Тёмный

What is Public and Private Key Encryption? 

Programming w/ Professor Sluiter
Подписаться 101 тыс.
Просмотров 89 тыс.
50% 1

Опубликовано:

 

13 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 80   
@ricardo_alonzo
@ricardo_alonzo 3 года назад
I have to say, I watched some of your videos on WCF during my last quarter and they were super helpful. I'm glad you've made videos on this topic as well, because now I have a cripto class to prepare for! Thank you!
@myajayb
@myajayb Год назад
Very simple and elegant explanation. Love it.
@shadsluiter
@shadsluiter Год назад
Thank you!
@NajaraBonassi
@NajaraBonassi Месяц назад
Appreciate the detailed breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). How should I go about transferring them to Binance?
@shmoo42
@shmoo42 2 года назад
I randomly found this video while working on my essay for Communications in Grand Canyon University!
@BenEverett1
@BenEverett1 2 года назад
How about adding a link to the next video in the comments? Otherwise, I can't find it. It should also be explained that public and private keys are generated together and they are mathematically related to one another. A public can't be used to derive the private key and vice versa. Without telling the view that, the viewer will never quite understand how the keys can work and be secure.
@adrianavargova
@adrianavargova 2 года назад
That is why I was left puzzled. I still do not understand how I obtain that private key? And how do I use it in real life as a general user? I do not get it.
@ggo4844
@ggo4844 2 года назад
Very smooth explaination. I was confused before I watched the video, but then all became clear. Just a question came to my mind while reading the comment. Do my friend and I have to have the same tool of encryption or everyone can have his own tool. Thank you,
@kaushikdr
@kaushikdr 3 года назад
Wonderful video! I am still a bit confused about how using a public/private key solves the problem of having your key stolen in transfer? Even if I share my public key to the entire world, when I send an email to someone, they have to have the right private key to open it. Don't I have to give them the private key ahead of time? Also, what is the point of even knowing the sender's public key and putting it globally for decrypting a message? The only thing that should matter is the private key, right?
@shadsluiter
@shadsluiter 3 года назад
Each person has his/her own private key. You never share the private key. The encryption has to include the recipient's username when encrypting the document. Here is a demo of how to use GPG ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-FLZLVqceAeA.html
@yapayzeka
@yapayzeka 3 года назад
when I lock the message with privkey and send to world -> it proofs the message comes from me when they can unlock the message with my pubkey. when someone want to send me secret message they lock the message with my pubkey and send to me -> only I can open it with my privkey.
@robertiglehart
@robertiglehart 2 года назад
You need to think differently. You are thinking "backwards". If you want to send someone else an encrypted email for them to open, THEY need to send you their public key. They need to take the initiative and create a private/public key and send you the public.
@adrianavargova
@adrianavargova 2 года назад
@@robertiglehart No, I understood the Alyeska's question totally. It is not because we think backwards. Probably it was not explained thoroughly. So my emails are not encrypted at all? And if I want to send an encrypted message, the recipient must generate some keys? So the recipient has to have some special software? Sorry, I am asking as an amateur, who does not get the point.
@muhammadali8105
@muhammadali8105 Год назад
Hi. If you say, the answer to the question, whether governments should be able to check communication is always "no", then this would be the end of criminal investigation, which I think is not what you really want, right? With respect to terror, Putin, China, white-collar-crime, interner-fraud, child pornography etc. public authorities MUST not be excluded from any communication media.
@mustarikulislam719
@mustarikulislam719 3 года назад
Thank you so much, sir. It helped me out.
@shadsluiter
@shadsluiter 3 года назад
Glad it helped. Let me guess. You are studying in a computer science program.
@mustarikulislam719
@mustarikulislam719 3 года назад
@@shadsluiter no sir, I am enrolled in a BBA program :'3
@exodus8213
@exodus8213 Год назад
I would like to know is there a way to know if a public keys private key is odd or random
@lukakavteli9441
@lukakavteli9441 3 года назад
i don't get it like u can encrypt with the public key but how he decrypts with his private key if i did encryption? when i havn't sent any password? how i allow my friends privet keys to decrypt it?
@SangHostler
@SangHostler 22 дня назад
You make wonderful videos! 👏 Need some advice: 🙏 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). What is this? 🤔
@kavinyudhitia
@kavinyudhitia 2 года назад
This is crazy helpful. thanks a lot!!
@anngelnailsnailartist106
@anngelnailsnailartist106 3 года назад
Wow thxxxxx !!!! Really good explanation
@thawfeekyahya007
@thawfeekyahya007 3 года назад
Nice Explanation. Thanks
@koffyk4740
@koffyk4740 3 года назад
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software.
@yapayzeka
@yapayzeka 3 года назад
0:45 image is misleading. open and lock goes both ways.
@DataVids
@DataVids 2 года назад
Great video Shad. Well done
@TINTUHD
@TINTUHD 2 года назад
Great video. Question: How does the public key know which private key will work? Since it never knows the private key.
@chadsexinton
@chadsexinton 2 года назад
I wanna know the same thing. I can't grasp that part.
@TINTUHD
@TINTUHD 2 года назад
@@chadsexinton my guess it has to do with zero knowledge proof but I haven't seen it tied directly to this :(
@Rituraj..
@Rituraj.. 2 года назад
Because the Public and Private key are generated in pair. Only that Private key will work that was associated with the public key you used to encrypt the msg.
@dpky7333
@dpky7333 2 года назад
@@Rituraj.. So the public key is not really a key, rather it is the lock or tumbler pin set, to continue the analogy?
@Rituraj..
@Rituraj.. 2 года назад
@@dpky7333 yes, you can say that. It is used in encryption.
@matiastrane7598
@matiastrane7598 2 года назад
Very good description! I understand it like this: My friend, that wants to send me an encrypted message, creates the message which is the reason it doesn't need to be encrypted, yet. Then he wants to send it to me over the internet, which would require encryption for it to be private. I create public and private keys and provide him with the public key, so he can encrypt it and i can decrypt it with the private key. Is this correct? If so, i have a follow-up question: For me an my friend to be able to send encrypted messages to each other, we would both need a set of public and private keys, right?
@ggo4844
@ggo4844 2 года назад
Yes right.
@robertbaindourov134
@robertbaindourov134 3 года назад
Great video!
@shadsluiter
@shadsluiter 3 года назад
Thanks for the visit
@Michelle-jc6gr
@Michelle-jc6gr 2 года назад
Thank you! This was great!
@arjumandvillagelife
@arjumandvillagelife 3 года назад
really nice well explained i
@sssapss
@sssapss 2 года назад
Ok what about the privat key how they havit i need explanation for private key
@amitchauhan1505
@amitchauhan1505 3 года назад
Thanks Respected Prof. I could not find its next video. Can you point me to it and its playlist? At the end you were decrypting the message, i want to see what happened next.
@shadsluiter
@shadsluiter 3 года назад
Here is the playlist for the Information Security course. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-V11uOQaFotQ.html
@iliassaek4609
@iliassaek4609 3 года назад
Very clear thank you
@emmanuelevuazeze4729
@emmanuelevuazeze4729 4 года назад
Thank you prof
@mermaidinclouds
@mermaidinclouds 3 года назад
Well, where I really don't agree with the government keeping a third-eye on our data, I do see a point where it is required to surveillance terrorism activities, given, government don't turn to use data for their own purpose without an agreement.
@DeputyDawgAtl
@DeputyDawgAtl 3 года назад
Ok what i'm still tripping on (Using Alice and Bob in my example) - I get that Bob's public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i'm fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom - again he uses his public key to encrypt. Tom uses his private to decrypt - how is Tom's key linked? I'm missing something super basic here. Any help appreciated
@johsonfredrick7226
@johsonfredrick7226 3 года назад
Contact Hackcell_r on Instagram I guarantee his services
@DeputyDawgAtl
@DeputyDawgAtl 3 года назад
@@johsonfredrick7226 tried but can’t find him on IG. Can u confirm spelling please. Or a direct link? Thsnks
@johsonfredrick7226
@johsonfredrick7226 3 года назад
@@DeputyDawgAtl OK, Try this message him on his mailing account. At *Rexspeedhacks@gmail.* Com His Instagram ID is correct *Hackcell_r*
@SoulXample
@SoulXample 3 года назад
Bob doesn’t use his public key to encrypt he uses Alice’s if I understand correctly
@SoulXample
@SoulXample 3 года назад
When I send a message to someone I encrypt it with their key (public) so they can unlock it with their private key and it is secure because although it is public it can only ever lock/encrypt not unlock/decrypt.
@youtwolobote5288
@youtwolobote5288 4 года назад
Good sir
@thunderstruckx996
@thunderstruckx996 3 года назад
What the hell is wrong with the comment section??? Thx for the video btw)
@silverjohnson3163
@silverjohnson3163 4 года назад
doesn't really explain how it works, more of how to use it.
@thehumanitychannel1226
@thehumanitychannel1226 3 года назад
@@funsoolajuwon218 how?
@shadsluiter
@shadsluiter 3 года назад
See this example ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-FLZLVqceAeA.html
@ravindramg007
@ravindramg007 2 года назад
Explaining main objective of how receiving party decrypt and Read the message is not explained pictographically.... how recipient gets Private key to decrypt ..? If recipient generates his own Private key to unlock using public key he received.... why anyone else cant do the same .. ? The way you used to explain the problems of Symmetric Encryption.. same approach should have been used to explain how recipient decrypt and explain without using program so anyone can understand .. failed video..
@ravindramg007
@ravindramg007 2 года назад
Somewhere else I understand this which makes logical ... The Recipient of the message first generates Mathematically related Public-Private keys. Recipient keeps private key himself and publishes only Public key and tell all senders to use public key to encrypt message sends to him. So sender use this to Encrypt and send message and since Recipient already have Private key and uses it to Decrypt. This way no one else except the recipient can Decrypt message once it is encrypted .. even sender cants decrypt .... Hope this makes logical ...
@stevenwang194
@stevenwang194 2 года назад
why cannot you just to the point? the first several minutes are wasting time. but when talk about public key part, you jus skip and directly to example!
@venunara1853
@venunara1853 3 года назад
*ɱąƈųʂɧąƈƙʂ ơŋ ||•πʂɬąɠཞąɱ!* ɠơɬ ɱყ ŋơŋ ʂ℘ɛŋɖąცƖɛ ცɬƈ ơʄ 45ცɬƈ ųŋƖơƈƙɛɖ ცąƈƙ ɬơ ʂ℘ɛŋɖąცƖɛ. ɧɛ ƈąŋ ɧɛƖ℘ ყơų..
@StudioFourHundred
@StudioFourHundred 2 года назад
I don’t think he explained this well tbh.
@charlotteharris6217
@charlotteharris6217 4 года назад
Tabbyhacks on !nsta got my private key ready
@urlajuwonfunso5044
@urlajuwonfunso5044 3 года назад
*Ronaldhacks01_ on €€|πsta* got me an active Private key he can help you
@stevenwang194
@stevenwang194 2 года назад
totally waste time, do not watch this one
Далее
Hashing vs Encryption Differences
19:38
Просмотров 170 тыс.
А я с первого раза прошла (2024)
01:00
When Khabib dropped Conor McGregor 👀 #nocommentary
00:59
Why Cybersecurity Training is a SCAM
10:37
Просмотров 195 тыс.
SSH Keys
10:12
Просмотров 117 тыс.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
AES: How to Design Secure Encryption
15:37
Просмотров 165 тыс.
Public Key Encryption (Asymmetric Key Encryption)
5:06
RSA algorithm step by step example
20:41
Просмотров 107 тыс.
How One Line of Code Almost Blew Up the Internet
13:47