Symmetric key Cryptography and Asymmetric key Cryptography explained in Hindi
Hello friends In symmetric key cryptography, the same key is used by both parties Sender use this key and encryption algorithm to encrypt message and the re...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Hello friends
In symmetric key cryptography, the same key is used by both parties Sender use this key and encryption algorithm to encrypt message and the receiver use same key and corresponding decryption algorithm to decrypt it .
In symmetric key cryptography the same key is used for encryption and decryption purpose so the key is shared between sender and receiver due to this Symmetric key cryptography also known as shared secret key cryptography.
In asymmetric key cryptography sender has two keys public key and private key similarly Receiver has two key public key and private key.
In short there are four keys used for communication between sender and receiver.
If Sender use his public key for encryption then receiver was unable to decrypt the message because message will be decrypted only by sender's private key that is only known by sender not receiver.
If sender use his private key for encryption then for decryption receiver require sender's public key that is public for all user who connected via network then anyone can decrypt the message and confidentiality of message does not remain so that this way is not valid .
If sender use receiver's private key for encryption then it is impossible receiver's private key is only known by receiver not sender so that this way is not valid.
If sender use receiver's public key for encryption and it is possible because receiver's public key is public for all users who connected via network so sender can easily encrypt message via receiver's public key Receiver decrypt the message using his own private key and here confidentiality of data remain because no one else receiver decrypt the message because receiver's private key is only known by receiver not anyone else.
So,
In asymmetric key cryptography (also known as public key cryptography) receiver's public key is used for encryption by sender and receiver use his or her private key to decrypt the message.
For more knowledgeable and Informative videos
Don't forget to subscribe
Thank You :)
Video Information
Views
320
Total views since publication
Likes
21
User likes and reactions
Duration
8:26
Video length
Published
Jul 17, 2019
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Asymmetric key in Cryptography #Difference between Asymmetric Key and Symmetric Key Cryptography #Symmetric vs Asymmetric ( public key ) Cryptography #Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi #Symmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi #Symmetric Key Cryptography Vs Asymmetric Key Cryptography Explained in Hindi
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.