Asymmetric Encryption - Simply explained

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ธ.ค. 2024

ความคิดเห็น • 880

  • @johnathonbatz662
    @johnathonbatz662 3 ปีที่แล้ว +144

    the mailbox analogy of everyone knowin the address of the mailbox being the public key, and only the mailbox owner with the keys to his own mailbox as the private key, is a really really really well done analogy. probably the best one ive seen so far with relating public/private keys as a concept to everyday life and making it easier to understand.

  • @Wasko2
    @Wasko2 10 หลายเดือนก่อน +8

    I don't understand why 99% of people find it so hard to explain something to another person in straight forward terms. Asymmetric encryption is so damn SIMPLE, yet it's so hard to find a straight explanation like in this video. Thank you! The part that was really confusing me was that EVERYONE has a public key that they give out to anyone who wants to send them encrypted data. Hi, you want to send me encrypted data? Here take my public key and use it to encrypt the data. Now send me the encrypted data. Now I have the encrypted data, I will use my private key to decrypt it. Very straight forward.

  • @anti-macro
    @anti-macro ปีที่แล้ว +15

    Anyone here from The Odin Project? Keep it up, we can do it! :)
    Also thanks for the video, the concept seemed almost alien to me but you've explained it in such a clear way that anybody could understand it

  • @kairollmann
    @kairollmann 7 ปีที่แล้ว +846

    And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymmetric encryption and 3) send that (asymmetrically) encrypted symmetric key together with the (symmetrically) encrypted file.

    • @simplyexplained
      @simplyexplained  7 ปีที่แล้ว +128

      +Kai Rollmann jep, 100% true. Should've added that to the video.

    • @Markd315
      @Markd315 6 ปีที่แล้ว +20

      And after that, probably how RSA can also be used to sign and verify data integrity.

    • @lallu1122
      @lallu1122 5 ปีที่แล้ว +13

      I never thought about it! Great!!

    • @sivasankarclouddeveloper1114
      @sivasankarclouddeveloper1114 5 ปีที่แล้ว +5

      Thank you Kai Rollmann

    • @uayfb1
      @uayfb1 5 ปีที่แล้ว +1

      I believe that is how Pretty Good Privacy works.

  • @mjk012579
    @mjk012579 4 ปีที่แล้ว +348

    Very clear and straightforward. I’ve been beating myself over the head with this topic in my fundamentals class and this just made the differences make a whole lot more sense

  • @SannySinghs
    @SannySinghs 7 ปีที่แล้ว +303

    LoL 221b BakerStreet . I have been trying to understand Asymmetric encryption concept for nearly 3 hours. None of the clips i watch explained as clearly as you do about exchanging public key. Well done. Thank you so much

    • @simplyexplained
      @simplyexplained  7 ปีที่แล้ว +19

      You're the first one who noticed the address! Thanks for the kind words ;)

    • @JonathanCoffey1087
      @JonathanCoffey1087 6 ปีที่แล้ว +14

      Same here, this idea helped me a little. Since most of these videos keep mentioning TONS of keys, why not use a lock analogy? We generate a key pair, one public and one private. Think of the public key as the unique "lock" you've just made. You can give that lock to as many friends as you want. If you send me your lock, I can put anything in a box and put your lock on it. Once secured with your custom lock, I can no longer open or see the contents of that box without your key that's paired with that lock.

    • @teddyboggs1851
      @teddyboggs1851 5 ปีที่แล้ว +3

      As an American I can honestly say 221 baker is literally the only address I know in that entire country.

    • @TheVirumXD
      @TheVirumXD 5 ปีที่แล้ว +1

      Teddy Boggs Sherlock

    • @waduhek2568
      @waduhek2568 5 ปีที่แล้ว

      ur dickhead

  • @Nawdiral
    @Nawdiral 6 ปีที่แล้ว +55

    The key words here I was really looking for since a while are: "...algorithm will generate a public and private key that are mathematically linked to each othere. Public keys can be used to encrypt data and only the matching private key can be used to decrypt it.".

    • @futuresocieties.
      @futuresocieties. 5 ปีที่แล้ว

      High levels of security with mathematics.

    • @futuresocieties.
      @futuresocieties. 5 ปีที่แล้ว

      Mathematics that provide high levels of security.

    • @JayLim-bn9fh
      @JayLim-bn9fh 4 ปีที่แล้ว

      Holy lil fuck! Thanks!

    • @TheGadgetwiz
      @TheGadgetwiz 3 ปีที่แล้ว +6

      This kind of irritated me because this was the reason I was watching the video. I wanted to know HOW that part worked. I already knew all the other pieces.

    • @penguin-tc1cx
      @penguin-tc1cx 3 ปีที่แล้ว

      @@TheGadgetwiz this channel and video is called "simply explained" for a reason... if you want to learn the more complex process behind it, you should do research or watch other videos. don't complain lmao

  • @user-dd1rg7sd9l
    @user-dd1rg7sd9l หลายเดือนก่อน +3

    I find from personal experience, it is the people who can describe a process simply are the ones who TRULY understand it.

  • @AbhijitChandekar
    @AbhijitChandekar 5 ปีที่แล้ว +3

    This is the best video on public key encryption. What i found was that, many other videos does not mention the fact that the public keys are exchanged between the two parties. Thank you to the maker of this video!!!

  • @scienceblossom6197
    @scienceblossom6197 6 ปีที่แล้ว +8

    It used to be super complicated for me but even watching this awesome video up to 02:16 helped me understand how public/private keys work in general and now it makes TOTAL sense. THANKS!

  • @theartofhacking6896
    @theartofhacking6896 2 ปีที่แล้ว +9

    I was always struggling to grasp the concept of asymmetric keys but now, within only 4:40 mins it became crystal clear. Keep it up. :)

    • @brd8764
      @brd8764 2 ปีที่แล้ว

      rightly and it is prosper.

  • @alvfig
    @alvfig 7 ปีที่แล้ว +48

    Great introduction, even for non-technical people. Thanks a lot! I'd love if you could make a similar video to digital signature.

  • @aditi3112
    @aditi3112 6 ปีที่แล้ว +6

    Wow..how clearly & beautifully explained. From a long -long time, I was highly confused why 2 keys in asymmetric encryption...never been able to understand...but your explanation made it clear completely. Tons of thanks to you :)

  • @marriagedance8657
    @marriagedance8657 6 ปีที่แล้ว +13

    You deserve so much more subscribers.. Hats off

  • @rockstar86374
    @rockstar86374 4 ปีที่แล้ว +210

    how can anyone dislike this video? He explained the concept very clearly.

    • @SEABASports
      @SEABASports 4 ปีที่แล้ว +12

      Exactly my thought 🤣🤣 people, i swear. Lol

    • @oxkaioxo
      @oxkaioxo 4 ปีที่แล้ว +5

      maybe because he doesn't mentioned the double encryption with senders private and recipients public key

    • @bulinaderguti1346
      @bulinaderguti1346 4 ปีที่แล้ว +4

      Must be the other youtube chanels that failed to explain it better than this video hahahahah

    • @AltoXorg
      @AltoXorg 4 ปีที่แล้ว +2

      trolls...

    • @tigger2581
      @tigger2581 4 ปีที่แล้ว +1

      people who don't speak human

  • @MEME-re5jl
    @MEME-re5jl ปีที่แล้ว +1

    Thank you this is my first comment in the TH-cam you deserve it. Thank you.

  • @RM_1964
    @RM_1964 5 ปีที่แล้ว +2

    Man you explained it in so much simple manner. I don't even need to note it anywhere. It was like a story that's in my head. Thanks a lot sir.

  • @MegaKalkas
    @MegaKalkas 6 ปีที่แล้ว +9

    You should also mention that encryption works in the other way too. An encrypted message with a private key can be decrypted only by the paired public key and this insures that the sender (or whoever encrypted the message) is indeed trusted.

  • @diegoguzman4631
    @diegoguzman4631 6 ปีที่แล้ว +17

    I was able to understand how asymmetric encryption works in just 4:40 mins! Thanks a lot!!!

    • @happyboy2323
      @happyboy2323 4 ปีที่แล้ว

      Just what is it, not how it works

  • @gersprungled
    @gersprungled 4 ปีที่แล้ว +12

    Best explanation I have seen in over 5 years. Brilliant.

  • @falmanna
    @falmanna 7 ปีที่แล้ว +338

    Very nice and clear presentation

  • @anirudhpathak2559
    @anirudhpathak2559 5 ปีที่แล้ว +9

    The best and clearest description of public-private key cryptography I have seen so far!

  • @ACEofMCB
    @ACEofMCB 7 ปีที่แล้ว +23

    Awesome explanation and graphics for a visual understanding. I was looking for something simple to show friends and family and you've covered it better than I ever could, thank you!

  • @iCortex1
    @iCortex1 8 หลายเดือนก่อน +1

    This took years for my brain to click, it's hard to grasp when you don't have much experience (IE still in school) - but it all makes sense now :) If you're struggling with this concept don't give up, it finally clicked for me after revisiting the subject once in a while

  • @drabberfrog
    @drabberfrog 7 หลายเดือนก่อน +1

    This is the first time I actually understood this after watching many videos about it. Thx

  • @keithfreeman2139
    @keithfreeman2139 4 ปีที่แล้ว

    I have a Cyber-Security Test coming up Tuesday. These videos have helped me a lot. Thank you.

  • @WiktorWiktor7
    @WiktorWiktor7 หลายเดือนก่อน +1

    Everything explained really well in 4 minutes

  • @supaduperforever
    @supaduperforever 6 ปีที่แล้ว +14

    Thanks for keeping it simple, yet intriguingly educational for a layman curious as to how this technology works in the World Wide Web. Much appreciated sir!

  • @OHTV2016
    @OHTV2016 6 ปีที่แล้ว +23

    Excellent video, I’ve been watching many videos about this topic and you’re the only one who I actually understood from. Wonderful Job ❤️

  • @Tamilkaraokevideos
    @Tamilkaraokevideos 3 ปีที่แล้ว +1

    The mailbox example nailed it.. Thanks for the ghaphics and explanation.

  • @lakerfan4life308
    @lakerfan4life308 ปีที่แล้ว

    Excellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.

  • @anandarivu
    @anandarivu 6 ปีที่แล้ว +2

    This is the best video to understand the algorithm. I was always amused at how ssh works with keys. No one ever showed the exchange of public keys.
    Thanks a lot for the video.

  • @yousufjjk2037
    @yousufjjk2037 2 ปีที่แล้ว

    Between the video, I thought that u should give this guy a like but then accidentally closed the video when I had finished so I had to open it again just to like it. Good work!

  • @codecleric4972
    @codecleric4972 2 ปีที่แล้ว

    This is probably the best explanation of this on TH-cam

  • @fciapanna
    @fciapanna 6 ปีที่แล้ว +1

    Been watching public/private videos for days. This is the first to make it clear, specifically stated at 1:53 where the private and public are linked to each other. That's the key (pun intended) to understanding how it works. Others take it for granted. You spell it out (in non-cryptic form hahahaha).

  • @gpardhu
    @gpardhu ปีที่แล้ว

    blessed are the souls who impart such valuable information for free

  • @daredevil938
    @daredevil938 17 วันที่ผ่านมา +1

    1:22 Love the 'Sherlock Holmes' reference.

  • @ThatTurtleGirl
    @ThatTurtleGirl ปีที่แล้ว +1

    Great video! I couldn't wrap my brain around this concept and the video cleared things right up.

  • @eraykacmaz
    @eraykacmaz 6 ปีที่แล้ว

    The only video that help me to understand the topic really well. "Mathematically linked with each other..." is the key phrase of understanding. Thanks for video.

  • @marcinsola4179
    @marcinsola4179 6 ปีที่แล้ว +3

    Great job! I'm just going through Bitcoin's whitepaper and this video helped me a lot with understanding the mechanism behind bitcoin transactions. Thank you!

  • @fotoMwahine
    @fotoMwahine 3 ปีที่แล้ว +4

    Thank you so much for this easy to understand explanation. Studying cybersecurity and symmetric/asymmetric encryption; this is right on time. Excellent!

  • @carcamp5451
    @carcamp5451 ปีที่แล้ว

    Damn. I understood after trying to understand for months. You're a life saver. Thanks for your amazing work.

  • @phanurutpeammetta2066
    @phanurutpeammetta2066 2 ปีที่แล้ว

    After watching so many videos about encryption, this is the first one that makes sense to me. Thanks for the simple explanation and beautiful illustration!

  • @lilcoconut3116
    @lilcoconut3116 3 ปีที่แล้ว +1

    Thanks man... I watched a lot of videos but was not able to clearly understand the exact concept, then I came across your video and yoo!! I understand the concept in no time... Thank you so much 😇😊

  • @theblueraven764
    @theblueraven764 ปีที่แล้ว

    Brilliant explanation, thanks! I've been wracking my head over this for ages and then I saw this video. It makes way more sense now!

  • @naeemlhrpk
    @naeemlhrpk 7 หลายเดือนก่อน

    It's really funny that I went through many short video but none was found an easy way to understand this concept.
    This video and the analogy of mailbox messaging made the concept more easy to understand. Thanks

  • @kisme01
    @kisme01 5 ปีที่แล้ว +2

    thank you. finally someone who can explain

  • @brolysmash9333
    @brolysmash9333 2 ปีที่แล้ว

    Omg, dude, this was so straightforward; thank you very much. Cryptography is one of those areas that blows my mind, and today I understood it with a simple video of you.

  • @drisakar7744
    @drisakar7744 4 ปีที่แล้ว +6

    it was simply explained thanks! that helped me a lot for my school work:)

  • @emufandango
    @emufandango 5 ปีที่แล้ว +2

    You’ve got my sub! Thanks for the video, as I’ve been trying to understand this for quite a while, and no one else has been able to explain it to me. Simply put, Alice is encrypting the file in a way that only Bob can understand, and vice versa.

  • @sachinvinith813
    @sachinvinith813 23 วันที่ผ่านมา

    new to this video and concept, but never before understood the concept fully before seeing this video. After seeing this video, I grasped every single concept from this encryption, thank you so much

  • @tmyh
    @tmyh 7 ปีที่แล้ว +3

    Great presentation, you make it easier to figure this new tech for a no-tech person. Keep the blockchain videos coming mate.

  • @Yell3x
    @Yell3x ปีที่แล้ว

    Thank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!

  • @kishcool
    @kishcool 2 ปีที่แล้ว +2

    Great explanation. It would be great to see you explain how you can be sure that you’re using the Alice (or bob) public key and not an attacker public key who would be in the middle.

  • @AmirAli-gv7kn
    @AmirAli-gv7kn 5 ปีที่แล้ว +3

    Thank you. Watching mins before next lecture so that I stay aligned

  • @sabrinemaiz234
    @sabrinemaiz234 6 ปีที่แล้ว

    its awesome how u explain thank you a lot, its beeing one year trying to unterstand this complex IT Security,but i couldnt with all videos in Internet. u just explain it in few minuts and i didnt need to repeat the video thausend time, thank you a lot for your hard work

  • @N3vermake
    @N3vermake 3 ปีที่แล้ว

    Thanks, you summed up a 2h lecture in 4 minutes. Lovely!

  • @mkc0321
    @mkc0321 3 ปีที่แล้ว

    excellent video, i had so much confusion with private and public key stuff ..you explained it so beautifully..your channel deserve the title

  • @אגםיפה-ח7ע
    @אגםיפה-ח7ע ปีที่แล้ว

    the only video that explained it properlly, thank you very much!

  • @zokir.finance
    @zokir.finance 3 ปีที่แล้ว

    Thank GOD, finally I understood the concept, after days of research, this video and youtube channel should be on top))) Simplicity is genious.
    Thank you so much.

  • @jrealentertainment
    @jrealentertainment 3 ปีที่แล้ว

    This is the first video I've seen in a week discussion asymmetric encryption that tells how the public and private keys are generated, and how the public keys are swapped and then the document is resent so that the private key that's paired can decrypt the message.

  • @SiIentSong
    @SiIentSong 5 ปีที่แล้ว +4

    2:53
    Sorry if my question sounds dumb, but if Alice encrypts the sensitive document with Bob's public key, can't others just use Bob's public key to decrypt it since its the same key used to encrypt it?

    • @RobertStineIsTheBest
      @RobertStineIsTheBest 4 ปีที่แล้ว

      @Shadow96 bullshit dude, both keys are used in encryption or decryption depending on different cases. For a digital signature, for instance, PrK is used to encrypt the signature, and PK to decrypt it, which is intentional, just to verify the integrity+authenticity of a given message.

  • @aparnaiyer1199
    @aparnaiyer1199 8 หลายเดือนก่อน

    Straight to the point ! Gives good groundwork to take this forward!

  • @lesleykramer7207
    @lesleykramer7207 6 ปีที่แล้ว +7

    Finally! I understand this! Thanks for a clear, simple explanation.

  • @Wagazes
    @Wagazes 2 ปีที่แล้ว

    2:55 is the moment where it all made sense to me. Awesome! :D

  • @StudyWithNika
    @StudyWithNika 11 หลายเดือนก่อน

    only material on planet earth that helped me finally understand this

  • @mr2_pg
    @mr2_pg 2 ปีที่แล้ว +1

    Thank you so much for this helpful video. You're communication and explanation skills are on point!

  • @briannawooden411
    @briannawooden411 11 หลายเดือนก่อน

    Best explanation of this concept I have come across so far. Thanks!!

  • @ehsanmamakani
    @ehsanmamakani 5 ปีที่แล้ว +2

    @2:09 "they (public and private keys) cannot be derived from each other" I think this is incorrect, because the public key is derived from the private key but you cannot derive the private key from the public key. This makes the one-way function definition.

    • @simplyexplained
      @simplyexplained  5 ปีที่แล้ว

      Yes, that's indeed what I wanted to say

  • @skr0nytbe389
    @skr0nytbe389 5 ปีที่แล้ว +1

    IMO, using Asymmetric keys for data transfer is more complex esp. in Client server model. So, asymmetric encryption is just to exchange ciphers, certificate and server public key to client. Once shared, client generate a per session symmetric key using strong random generator and encrypt with server provided public key and send to server. After that, that symmetric key used to encrypt data for that session. This process repeat for every flows.

  • @buzztrucker
    @buzztrucker ปีที่แล้ว

    Short, sweet, and to the point. Thanks for this great info condensed in short amount of time.

  • @xuanhoahoang6959
    @xuanhoahoang6959 2 ปีที่แล้ว

    Really nice vid, clear and straight forward with a non-IT person like me. Thank you very much

  • @incomparable642
    @incomparable642 6 ปีที่แล้ว

    Finally a video that explains it correctly and super clearly.

  • @1122-q1e
    @1122-q1e 2 ปีที่แล้ว

    This really helped loud, clear and straight to the point!!! Thank you so much

  • @vanderslagmulders
    @vanderslagmulders 4 ปีที่แล้ว +3

    That was very clear. And a bunch more interesting stuff on your channel! 😀👍

  • @aarovas
    @aarovas ปีที่แล้ว

    Finally, someone explains to me how it works. Thanks a lot!

  • @PyThon253
    @PyThon253 5 ปีที่แล้ว +3

    Can you make one that explains Cast-128(Cast5) and the use in PGP? Maybe an explanation video on how the encryption and decryption are used.
    Great video! Wish there were more channels like this.

    • @brd8764
      @brd8764 2 ปีที่แล้ว

      send, en-

  • @timmyhuynh3859
    @timmyhuynh3859 3 ปีที่แล้ว

    the channel name talked for itself. amazing video with clear definition

  • @chenbiton9469
    @chenbiton9469 5 ปีที่แล้ว +3

    Really clarified this topic for me. Thank you for this video!

  • @noorur
    @noorur 4 ปีที่แล้ว +1

    Very good analogy.
    So I'm guessing Bob sent Alice his public key via letterbox. And Alice uses Bob's public key to encrypt message. Once the message gets to Bob, he uses his private key to open the message.
    So a message sent to Bob (encrypted with Bob's public key) can only only be decrypted using his private key. Therefore if anyone wants to send Bob a private message, they have to use Bob's public key to do so.

  • @saar331
    @saar331 6 ปีที่แล้ว

    Perfect explanation, better than my lecturer and now I got the idea clear.

  • @mosespeter9711
    @mosespeter9711 2 ปีที่แล้ว

    The is the best video on internet for this topic. Thanks a bunch!

  • @Adi.4455
    @Adi.4455 5 ปีที่แล้ว +5

    Took me a few vids till this one to finally understand it. Thank you very much

  • @ernestgrouns8710
    @ernestgrouns8710 3 ปีที่แล้ว +1

    Thank you for explaining this in a way that now makes sense to me!! Much appreciated!!

  • @catharperfect7036
    @catharperfect7036 ปีที่แล้ว

    Best explanation of this on youtube.

  • @mrlima2953
    @mrlima2953 2 ปีที่แล้ว

    Excellent video. The most well explained I have found so far on the internet!

  • @mikepawlikguitar
    @mikepawlikguitar 2 ปีที่แล้ว +1

    Shout-out to all the Odin peeps! Thanks, brother. Great video :)

  • @UralaTAO
    @UralaTAO 3 ปีที่แล้ว +6

    Thanks for the information brother!

  • @fatinistiaque5892
    @fatinistiaque5892 2 ปีที่แล้ว +1

    This solved my confusion very easily. Great presentation

  • @J.M.armyOT7
    @J.M.armyOT7 6 ปีที่แล้ว +1

    you should A prof in a university to teach that ... you are amazing ... so easy explanation

  • @mmmcccoc6457
    @mmmcccoc6457 5 หลายเดือนก่อน

    Very clear and straightforward!!!! Bro you save me night!!!!

  • @UnowknKlol
    @UnowknKlol 9 หลายเดือนก่อน

    Good content! the explanation is very easy to understand. I hope all concepts in this world has videos that explained them as good as this.

  • @francis191
    @francis191 2 ปีที่แล้ว

    Clear and concise. To the point with great graphical representation.

  • @tinywarriorfox
    @tinywarriorfox 2 ปีที่แล้ว +4

    This video is brilliant! A tricky concept, explained in an easy-to-understand way. I've been trying to get my head around how PGP works for ages and I finally feel like I kind of understand it at last. Thank you!

    • @Wasko2
      @Wasko2 10 หลายเดือนก่อน

      The thing is, it's not tricky at all. It's so damned simple, but for some reason 99% of the people out there explaining it have no clue how to communicate properly. Scatter brains, get to the point for crying out loud.

  • @the_3sisters_gacha350
    @the_3sisters_gacha350 22 วันที่ผ่านมา

    This is like sending secret codes to your classmate during study lessons, coding and decoding text just so no one peeks and listens on, but this makes things way easier by automatically coding and de coding it through digital devices

  • @ROHANKULSHRESHTHA-x9u
    @ROHANKULSHRESHTHA-x9u ปีที่แล้ว +1

    sweet and simple , just what i needed , thanks a ton

  • @RabbitConfirmed
    @RabbitConfirmed 2 ปีที่แล้ว

    Great, I never understood why it is more safe. I simply never understood, that the public key is first shared, and the other person then uses your private key to encrypt the message.
    Stupid but idk, nobody explained it well so far.
    Thanks a lot!

  • @cutecats6105
    @cutecats6105 3 ปีที่แล้ว

    I have been trying to understand this for last 1 year but only now it makes me feel that I understand this without any confusion 👍

    • @equim7363
      @equim7363 3 ปีที่แล้ว

      The fact that you spent 1 year trying to understand the concept, and then caught it just watching 4-minutes video, tells that you didn't put any effort into it during the whole year.

    • @cutecats6105
      @cutecats6105 3 ปีที่แล้ว

      @@equim7363 Haha you judge people's effort so easily..

    • @equim7363
      @equim7363 3 ปีที่แล้ว

      @@cutecats6105 yes I am so arrogant

  • @cryptocosmos7128
    @cryptocosmos7128 5 ปีที่แล้ว

    You have definitely lived up to your channel name with this one. Nice work.

  • @mahaaboubi4773
    @mahaaboubi4773 28 วันที่ผ่านมา

    Man i love you, i finally understood how it works, thank you so much ❤❤❤❤❤