What is Symmetric Encryption | Demo | Cryptography Essentials | Encryption, Signatures and Hashing

What is Symmetric Encryption. How to encrypt using symmetric key. How to decrypt using symmetric key. Encryption: It is one of the most used technique for s...

TechTrends with Vipin Gupta172 views4:35

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

What is Symmetric Encryption. How to encrypt using symmetric key. How to decrypt using symmetric key. Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed - one way hash - symmetric encryption - asymmetric encryption One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not. Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus messages. Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower. Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints: To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”. Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key. GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate. Courses Available in English at AWS Certified Cloud Practitioner (CLF-C01) - Hands On https://www.udemy.com/course/aws-certified-cloud-practitioner-hands-on/?referralCode=E7279BCF076939C81F3F Amazon Web Services (AWS) - Hands On https://www.udemy.com/course/hands-on-aws/?referralCode=27AC02AAF6927C8E16EA Mastering BIND DNS Course https://www.udemy.com/course/mastering-bind-dns/?referralCode=B3EAD168133315531446 Mastering Iptables Firewall Course https://www.udemy.com/course/mastering-iptables-firewall/?referralCode=4C477A430BFE7B4B51BE IP Addressing and Subnetting: Practical Approach Course https://www.udemy.com/course/ip-address-subnetting/?referralCode=FDAA34989626DEF990F0 Apache Web Server Course https://www.udemy.com/course/apache-web/?referralCode=E3EA2AC6EB0DEEE259AF Kubernetes For Beginners Course https://www.udemy.com/course/k8s-for-beginners/?referralCode=BF80146927F2E986CA50 Software Defined Networking (SDN) Made Simple Course https://www.udemy.com/course/sdn-made-simple/?referralCode=8B0C5399C7CEB79539B6 Mastering Docker Course https://www.udemy.com/course/docker-made-simple/?referralCode=1743EBB17092519E41D1 Linux Command Line For Beginners Course https://www.udemy.com/course/linux-essentials/?referralCode=9B548D586ADC970E3FCF Kubernetes Hands On Course https://www.udemy.com/course/kubernetes-hands-on/?referralCode=07B7DEDEEA46F830743F #cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration

Video Information

Views
172

Total views since publication

Likes
4

User likes and reactions

Duration
4:35

Video length

Published
May 5, 2021

Release date

Quality
hd

Video definition