Module 5: What is asymmetric key encryption?
Two keys are involved in asymmetric key encryption: pubic and private keys Any other user who wants to send an encrypted message can get the intended recipi...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Two keys are involved in asymmetric key encryption: pubic and private keys
Any other user who wants to send an encrypted message can get the intended recipient's public key from a public directory
You use the public key to encrypt a message and you send it to the recipient
When the recipient gets the message, they decrypt it with their private key, which no one else should have access to except the recipient
References:
Hitachi ID Systems, Inc. (n.d.). Retrieved February 18, 2015, from http://hitachi- id.com/concepts/asymmetric_encryption.html
Video Information
Views
441
Total views since publication
Likes
4
User likes and reactions
Duration
1:41
Video length
Published
Feb 19, 2015
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Access Control #Network Security #Digital Forensics #Risk Management #Computer Security #Common Cyber Attacks and Defenses #Web Security #Information Assurance #Virtualization Technology #Social Network System #Asymmetry (Quotation Subject) #Software (Industry) #Encryption (Literature Subject) #Security (Literature Subject) #Key #Social Network (Industry)
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.