Cryptography Explained: Types, Processes, & Keys πŸ”

Discover the fundamentals of cryptography, including symmetric and asymmetric encryption, public and private keys, and their applications in computer security. Complete your notes and enhance your understanding today!

Cryptography Explained: Types, Processes, & Keys πŸ”
TestPrep (AP, GATE, NET ...)
113 views β€’ Dec 14, 2020
Cryptography Explained: Types, Processes, & Keys πŸ”

About this video

Practice Computer Science and complete notes:
https://www.doorsteptutor.com/Exams/UGC/Computer-Science/

For long answers:
https://www.doorsteptutor.com/Exams/GATE/Computer-Science/
NTA NET Paper 1 Online Crash Course - https://www.doorsteptutor.com/Exams/UGC/Paper-1/Online-Crash-Course/

NTA NET Paper 1 Mock papers - https://www.doorsteptutor.com/Exams/UGC/Paper-1/Online-Test-Series/

NTA NET Paper 1 Practice questions - https://www.doorsteptutor.com/Exams/UGC/Paper-1/Questions/

NTA NET Paper 1 Postal Course - https://www.examrace.com/NTA-UGC-NET/NTA-UGC-NET-FlexiPrep-Program/Postal-Courses/Examrace-NTA-UGC-NET-Paper-I-Series.htm

NCERT, Yojana, Kurukshetra, Down to Earth, Science, Social Studies and More interesting topics subscribe at Examrace: https://www.youtube.com/c/Examrace

NCERT, Yojana, Kurukshetra, Down to Earth, Science, Social Studies and More interesting topics subscribe at ExamraceHindi: https://www.youtube.com/c/ExamraceHindi

For classes nursery to class 5 videos subscribe to FunProf: https://www.youtube.com/c/FunProf

For Science Class 11-12 and important topics subscribe to DoorStepTutor: https://www.youtube.com/c/DoorstepTutor

Topics:
Introduction of Cryptography
What is Cryptography
Processes of cryptography
How it works
Types of Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
Public key
Private key
MCQs
Introduction of Cryptography
Cryptography is a an art by which we can protect our data and information. The word Cryptography is derived from the Greek word called β€œKryptos” which means β€œHidden Secrets”.
What is Cryptography
This is a technique by which we convert plain text to cipher text and cipher text are again converted to plain text.
A Plain text means a message that anyone can read and understand its meaning. But ciphers text is a message that can be read but cannot be understood that what it is written and what it means. This data can be read only by the one who has the secret key to decrypt it. It is used to protect email message credit card details and other important information. It provides Confidentiality, Integrity, Accuracy.
Processes of cryptography
Cryptography has two important processes, encryption and decryption.
In Encryption plaintext is converted to cipher text.
Decryption again converts the cipher text to plain text.
How it work
It converts the service message into code, scrambles it and creates the encryption key. After this only one can unlock this message for which the message is.
Types of Cryptography
There are two types of Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
Symmetric Key Cryptography:
Only one key is used meaning that it has the same key for encryption and decryption. In this, data or information is encrypted and decrypted using a same key.
Advantages
It is simple and fast
Disadvantage
Less secured.
Asymmetric Key Cryptography
It has different keys for both encryption and decryption. In this Public key and private key are two types of keys and both key are interrelated.
Public key is used to encryption.
Private key is used to decryption.
Advantages
It is more secure
& Authentication
Disadvantage
very complex
Public key
Public key is used for encryption, hence it is also called encryption key.
The public key belongs to the receiver but receiver shares it with the sender, through which the sender encrypt its message and send it to the receiver via the channel.

Chapters:
0:00 Cryptography
0:07 Topics
0:45 Introduction
1:22 What is Cryptography?
3:06 Processes of Cryptography
3:46 How its Cryptography Work?
4:38 Types of Cryptography
5:16 Symmetric Key Cryptography
6:43 Asymmetric Key Cryptography
7:53 Public Key
8:32 Private Key
9:19 Advantages of Cryptography
9:53 Conclusion
11:04 Questions
#cryptography #introduction #processesofcryptography #typesofcryptography #symmetrickeycryptography #asymmetrickeycryptography #publickey #privatekey #advantagesofcryptography #conclusion #testprep #ugcnet #doorsteptutor #examrace

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

113

Likes

2

Duration

12:09

Published

Dec 14, 2020

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.