Public Key Encryption (Asymmetric Key Encryption)

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hello this is a sunny welcome back today my topic is public key encryption in public key encryption two different keys are used to encrypt and decrypt the data these two different keys are mathematically related why is the public key the other is private key they come ad appears the public key encryption is also known as a symmetric key encryption because these two different keys are used in public key encryption public key is public to anyone while the probably the key the last only to the person who create these two keys here is an example tom is ascending a lovely message to Mary and they are great to use the public key encryption to encrypt his message remember public key encryption to encrypt the singer's message starts with the receiver Mary here is how it works first Mary creates a pair of a keys when public key and one private key she keeps a primary key and give the public key to Tom after Tom writes his message he uses his public key to encrypt it we Mary gasps an encrypted document she uses the private key to decrypt it remember the public key method to encrypt the sender's message starts with a receiver not the sender the public key is public to everyone the probably the key is only known to the receiver here is another example suppose Bob wants to send an encrypted message to Alice and they use the public key encryption my questions are who creates the keys who use the public key and who use the private key and how many steps are there in the whole process you can pause the video to think about these questions well here is the answer and all the steps they take in the whole process step 1 Alice creates a pair of keys 1 public key and one private key Alice post the public key in a public key server which anyone can access step 2 Alice informs Bob where he can get her public key step 3 Bob gets the Alice public key as he followed Alice instructions step 4 Bob writes the message and use Alice the public key to encrypt it step 5 Bob sends is encrypted message to Alice step 6 or last step Alice use her own private key to decrypt Bob's message although Alice's private key can verify no one read or changed the document in transport it cannot verify the because Alice's public key is a public anyone can use it to encrypt his document and send it to Alice while pretending to be Bob in order to prove the sender they need another technique digital signature which is another story in another video thank you very much and see you next time [Music]
Info
Channel: Sunny Classroom
Views: 116,920
Rating: 4.9437084 out of 5
Keywords: networking, cybersecurity, security+, networking +, cyber threats, cyber defense, IoT, Wi-Fi security, public key encryption, asymmetrick key encryption, private key encryption, Sunny Classroom, Basic cryptography, public key encrytion
Id: 8I7BNgD2Yag
Channel Id: undefined
Length: 5min 5sec (305 seconds)
Published: Wed Jun 28 2017
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.