Module 5: What is asymmetric key encryption?

Two keys are involved in asymmetric key encryption: pubic and private keys Any other user who wants to send an encrypted message can get the intended recipi...

Simple Security441 views1:41

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

Two keys are involved in asymmetric key encryption: pubic and private keys Any other user who wants to send an encrypted message can get the intended recipient's public key from a public directory You use the public key to encrypt a message and you send it to the recipient When the recipient gets the message, they decrypt it with their private key, which no one else should have access to except the recipient References: Hitachi ID Systems, Inc. (n.d.). Retrieved February 18, 2015, from http://hitachi- id.com/concepts/asymmetric_encryption.html

Video Information

Views
441

Total views since publication

Likes
4

User likes and reactions

Duration
1:41

Video length

Published
Feb 19, 2015

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.