Asymmetric Encryption Explained! (Bare Metal Cloud Security Series)

In this tutorial, The key distribution problem of symmetric encryption is solved by introducing the two-key system of asymmetric (or public-key) cryptography...

Heavy Metal Cloud98 views10:02

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in South Korea under the topic 'cybersecurity news today'.

About this video

In this tutorial, The key distribution problem of symmetric encryption is solved by introducing the two-key system of asymmetric (or public-key) cryptography. Using clear analogies, I break down how the unique relationship between the public and private keys. Which allows anyone to encrypt data but ensures only the intended receiver can decrypt it. We walk through the foundational steps of RSA encryption, showing you how to compute the keys using prime numbers and the modulus. We also explain the concept of a modulo operator and the final, critical step of using the secure, but slower, asymmetric method to safely deliver a faster symmetric key for the rest of the communication. Finally, we look at what a real Public Key Certificate looks like using OpenSSL. Perfect for beginners and anyone studying for security certifications! 0:00:00 - Intro 0:00:20 - A Simple Mailbox Analogy (Public & Private Keys) 0:01:26 - The Trapdoor Function Explained 0:03:53 - Creating the Public Key (Exponent & Modulus) 0:04:09 - Creating the Private Key (Extended Euclidean Algorithm) 0:04:49 - Encrypting Data with the Public Key 0:06:47 - Decrypting Data with the Private Key 0:07:45 - Key Size Limits (The Problem with Encrypting Large Data) 0:08:54 - Inspecting a Real Public Key Certificate 0:09:48 - Next Steps: Public Key Infrastructure (PKI) and TLS Certificates The code from this video is available from my GitHub repo: https://github.com/heavy-metal-cloud/youtube/tree/main/videos/security-series/03-asymmetric-encryption Links referenced in this video: https://en.wikipedia.org/wiki/Public-key_cryptography https://jupyter.org/try-jupyter/lab/ Amazon Affiliate Links - My recording Studio: - Cameras https://amzn.to/4msYu7v https://amzn.to/3JtfThX - Lenses https://amzn.to/4oOsrQX https://amzn.to/41iodr0 - Audio https://amzn.to/48PkdTb https://amzn.to/463UWmp https://amzn.to/4lDJ7bb - Lighting https://amzn.to/3HRiB09 https://amzn.to/4lMxxe2 https://amzn.to/3VdqgZM https://amzn.to/4mZ10T4 - Tripods, etc. https://amzn.to/3Jo6isO https://amzn.to/3Jsu1bj https://amzn.to/3JyvQDn https://amzn.to/4mQQJbk

Video Information

Views
98

Total views since publication

Likes
4

User likes and reactions

Duration
10:02

Video length

Published
Oct 20, 2025

Release date

Quality
hd

Video definition