RSA & Asymmetric Encryption Explained 🔐
Discover the fundamentals of RSA and how it powers asymmetric encryption. Learn why RSA is essential in cryptography and its unique role in securing digital communication.

Practical Networking
8.7K views • Sep 2, 2024

About this video
The RSA algorithm is the only asymmetric algorithm that can do Asymmetric Encryption. It's often used as the definition of Asymmetric Crypto, but technically Asymmetric Crypto includes so much more than just Asymmetric Encryption.
// CHAPTERS
0:00 - Asymmetric Cryptography vs Asymmetric Encryption
0:56 - Public Key Encrypts, Private Key Decrypts
2:00 - Confidentiality - the purpose of asymmetric encryption
2:15 - RSA - the only asymmetric encryption algorithm
2:50 - Asymmetric Encryption is computationally expensive
3:12 - RSA Input and Output
3:30 - RSA Math
3:53 - Encryption & Decryption works in either direction
5:01 - Full Crypto Essentials series: pracnet.net/ce
// FULL SERIES - Cryptography Essentials //
This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.
The full series is available here:
📋 https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ
( or use the shortcut pracnet.net/ce )
00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography
// ADDITIONAL RESOURCES //
RSA vs Diffie-Hellman vs DSA:
https://www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
RSA Math:
https://www.youtube.com/watch?v=Pq8gNbvfaoM
// SUPPORT PRACTICAL NETWORKING //
If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:
- 👍 Like to help this video reach more viewers
- 💬 Comment to boost the channel's visibility
- 🔔 Subscribe to help me attract sponsors (this is the number they care about)
// CHAPTERS
0:00 - Asymmetric Cryptography vs Asymmetric Encryption
0:56 - Public Key Encrypts, Private Key Decrypts
2:00 - Confidentiality - the purpose of asymmetric encryption
2:15 - RSA - the only asymmetric encryption algorithm
2:50 - Asymmetric Encryption is computationally expensive
3:12 - RSA Input and Output
3:30 - RSA Math
3:53 - Encryption & Decryption works in either direction
5:01 - Full Crypto Essentials series: pracnet.net/ce
// FULL SERIES - Cryptography Essentials //
This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.
The full series is available here:
📋 https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ
( or use the shortcut pracnet.net/ce )
00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography
// ADDITIONAL RESOURCES //
RSA vs Diffie-Hellman vs DSA:
https://www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
RSA Math:
https://www.youtube.com/watch?v=Pq8gNbvfaoM
// SUPPORT PRACTICAL NETWORKING //
If this content benefited you, then here are TOTALLY FREE ways to show your appreciation:
- 👍 Like to help this video reach more viewers
- 💬 Comment to boost the channel's visibility
- 🔔 Subscribe to help me attract sponsors (this is the number they care about)
Video Information
Views
8.7K
Likes
326
Duration
5:28
Published
Sep 2, 2024
User Reviews
4.6
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now