Understanding Asymmetric Encryption with Simple Live Examples πŸ”

Learn how asymmetric encryption works through easy-to-follow live demonstrations. Discover the basics of this essential cryptography technique and see it in action!

Understanding Asymmetric Encryption with Simple Live Examples πŸ”
Kushantha Gunawardana
2.0K views β€’ Jun 8, 2020
Understanding Asymmetric Encryption with Simple Live Examples πŸ”

About this video

Asymmetric Encryption explained with simple examples during real live session.

Asymmetric cryptography is a branch of cryptography where a secret key can be divided into two parts, a public key and a private key. The public key can be given to anyone, trusted or not, while the private key must be kept secret.
This cryptographic implementation used in many of modern communication systems.
Public Key infrastructure should be established before start the communication. Asymmetric encryption being implemented in VPN Networks, Secure communication in world wide web and many other communication systems which require secure communication and there is no efficient way of sharing keys.

Specially modern email communication protocols/standers like S/MIME Asymmetric encryption is implemented.

When it comes to Asymmetric encryption communication two keys being used. Previous article we discussed about single key communication/ Symmetric Key encryption please refer if you are not clear with Symmetric encryption.
During Asymmetric encryption there are two key generated known as public key and private key with three main attributes;

1. Two keys (key pair) involved
2. If one key is used to encrypt; other key of the same key pair can be used to decrypt.
3. It s impossible to retrieve other key of the same key pair using on key.

Before start the communication PKI (Public Key Infrastructure should be established.) Once PKI is implemented, everyone involved to the communication will have their own key pair and everyone else public keys or method to retrieve others public key is implemented.

Once public key infrastructure established users can start communication.
During Asymmetric encryption always uses recipients public key to encrypt so recipient can use his own private key to decrypt.

Cyber Security is a critical requirement today. Lets learn how to protect ourselves. Lets learn about Cyber Security and current emerging technologies in a simple way. We all can understand this, its only matter of building awareness.

https://blog.kushantha.com

#kushanthag #Asymmetric #Hacking

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

2.0K

Likes

38

Duration

11:58

Published

Jun 8, 2020

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.