Symmetric key Cryptography and Asymmetric key Cryptography explained in Hindi

Hello friends In symmetric key cryptography, the same key is used by both parties Sender use this key and encryption algorithm to encrypt message and the re...

Shreya Srivastava320 views8:26

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

About this video

Hello friends In symmetric key cryptography, the same key is used by both parties Sender use this key and encryption algorithm to encrypt message and the receiver use same key and corresponding decryption algorithm to decrypt it . In symmetric key cryptography the same key is used for encryption and decryption purpose so the key is shared between sender and receiver due to this Symmetric key cryptography also known as shared secret key cryptography. In asymmetric key cryptography sender has two keys public key and private key similarly Receiver has two key public key and private key. In short there are four keys used for communication between sender and receiver. If Sender use his public key for encryption then receiver was unable to decrypt the message because message will be decrypted only by sender's private key that is only known by sender not receiver. If sender use his private key for encryption then for decryption receiver require sender's public key that is public for all user who connected via network then anyone can decrypt the message and confidentiality of message does not remain so that this way is not valid . If sender use receiver's private key for encryption then it is impossible receiver's private key is only known by receiver not sender so that this way is not valid. If sender use receiver's public key for encryption and it is possible because receiver's public key is public for all users who connected via network so sender can easily encrypt message via receiver's public key Receiver decrypt the message using his own private key and here confidentiality of data remain because no one else receiver decrypt the message because receiver's private key is only known by receiver not anyone else. So, In asymmetric key cryptography (also known as public key cryptography) receiver's public key is used for encryption by sender and receiver use his or her private key to decrypt the message. For more knowledgeable and Informative videos Don't forget to subscribe Thank You :)

Video Information

Views
320

Total views since publication

Likes
21

User likes and reactions

Duration
8:26

Video length

Published
Jul 17, 2019

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.