Day 25: Master Public Key Cryptography (RSA, Diffie-Hellman, SSH, PGP) | 100-Day Cybersecurity Challenge
Learn the fundamentals of public key cryptography with simple explanations and practical examples in Hinglish. Discover how RSA, Diffie-Hellman, SSH, and PGP keep data secure! π

Encrypticle
151 views β’ Oct 4, 2025

About this video
Day 25 of my 100-Day Cybersecurity Challenge π
π₯ Public Key Cryptography Basics (Hinglish)! π
Aaj hum samjhenge β RSA ka simple numeric example, Diffie-Hellman key exchange step-by-step, SSH server/client auth, digital signatures & certificates, aur PGP/GPG ka practical use. Ye video beginners ke liye simple hai aur real CTF/pentest scenarios ke liye useful hai.
π What youβll learn (quick):
β’ Why asymmetric keys exist vs symmetric keys
β’ RSA β step-by-step numeric example (use these exact numbers)
β’ Diffie-Hellman β simple walkthrough with p=29, g=3, a=13, b=15 (calculate shared secret)
β’ SSH host authentication & key auth (how ssh-keygen works)
β’ Digital signatures & certificates β what they actually prove
β’ PGP / GPG β generate key, share public key, decrypt example
β‘ Watch Next:
βΆ Networking for Hackers β https://www.youtube.com/watch?v=xMQycP4EwF0&list=PLz2MXRhS5diMyeaKeEoAfGj0Sp0wmqggw
βΆ Linux for Hackers β https://www.youtube.com/watch?v=OOrUcWiEFbY&list=PLz2MXRhS5diPneoNefjOItyorJ67ae88w
βΆ Nmap Mastery for Hackers β https://www.youtube.com/watch?v=OOrUcWiEFbY&list=PLz2MXRhS5diPneoNefjOItyorJ67ae88w
β Subscribe & hit π to get daily videos on ethical hacking, bug bounty, and red-team skills.
Follow Encrypticle for updates, resources & community:
π Website: https://encrypticle.com
π¦ Twitter/X: https://twitter.com/encrypticle
π± Instagram: https://instagram.com/encrypticle
πΌ LinkedIn: https://linkedin.com/company/encrypticle
#CyberSecurity #BugBounty #RedTeam #Hacking #InfoSec #100DayChallenge #Encrypticle
π₯ Public Key Cryptography Basics (Hinglish)! π
Aaj hum samjhenge β RSA ka simple numeric example, Diffie-Hellman key exchange step-by-step, SSH server/client auth, digital signatures & certificates, aur PGP/GPG ka practical use. Ye video beginners ke liye simple hai aur real CTF/pentest scenarios ke liye useful hai.
π What youβll learn (quick):
β’ Why asymmetric keys exist vs symmetric keys
β’ RSA β step-by-step numeric example (use these exact numbers)
β’ Diffie-Hellman β simple walkthrough with p=29, g=3, a=13, b=15 (calculate shared secret)
β’ SSH host authentication & key auth (how ssh-keygen works)
β’ Digital signatures & certificates β what they actually prove
β’ PGP / GPG β generate key, share public key, decrypt example
β‘ Watch Next:
βΆ Networking for Hackers β https://www.youtube.com/watch?v=xMQycP4EwF0&list=PLz2MXRhS5diMyeaKeEoAfGj0Sp0wmqggw
βΆ Linux for Hackers β https://www.youtube.com/watch?v=OOrUcWiEFbY&list=PLz2MXRhS5diPneoNefjOItyorJ67ae88w
βΆ Nmap Mastery for Hackers β https://www.youtube.com/watch?v=OOrUcWiEFbY&list=PLz2MXRhS5diPneoNefjOItyorJ67ae88w
β Subscribe & hit π to get daily videos on ethical hacking, bug bounty, and red-team skills.
Follow Encrypticle for updates, resources & community:
π Website: https://encrypticle.com
π¦ Twitter/X: https://twitter.com/encrypticle
π± Instagram: https://instagram.com/encrypticle
πΌ LinkedIn: https://linkedin.com/company/encrypticle
#CyberSecurity #BugBounty #RedTeam #Hacking #InfoSec #100DayChallenge #Encrypticle
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
151
Likes
8
Duration
26:59
Published
Oct 4, 2025