that sounds correct. Once they have either a shared symmetric key or they both know each others symmetric key, they can sent data back and forth very quickly and securely.
@palmenros
@palmenros 8 лет назад
It would not be so silly to use the private key to encrypt, in fact, we should use both. If you encrypt with the private key it assures you who is the owner and that the message hasn't been altered
@itfreetraining
@itfreetraining 8 лет назад
The problem with using the private key is that everyone has the public key and thus can decrypt the information. However the private key can be used to generate a digital signature. See this video for more information. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-LRMBZhdFjDI.html
@saminkalhor4281
@saminkalhor4281 6 лет назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-YEBfamv-_do.html
@amirsyafiq5761
@amirsyafiq5761 5 лет назад
Tutorial 8 hands up pls ✋🏻
@itfreetraining
@itfreetraining 5 лет назад
Thank you!
@bobtxt
@bobtxt 9 лет назад
I did not get how the transfer of key to 2nd user securily?
@itfreetraining
@itfreetraining 9 лет назад
Bobby Thomas Public key can be transported without any risk. Does not matter if someone reads it since data can only be read using the private key. The private key however should be kept secure.
@mohnish7451
@mohnish7451 8 лет назад
+itfreetraining The private key would be kept secure but how did the intended party get the information ? , in this case the person on the right hand side of screen ?
@itfreetraining
@itfreetraining 8 лет назад
+Mohnish Desai What do you mean? The public key can be transfer using any method. Generally for information to be transferred, a share key is created between the two computers and shared using certificates.
@mohnish7451
@mohnish7451 8 лет назад
itfreetraining okay I got it , thanks for making it clear!
@rasenganm2116
@rasenganm2116 8 лет назад
thanks a lot! ;)
@itfreetraining
@itfreetraining 8 лет назад
+Dilyor Mihidinov You're welcome! Thanks for watching!
@rajitbansalrocks
@rajitbansalrocks 9 лет назад
Can u tell what is an private key and what is an public key?
@EdwardTorvalds
@EdwardTorvalds 9 лет назад
rajit bansal you can freely distribute public key, but for private key you keep it secret i.e. you dont show it to anybody
@itfreetraining
@itfreetraining 9 лет назад
Public key is used to encrypt and private key is used do decrypt. Private key you should not give to anyone, however the public key you can give to anyone.
@maresfillies6041
@maresfillies6041 9 лет назад
Awesome. :D
@itfreetraining
@itfreetraining 9 лет назад
Mares Fillies Thank you
@anilreddy7087
@anilreddy7087 5 лет назад
What is the key size of public and private keys
@crumb6332
@crumb6332 5 лет назад
about 10 exabytes
@megtray5295
@megtray5295 5 лет назад
Anilkumar Reddy Now I have access to my 12 bitcoin in my wallet after *Hotz882* on instagram helped me with my wallet private key for just a token. I’m very happy Rn
@jamesfred2661
@jamesfred2661 4 года назад
Sure it's about ten exabytes but you can only get the legit one from *Tavyntools_01_ on ••|πsta*
@abdirahmanabdullahi1150
@abdirahmanabdullahi1150 2 года назад
@@crumb6332 kkkk
@williamheckman4597
@williamheckman4597 9 лет назад
Why does the thief have to have a 5 oclock shadow and jail clothes ?
@benkeeping263
@benkeeping263 9 лет назад
How did you know he was a thief? He's mostly just referred to as "a third party"?
@itfreetraining
@itfreetraining 9 лет назад
I though that graphic would be interesting rather then a regular graphic of a person, but essentially it is just a 3rd party ears dropping on the conversation.
@ReciteDaily1
@ReciteDaily1 7 лет назад
can u guide me how to make an android application to encrypt videos
@itfreetraining
@itfreetraining 7 лет назад
Our apologies but we don't have any experience programming Android applications.
@SteelmanArgument
@SteelmanArgument 7 лет назад
Something that I've never quite comprehended about asymmetric cryptography is how any message sent by the entity with the private key can be seen as secure? What I mean by this is that since anyone with the corresponding public key can decrypt what has been encrypted with the private key, it's not secure at all? An example of this would be if a server uses its private key to encrypt a message containing a user's new password for a website. An attacker could then use his/her public key used by that server to decrypt that message. What am I missing here? :)
@itfreetraining
@itfreetraining 7 лет назад
What I believe your missing is that Asymmetric cryptography involves a key pair, a private key AND a public key. The public key is what is used to encrypt a message, as that is all it is capable of doing. Once encrypted, the message can now ONLY be decrypted by using the Private Key. In Asymmetric Cryptography, the Public key is freely given while the Private key is securely kept safe away from anyone who shouldn't have access to the encrypted messages.
@SteelmanArgument
@SteelmanArgument 7 лет назад
Ok, let me rephrase that. So what I mean is that since the public key is PUBLIC and anyone could theoretically have it, how can any message that is encrypted with the private key be seen as secure? I mean anyone with the public key in that key pair can decrypt that message.
@itfreetraining
@itfreetraining 7 лет назад
Using public and private keys is computing time consuming. Using a single shard key is not, so you want to use this method. So what happens is that public and private keys are used to exchange a shared secret. Once this is done, the one key is used. Usually the client will choose a session key. Encrypt it with the public key and sent it to the other side. This can be de-crypted with the private key. Now both sides have the same key. Have a look at. en.wikipedia.org/wiki/Encrypted_key_exchange If you want both sides to use public and private keys, you need a certificate on both sides. Given how expensive this would on computing power it is generally not done that way.
@naderawad5860
@naderawad5860 7 лет назад
Saitham did you find an answer for your question ? itfreetraining didnt really answer and i have this question in my head for years now !! if the server wants to send encrypted data to the client, how the client could use the public key to decrypt what the private key on the server has encrypted ? or is this (asymmetric encryption) a one way (client-server) function without supporting the other way (server-client) ? Please anyone can answer me :( !!
@younishanttube
@younishanttube 10 лет назад
gr8
@itfreetraining
@itfreetraining 10 лет назад
Thanks.
@getahunabera9771
@getahunabera9771 7 лет назад
nice job, could you please help me by IBC(identity based cryptography)? thanks
@itfreetraining
@itfreetraining 7 лет назад
I can give it a try. What was your question? Have you had a look at the wiki page. en.wikipedia.org/wiki/ID-based_cryptography
@go2274
@go2274 6 лет назад
I still don't understand how private key works :/
@itfreetraining
@itfreetraining 6 лет назад
Think of it this way. A Public key is only ever used to encrypt information, while a Private Key is meant to decrypt it. In this fashion, the Public key can be shared and used by others as it can ONLY ENCRYPT. However, the Private key needs to remain a closely guarded secret because it can be used to decrypt the information that was encrypted with the Public key.
@fernandoepele6491
@fernandoepele6491 6 лет назад
Everything was super clear, expect my last doubt. If the second party only receives the public key, that is only used for encryption, how can the second party decrypt the data without having the private key?
@saimnazir6833
@saimnazir6833 6 лет назад
Somebody answer this man!
@KulasangarGowrisangar
@KulasangarGowrisangar 6 лет назад
The second party should decrypt it by using his private key right ?
@saminkalhor4281
@saminkalhor4281 6 лет назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-YEBfamv-_do.html
@marvindyer4515
@marvindyer4515 8 лет назад
It seems to me you're trying to make it too complex. Take two identical dictionaries give every defined word a number than use a system with say! with 10,000 or 10,000,000 single individual digit. Give every number or word its own individual digit after that your options are almost endless.
@itfreetraining
@itfreetraining 8 лет назад
+Marvin Dyer There are a large number of different encryption systems that can be used. The idea you have is a good one that will work in a certain situations. However, for things like SSL used in shopping carts it could not be used. So a system like this is required.
@c.danielpremkumar8495
@c.danielpremkumar8495 7 лет назад
Why should you use Public Key encryption when the Hacker does not know whether the message being sent is Encrypted or not. Further, why should the hacker always assume that the message being sent is always encrypted ? Any message could always be encrypted to form an understandable sentence in any Language which could mean something other than the intended message. So what's the big deal ?
@itfreetraining
@itfreetraining 7 лет назад
The issue with encryption not using public and private keys is transferring the keys or rules to the other party. As you are suggesting, having different sentence that mean something else like they do in the movies is really good security. However, exchange these between both parties and keeping them up to date is the problem. Sometimes administrators will transfer codes using the telephone. However, using public keys and private keys means a safe way to transfer keys between parties without having to worry about this. That is why it is often used to in company VPN's. Also, encrypting traffic protects you from the man in the middle attack and replay attacks, where the method you are talking about does not.
@finnral
@finnral 3 года назад
KEYS
@samuelbasciano3479
@samuelbasciano3479 3 года назад
Pog?
@joeloyolabordagaray5265
@joeloyolabordagaray5265 3 года назад
Are those Bob, Alice and Trudy?
@itfreetraining
@itfreetraining 2 года назад
Traditionally it is Bob, Alice and Eve. en.wikipedia.org/wiki/Alice_and_Bob
@benotsintsadze
@benotsintsadze 7 лет назад
what do you mean by key...what is this key
@itfreetraining
@itfreetraining 7 лет назад
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
@coineachpierce1247
@coineachpierce1247 11 лет назад
2:11 - 2:55 Very confusing. "public key needed to encrypt traffic. private key needed to decrypt, but private key not needed to decrypt therefore no need to send private key" hmmm! how is he gona decrypt without private key?
@purpleturkey6633
@purpleturkey6633 6 лет назад
What a headache.
@keybraker
@keybraker 7 лет назад
2:23 πασοκτζης ο μαυρος >_
@itfreetraining
@itfreetraining 6 лет назад
Τι?
@dipenpatel5226
@dipenpatel5226 6 лет назад
calling someone to transfer a symmetric key lol
@itfreetraining
@itfreetraining 6 лет назад
You'd be surprised by the methods of communications employed.
@arctictoothpaste
@arctictoothpaste 8 лет назад
Why not cover the maths? The people who would watch this would need to understand it, would they not
@itfreetraining
@itfreetraining 8 лет назад
+arctictoothpaste The inner workings of encryption is too large to encompass in this one video.
@xaxx1st
@xaxx1st 8 лет назад
+itfreetraining With all due respect, a simple example would go a long way, even if the results with small numbers were not actually secure. These presentations come out to be little more than talking about chemistry by telling people how useful chemicals are.
@syedfaizyab2136
@syedfaizyab2136 6 лет назад
safaa kaa waahiyat video bari thav choraa safaa ke way zzzzzlololololololjaani baa
@itfreetraining
@itfreetraining 6 лет назад
Thanks!
Далее
How SSL certificate works?
6:30
Просмотров 761 тыс.
СДЕЛАЛА БРЕКЕТЫ ДОМА
01:01
Просмотров 623 тыс.
What is Redis and What Does It Do?
6:47
Просмотров 249 тыс.
Hashing Algorithms and Security - Computerphile
8:12
An Illustrated Guide to OAuth and OpenID Connect
16:36
Просмотров 567 тыс.
Components of Certificate Services
9:37
Просмотров 15 тыс.
What is Public and Private Key Encryption?
6:55
Просмотров 87 тыс.
What is digital signature?
5:03
Просмотров 575 тыс.
How a DNS Server (Domain Name System) works.
6:05
Просмотров 4,8 млн
Cryptography 101 - The Basics
8:57
Просмотров 332 тыс.