Understanding Asymmetric (Public Key) Encryption 🔐
Learn how asymmetric (public key) cryptography secures data with two keys—public and private—and why it's essential for cybersecurity and encryption.

Sanjay Pathak
1.3K views • Apr 12, 2020

About this video
This video is about asymmetric key/public key
Public Key encryption uses two different keys, a public key known to all and a private key known only to sender and receiver
Encryption and decryptions key are different from each other
One key is made public and another key is kept private, both keys are encrypted & decrypt
Data encrypted by one can be decrypted by other only
They use large key as short key are subject to brute force
Public Key encryption uses two different keys, a public key known to all and a private key known only to sender and receiver
Encryption and decryptions key are different from each other
One key is made public and another key is kept private, both keys are encrypted & decrypt
Data encrypted by one can be decrypted by other only
They use large key as short key are subject to brute force
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.3K
Likes
27
Duration
6:34
Published
Apr 12, 2020
User Reviews
4.5
(1)