What is Asymmetric Key Cryptography | Elements of Asymmetric key cryptography | Asymmetric cipher | Asymmetric cipher model | Public key cryptography | Ingredients of asymmetric key cryptography
Follow my blog: https://www.chiragbhalodia.com/2021/09/asymmetric-key-cryptography.html
In this video, I have explained asymmetric key cryptoghraphy (asymmetric cipher model in network security) concepts in network security and also explained elements (ingredients) of asymmetric key cryptography. How asymmetric key cryptography work?
Different keys are used for encryption and decryption, it is called asymmetric key cryptography. Public key used for encryption, private key used for decryption and vice versa. It is also known as public key cryptography.
Plaintext is the original message or data that is fed into the algorithm as input. Encryption algorithm performs various substitutions and transformations on the plaintext. Public & Private keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. Ciphertext is the unreadable message produced as output. It depends on the plain text and secret key. Decryption algorithm takes the cipher text and the secret key and produces the original plain text.
Public key is distributed to all users and Private key is known to particular user only. There are two different Scenario of encryption model:
Public key used for encryption and private key used for decryption.
Private key used for encryption and public key used for decryption.
If you like my video contents, please LIKE, COMMENT, SUBSCRIBE & SHARE with your friends.
--------------------------------------------------------------------------------------------------------------
Check out our other video on our channel page
Principle of Application Layer
https://youtu.be/bj33lPUCpR8
Cookie explain using animation:
https://youtu.be/ZaC5gW5UKJQ
Persistent HTTP vs Non Persistent HTTP:
https://youtu.be/8FuOereXcoc
Email:
https://youtu.be/UkQ_ascb6PA
--------------------------------------------------------------------------------------------------------------
You can always connect with me at:
Follow my blog:
https://www.chiragbhalodia.com
Like my Facebook page:
https://www.facebook.com/chiragbhalodia25
Follow me on Instagram:
https://www.instagram.com/chiragbhalodia.25
Follow me on twitter:
https://twitter.com/chiragsbhalodia
Subscribe me on youtube:
https://www.youtube.com/c/ChiragBhalodia
--------------------------------------------------------------------------------------------------------------
Playlist available on my channel:
Network Security (CNS, INS, IS):
https://youtube.com/playlist?list=PLzQqHxFtQGyfiYWaDnasLdy1JPK3JS06o
Computer Network (CN) with animation:
https://youtube.com/playlist?list=PLzQqHxFtQGycfs9Vn8BYy0ic0wh-oL9UC
VFX Animation & Fun Videos:
https://youtube.com/playlist?list=PLzQqHxFtQGyd9esvf-t5XYOKhxQS0tDWx
Comupter Organization & Architecture (COA, CA, CO):
https://youtube.com/playlist?list=PLzQqHxFtQGyd-uDzS9vov8hJfm03X_SzC
Assembly Language Programming:
https://youtube.com/playlist?list=PLzQqHxFtQGyeTa82xQyceYxaf-iyZBICw
Computer Graphics:
https://youtube.com/playlist?list=PLzQqHxFtQGycg_TJBA6uFGDLwbotjs68h
#chirag_bhalodia
#chiragbhalodia
#network_security
#cryptography
#Asymmetric_key_cryptography
#Asymmetric_cipher_model
#public_key_cryptography
#elements_of_asymmetric_key_cryptography
Keep learning, keep supporting 🤝✨💯