Private Key Encryption (Symmetric Key Encryption)

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hello this is sunny welcome back today my topic is private key encryption in private key encryption data is encrypted by one single key which singer and receiver know that's why private key encryption is also called symmetric key encryption because a single key is used during the both encryption and decryption of data here is an example tom is any lovely message to Mary and he doesn't want anyone else to see it he wants both promise and a promising he wants to encrypt his message well that's easy because Tom shared the same key with Mary they will use the same key during the encryption and decryption of the data here is how it works first Tom uses his key to encrypt his message now his message is encrypted to scrambled data no one can read it we Mary gets the encrypted message she used the same key to decrypt his message so she can read it in plaintext what happens next do they get married and live happily ever after I don't know but at least Mary knows what a tongue says plain and clear next I will talk about two methods of a symmetric key encryption the first method is stream cipher stream cipher works a single bit at a time it encrypts a data on the fly bit by bit this method is not much used in the modern cryptography rc4 is the most widely used of all stream ciphers particularly in software a block cipher is an algorithm operating on fixed lines that will broke through abyss called blocks it encrypts the data in certain length not bit by bit when data comes in data comes in chunks the usual size of each block are 64 bits 128 bits and a 256 bits some notable block ciphers include ds3 for DES idea RC v AES and a Blowfish and just to name a few probably the key encryption is a simple encryption method because both parties are used one single key is easy to use but it has a disadvantage the biggest problem with private key encryption is that you need to have a way to get the key to the party with whom you are sharing data if someone gets their hands on the key they can decrypt everything encrypted with that key if the private key encryption is used for two ways communications it means both the sides of conversation will get compromised you may ask is there any alternative to probably the key encryption the answer is yes it is public key encryption which is another story in another video thank you very much and see you next time [Music]
Info
Channel: Sunny Classroom
Views: 89,409
Rating: 4.9689121 out of 5
Keywords: networking, cybersecurity, security+, networking +, cyber threats, cyber defense, IoT, Wi-Fi security, private key encryption, symmetric key encryption, sunny classroom, stream encryption, block encryption, basic cryptography
Id: vk3py9M2IfE
Channel Id: undefined
Length: 4min 52sec (292 seconds)
Published: Sun Jun 25 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.