Understanding Public Key Encryption: The Basics of Asymmetric Security πŸ”

Learn how public key encryption works and why it's essential for secure communication. Support the channel if you find this helpful!

Understanding Public Key Encryption: The Basics of Asymmetric Security πŸ”
Sunny Classroom
182.1K views β€’ Jun 28, 2017
Understanding Public Key Encryption: The Basics of Asymmetric Security πŸ”

About this video

✨ Please consider supporting my channel! ✨
Every bit helpsβ€”whether it’s $15, $10, or even $5.
You can make a donation via this site:
https://www.patreon.com/sunnyclassroom

In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.

The public key encryption is also called asymmetric key encryption because two different keys are used.

Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.

In this video, I will use an example to demonstrate how to use public key.

Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV

Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7


Please leave comments, questions and
please subscribe!

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

182.1K

Likes

3.7K

Duration

5:06

Published

Jun 28, 2017

User Reviews

4.7
(36)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.