অ্যাসিমেট্রিক ক্রিপ্টোগ্রাফি: পাবলিক ও প্রাইভেট কী এর কার্যপ্রণালী 🔐

শেখুন কিভাবে অ্যাসিমেট্রিক ক্রিপ্টোগ্রাফিতে পাবলিক ও প্রাইভেট কী ব্যবহৃত হয় এবং এটি কিভাবে নিরাপত্তা নিশ্চিত করে।

Engineering Bangla857 views4:02

About this video

8.2 (part-4) - Asymmetric (public,private) key cryptography of Security | Computer Network Bangla

In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.

The public key encryption is also called asymmetric key encryption because two different keys are used.

Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.

#EngineeringBnagla
#ComputerNetwork

Video Information

Views
857

Total views since publication

Likes
14

User likes and reactions

Duration
4:02

Video length

Published
Jan 19, 2020

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'สภาพอากาศ'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!