Understanding Asymmetric Encryption with Simple Live Examples π
Learn how asymmetric encryption works through easy-to-follow live demonstrations. Discover the basics of this essential cryptography technique and see it in action!

Kushantha Gunawardana
2.0K views β’ Jun 8, 2020

About this video
Asymmetric Encryption explained with simple examples during real live session.
Asymmetric cryptography is a branch of cryptography where a secret key can be divided into two parts, a public key and a private key. The public key can be given to anyone, trusted or not, while the private key must be kept secret.
This cryptographic implementation used in many of modern communication systems.
Public Key infrastructure should be established before start the communication. Asymmetric encryption being implemented in VPN Networks, Secure communication in world wide web and many other communication systems which require secure communication and there is no efficient way of sharing keys.
Specially modern email communication protocols/standers like S/MIME Asymmetric encryption is implemented.
When it comes to Asymmetric encryption communication two keys being used. Previous article we discussed about single key communication/ Symmetric Key encryption please refer if you are not clear with Symmetric encryption.
During Asymmetric encryption there are two key generated known as public key and private key with three main attributes;
1. Two keys (key pair) involved
2. If one key is used to encrypt; other key of the same key pair can be used to decrypt.
3. It s impossible to retrieve other key of the same key pair using on key.
Before start the communication PKI (Public Key Infrastructure should be established.) Once PKI is implemented, everyone involved to the communication will have their own key pair and everyone else public keys or method to retrieve others public key is implemented.
Once public key infrastructure established users can start communication.
During Asymmetric encryption always uses recipients public key to encrypt so recipient can use his own private key to decrypt.
Cyber Security is a critical requirement today. Lets learn how to protect ourselves. Lets learn about Cyber Security and current emerging technologies in a simple way. We all can understand this, its only matter of building awareness.
https://blog.kushantha.com
#kushanthag #Asymmetric #Hacking
Asymmetric cryptography is a branch of cryptography where a secret key can be divided into two parts, a public key and a private key. The public key can be given to anyone, trusted or not, while the private key must be kept secret.
This cryptographic implementation used in many of modern communication systems.
Public Key infrastructure should be established before start the communication. Asymmetric encryption being implemented in VPN Networks, Secure communication in world wide web and many other communication systems which require secure communication and there is no efficient way of sharing keys.
Specially modern email communication protocols/standers like S/MIME Asymmetric encryption is implemented.
When it comes to Asymmetric encryption communication two keys being used. Previous article we discussed about single key communication/ Symmetric Key encryption please refer if you are not clear with Symmetric encryption.
During Asymmetric encryption there are two key generated known as public key and private key with three main attributes;
1. Two keys (key pair) involved
2. If one key is used to encrypt; other key of the same key pair can be used to decrypt.
3. It s impossible to retrieve other key of the same key pair using on key.
Before start the communication PKI (Public Key Infrastructure should be established.) Once PKI is implemented, everyone involved to the communication will have their own key pair and everyone else public keys or method to retrieve others public key is implemented.
Once public key infrastructure established users can start communication.
During Asymmetric encryption always uses recipients public key to encrypt so recipient can use his own private key to decrypt.
Cyber Security is a critical requirement today. Lets learn how to protect ourselves. Lets learn about Cyber Security and current emerging technologies in a simple way. We all can understand this, its only matter of building awareness.
https://blog.kushantha.com
#kushanthag #Asymmetric #Hacking
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
2.0K
Likes
38
Duration
11:58
Published
Jun 8, 2020
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now