Asymmetric Encryption Explained! (Bare Metal Cloud Security Series)
In this tutorial, The key distribution problem of symmetric encryption is solved by introducing the two-key system of asymmetric (or public-key) cryptography...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
In this tutorial, The key distribution problem of symmetric encryption is solved by introducing the two-key system of asymmetric (or public-key) cryptography.
Using clear analogies, I break down how the unique relationship between the public and private keys. Which allows anyone to encrypt data but ensures only the intended receiver can decrypt it.
We walk through the foundational steps of RSA encryption, showing you how to compute the keys using prime numbers and the modulus. We also explain the concept of a modulo operator and the final, critical step of using the secure, but slower, asymmetric method to safely deliver a faster symmetric key for the rest of the communication. Finally, we look at what a real Public Key Certificate looks like using OpenSSL.
Perfect for beginners and anyone studying for security certifications!
0:00:00 - Intro
0:00:20 - A Simple Mailbox Analogy (Public & Private Keys)
0:01:26 - The Trapdoor Function Explained
0:03:53 - Creating the Public Key (Exponent & Modulus)
0:04:09 - Creating the Private Key (Extended Euclidean Algorithm)
0:04:49 - Encrypting Data with the Public Key
0:06:47 - Decrypting Data with the Private Key
0:07:45 - Key Size Limits (The Problem with Encrypting Large Data)
0:08:54 - Inspecting a Real Public Key Certificate
0:09:48 - Next Steps: Public Key Infrastructure (PKI) and TLS Certificates
The code from this video is available from my GitHub repo:
https://github.com/heavy-metal-cloud/youtube/tree/main/videos/security-series/03-asymmetric-encryption
Links referenced in this video:
https://en.wikipedia.org/wiki/Public-key_cryptography
https://jupyter.org/try-jupyter/lab/
Amazon Affiliate Links - My recording Studio:
- Cameras
https://amzn.to/4msYu7v
https://amzn.to/3JtfThX
- Lenses
https://amzn.to/4oOsrQX
https://amzn.to/41iodr0
- Audio
https://amzn.to/48PkdTb
https://amzn.to/463UWmp
https://amzn.to/4lDJ7bb
- Lighting
https://amzn.to/3HRiB09
https://amzn.to/4lMxxe2
https://amzn.to/3VdqgZM
https://amzn.to/4mZ10T4
- Tripods, etc.
https://amzn.to/3Jo6isO
https://amzn.to/3Jsu1bj
https://amzn.to/3JyvQDn
https://amzn.to/4mQQJbk
Video Information
Views
98
Total views since publication
Likes
4
User likes and reactions
Duration
10:02
Video length
Published
Oct 20, 2025
Release date
Quality
hd
Video definition