Symmetrical vs asymmetrical Encryption Pros and Cons by Example

Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more. In this video we will learn ab...

Hussein Nasser‱46.4K views‱22:07

đŸ”„ Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more. In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one. Chapters 0:00 Intro 1:50 Symmetric Encryption 9:40 Asymmetric Encryption 14:40 Symmetric Encryption Pros and Cons 17:05 Asymmetric Encryption Pros and Cons 20:20 Summary 1. Symmetric encryption 2. Asymmetrical encrypt 3. Pros and cons of Symmetric vs Asymmetric Symmetric encryption Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have something I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock. The same key you use to encrypt is the same key to Decrypt. Examples Examples of popular symmetric-key algorithms include AES Twofish Serpent DES Twofish, Serpent, AES (Rijndael), Blowfish CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer+/++ (Bluetooth), and IDEA Asymmetrical encryptions We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesn't really have my key so we need to encrypt it.. Also called Public key encryption 1977 Rivest–Shamir–Adleman (RSA) * Diffie–Hellman key exchange protocol * DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm * ElGamal * Various elliptic curve techniques * Various password-authenticated key agreement techniques * Paillier cryptosystem * RSA encryption algorithm (PKCS#1) * Cramer–Shoup cryptosystem * YAK authenticated key agreement protocol So TLS for example first transfer the symmetric key using asymmetrical encryption then communicate all the way using sym encryption Symmetric encryption pros faster Can be used to encrypt large data scales cons Very hard to transport the key 🔑 ASymmetric encryption Pros Keys can be shared across a network Perfect for encryption small data such as ssh cons Slow Rsa slower then aes Cannot be used to (1,2) Number to power 1 mod 2 Summary Sym. Encryption is used to encrypt large files, same key to encrypt is the same key to deycrpt they are very fast and efficient but keys need to exist on both machines to communicate. Asym encryption can one key encrypt another key decrypts public key is Stay Awesome! Hussein

Video Information

Views
46.4K

Total views since publication

Likes
1.7K

User likes and reactions

Duration
22:07

Video length

Published
Jun 8, 2019

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.