Understanding Public and Private Keys in Cryptography

An overview of public and private keys, their benefits, and their role in encryption, signatures, and hashing. This guide explains how encryption serves as a crucial technique for enhancing security.

Understanding Public and Private Keys in Cryptography
TechTrends with Vipin Gupta
640 views • Apr 22, 2021
Understanding Public and Private Keys in Cryptography

About this video

Introduction to Public/Private Keys. Benefits of using these keys.

Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed
- one way hash
- symmetric encryption
- asymmetric encryption

One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not.

Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus
messages.

Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower.

Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints:

To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”.

Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key.

GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate.

Courses Available in English at

AWS Certified Cloud Practitioner (CLF-C01) - Hands On
https://www.udemy.com/course/aws-certified-cloud-practitioner-hands-on/?referralCode=E7279BCF076939C81F3F

Amazon Web Services (AWS) - Hands On
https://www.udemy.com/course/hands-on-aws/?referralCode=27AC02AAF6927C8E16EA

Mastering BIND DNS Course
https://www.udemy.com/course/mastering-bind-dns/?referralCode=B3EAD168133315531446

Mastering Iptables Firewall Course
https://www.udemy.com/course/mastering-iptables-firewall/?referralCode=4C477A430BFE7B4B51BE

IP Addressing and Subnetting: Practical Approach Course
https://www.udemy.com/course/ip-address-subnetting/?referralCode=FDAA34989626DEF990F0

Apache Web Server Course
https://www.udemy.com/course/apache-web/?referralCode=E3EA2AC6EB0DEEE259AF

Kubernetes For Beginners Course
https://www.udemy.com/course/k8s-for-beginners/?referralCode=BF80146927F2E986CA50

Software Defined Networking (SDN) Made Simple Course
https://www.udemy.com/course/sdn-made-simple/?referralCode=8B0C5399C7CEB79539B6

Mastering Docker Course
https://www.udemy.com/course/docker-made-simple/?referralCode=1743EBB17092519E41D1

Linux Command Line For Beginners Course
https://www.udemy.com/course/linux-essentials/?referralCode=9B548D586ADC970E3FCF

Kubernetes Hands On Course
https://www.udemy.com/course/kubernetes-hands-on/?referralCode=07B7DEDEEA46F830743F

#cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

640

Likes

17

Duration

8:35

Published

Apr 22, 2021

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.