Asymmetric Encryption explained with simple examples | Asymmetric Encryption demonstrated live
Asymmetric Encryption explained with simple examples during real live session. Asymmetric cryptography is a branch of cryptography where a secret key can be...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
Asymmetric Encryption explained with simple examples during real live session.
Asymmetric cryptography is a branch of cryptography where a secret key can be divided into two parts, a public key and a private key. The public key can be given to anyone, trusted or not, while the private key must be kept secret.
This cryptographic implementation used in many of modern communication systems.
Public Key infrastructure should be established before start the communication. Asymmetric encryption being implemented in VPN Networks, Secure communication in world wide web and many other communication systems which require secure communication and there is no efficient way of sharing keys.
Specially modern email communication protocols/standers like S/MIME Asymmetric encryption is implemented.
When it comes to Asymmetric encryption communication two keys being used. Previous article we discussed about single key communication/ Symmetric Key encryption please refer if you are not clear with Symmetric encryption.
During Asymmetric encryption there are two key generated known as public key and private key with three main attributes;
1. Two keys (key pair) involved
2. If one key is used to encrypt; other key of the same key pair can be used to decrypt.
3. It s impossible to retrieve other key of the same key pair using on key.
Before start the communication PKI (Public Key Infrastructure should be established.) Once PKI is implemented, everyone involved to the communication will have their own key pair and everyone else public keys or method to retrieve others public key is implemented.
Once public key infrastructure established users can start communication.
During Asymmetric encryption always uses recipients public key to encrypt so recipient can use his own private key to decrypt.
Cyber Security is a critical requirement today. Lets learn how to protect ourselves. Lets learn about Cyber Security and current emerging technologies in a simple way. We all can understand this, its only matter of building awareness.
https://blog.kushantha.com
#kushanthag #Asymmetric #Hacking
Video Information
Views
2.0K
Total views since publication
Likes
38
User likes and reactions
Duration
11:58
Video length
Published
Jun 8, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Asymmetric #explained #Asymmetric Encryption explained #Simple examples #Asymmetric encryption with simple examples #how asymmetric encryption works #Asymmetric algorithms #Asymmetric implementations #Live demonstrations #how everything works #Microsoft technologies #Cyber Security #PKI #Public Key Infrastructure
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.