8.2 (part-4) - Asymmetric (public,private) key cryptography of Security | Computer Network Bangla
8.2 (part-4) - Asymmetric (public,private) key cryptography of Security | Computer Network Bangla In public key encryption, two different keys are used to e...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
8.2 (part-4) - Asymmetric (public,private) key cryptography of Security | Computer Network Bangla
In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.
The public key encryption is also called asymmetric key encryption because two different keys are used.
Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
#EngineeringBnagla
#ComputerNetwork
Video Information
Views
857
Total views since publication
Likes
14
User likes and reactions
Duration
4:02
Video length
Published
Jan 19, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Asymmetric (public #private) key cryptography #public #private #public key #private key #encryption #symmetric key #public-key cryptography #cryptography (software genre) #networking #cybersecurity #security+ #public key encryption #asymmetrick key encryption #private key encryption #basic cryptography #public key encrytion #public and private keys #public and private keys bitcoin #public and private key encryption #private key and public key
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.