Asymmetric Encryption - Simply explained
ฝัง
- เผยแพร่เมื่อ 29 ต.ค. 2017
- How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain all of these in plain English!
💌 Sign up for Simply Explained Newsletter:
newsletter.simplyexplained.com
Monthly newsletter with cool stuff I found on the internet (related to science, technology, biology, and other nerdy things)! No spam. Ever. Promise!
🌍 Social
Twitter: / savjee
Facebook: / savjee
Blog: savjee.be
❤️ Become a Simply Explained member: / @simplyexplained
#encryption #simplyexplained - วิทยาศาสตร์และเทคโนโลยี
the mailbox analogy of everyone knowin the address of the mailbox being the public key, and only the mailbox owner with the keys to his own mailbox as the private key, is a really really really well done analogy. probably the best one ive seen so far with relating public/private keys as a concept to everyday life and making it easier to understand.
Very clear and straightforward. I’ve been beating myself over the head with this topic in my fundamentals class and this just made the differences make a whole lot more sense
same
likewise
Same! This totally makes sense to me now!
LoL 221b BakerStreet . I have been trying to understand Asymmetric encryption concept for nearly 3 hours. None of the clips i watch explained as clearly as you do about exchanging public key. Well done. Thank you so much
You're the first one who noticed the address! Thanks for the kind words ;)
Same here, this idea helped me a little. Since most of these videos keep mentioning TONS of keys, why not use a lock analogy? We generate a key pair, one public and one private. Think of the public key as the unique "lock" you've just made. You can give that lock to as many friends as you want. If you send me your lock, I can put anything in a box and put your lock on it. Once secured with your custom lock, I can no longer open or see the contents of that box without your key that's paired with that lock.
everyone talks about keys here and there but nobody mention the interchange step... good explanation!
As an American I can honestly say 221 baker is literally the only address I know in that entire country.
Teddy Boggs Sherlock
And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymmetric encryption and 3) send that (asymmetrically) encrypted symmetric key together with the (symmetrically) encrypted file.
+Kai Rollmann jep, 100% true. Should've added that to the video.
And after that, probably how RSA can also be used to sign and verify data integrity.
I never thought about it! Great!!
Thank you Kai Rollmann
I believe that is how Pretty Good Privacy works.
This is the first time I actually understood this after watching many videos about it. Thx
Awesome explanation and graphics for a visual understanding. I was looking for something simple to show friends and family and you've covered it better than I ever could, thank you!
Great introduction, even for non-technical people. Thanks a lot! I'd love if you could make a similar video to digital signature.
It used to be super complicated for me but even watching this awesome video up to 02:16 helped me understand how public/private keys work in general and now it makes TOTAL sense. THANKS!
Wow..how clearly & beautifully explained. From a long -long time, I was highly confused why 2 keys in asymmetric encryption...never been able to understand...but your explanation made it clear completely. Tons of thanks to you :)
Very nice and clear presentation
Thank you very much! First time I'm trying this new way of creating video's. Glad you liked it!
Firas almannaa what the different b/n Encryptions and programming
@@simplyexplained ou pega
Bom
Bom, dzzjbc
The key words here I was really looking for since a while are: "...algorithm will generate a public and private key that are mathematically linked to each othere. Public keys can be used to encrypt data and only the matching private key can be used to decrypt it.".
High levels of security with mathematics.
Mathematics that provide high levels of security.
Holy lil fuck! Thanks!
This kind of irritated me because this was the reason I was watching the video. I wanted to know HOW that part worked. I already knew all the other pieces.
@@TheGadgetwiz this channel and video is called "simply explained" for a reason... if you want to learn the more complex process behind it, you should do research or watch other videos. don't complain lmao
Thank you this is my first comment in the TH-cam you deserve it. Thank you.
Thanks for keeping it simple, yet intriguingly educational for a layman curious as to how this technology works in the World Wide Web. Much appreciated sir!
Excellent video, I’ve been watching many videos about this topic and you’re the only one who I actually understood from. Wonderful Job ❤️
Man you explained it in so much simple manner. I don't even need to note it anywhere. It was like a story that's in my head. Thanks a lot sir.
The best and clearest description of public-private key cryptography I have seen so far!
You deserve so much more subscribers.. Hats off
Excellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.
This really helped loud, clear and straight to the point!!! Thank you so much
Really clarified this topic for me. Thank you for this video!
After watching so many videos about encryption, this is the first one that makes sense to me. Thanks for the simple explanation and beautiful illustration!
Best explanation of this concept I have come across so far. Thanks!!
This is the best video on public key encryption. What i found was that, many other videos does not mention the fact that the public keys are exchanged between the two parties. Thank you to the maker of this video!!!
Glad you liked it!
Straight to the point ! Gives good groundwork to take this forward!
Great presentation, you make it easier to figure this new tech for a no-tech person. Keep the blockchain videos coming mate.
the only video that explained it properlly, thank you very much!
This is the best video to understand the algorithm. I was always amused at how ssh works with keys. No one ever showed the exchange of public keys.
Thanks a lot for the video.
Glad you liked it! Cheers!
Thanks, you summed up a 2h lecture in 4 minutes. Lovely!
Very pedagogically explain. Thanks, keep up the good work!
The is the best video on internet for this topic. Thanks a bunch!
This is probably the best explanation of this on TH-cam
Short, sweet, and to the point. Thanks for this great info condensed in short amount of time.
its awesome how u explain thank you a lot, its beeing one year trying to unterstand this complex IT Security,but i couldnt with all videos in Internet. u just explain it in few minuts and i didnt need to repeat the video thausend time, thank you a lot for your hard work
Thank you so much for this easy to understand explanation. Studying cybersecurity and symmetric/asymmetric encryption; this is right on time. Excellent!
Which cert?
Thank you for explaining this in a way that now makes sense to me!! Much appreciated!!
The mailbox example nailed it.. Thanks for the ghaphics and explanation.
Thank you. Watching mins before next lecture so that I stay aligned
You should also mention that encryption works in the other way too. An encrypted message with a private key can be decrypted only by the paired public key and this insures that the sender (or whoever encrypted the message) is indeed trusted.
Genius
thank you. finally someone who can explain
Clear and concise. To the point with great graphical representation.
Best explanation of this on youtube.
I was able to understand how asymmetric encryption works in just 4:40 mins! Thanks a lot!!!
Just what is it, not how it works
how can anyone dislike this video? He explained the concept very clearly.
Exactly my thought 🤣🤣 people, i swear. Lol
maybe because he doesn't mentioned the double encryption with senders private and recipients public key
Must be the other youtube chanels that failed to explain it better than this video hahahahah
trolls...
people who don't speak human
Thank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!
sweet and simple , just what i needed , thanks a ton
Thank you so much for this helpful video. You're communication and explanation skills are on point!
Your channel is amazing. Keep them coming!
Brilliant explanation, thanks! I've been wracking my head over this for ages and then I saw this video. It makes way more sense now!
Finally Understand it. Thanks man!
This took years for my brain to click, it's hard to grasp when you don't have much experience (IE still in school) - but it all makes sense now :) If you're struggling with this concept don't give up, it finally clicked for me after revisiting the subject once in a while
excellent video, i had so much confusion with private and public key stuff ..you explained it so beautifully..your channel deserve the title
The mailbox analogy is a state of the art. Well done!
Finally! I understand this! Thanks for a clear, simple explanation.
Finally, someone explains to me how it works. Thanks a lot!
Clear and concise! Thanks!
Fantastically explained! Thank you.
It's really funny that I went through many short video but none was found an easy way to understand this concept.
This video and the analogy of mailbox messaging made the concept more easy to understand. Thanks
Excellent video. The most well explained I have found so far on the internet!
Damn. I understood after trying to understand for months. You're a life saver. Thanks for your amazing work.
Good content! the explanation is very easy to understand. I hope all concepts in this world has videos that explained them as good as this.
Omg, dude, this was so straightforward; thank you very much. Cryptography is one of those areas that blows my mind, and today I understood it with a simple video of you.
This is a super clear explanation.
Beautifully explained. Thanks!
I now have a better understanding.
Excellent explanation - greatly appreciated!
Finally a video that explains it correctly and super clearly.
best video ever explained ! thank you very much
blessed are the souls who impart such valuable information for free
Simply explained! I really enjoyed the video. Thanks for this.
You’ve got my sub! Thanks for the video, as I’ve been trying to understand this for quite a while, and no one else has been able to explain it to me. Simply put, Alice is encrypting the file in a way that only Bob can understand, and vice versa.
Watched some of your videos - they are really cool, informative and accurate enough. Great job and thank you.
Simple and clean explanation. Kudos to you
very well-explained video! thank you!
This the best explanation. Superb!!!
Good job! Very straightforward.
that's very smooth explain of asymmetric encryption.
I have read many paragraph to learn that but i didn't understand.
very heplfull. thanks for that
I love you! The mail box analogy made me understand everything.
I was always struggling to grasp the concept of asymmetric keys but now, within only 4:40 mins it became crystal clear. Keep it up. :)
rightly and it is prosper.
Brilliantly, simply explained!
Best and simple explanation.. Thank you
Thanks man... I watched a lot of videos but was not able to clearly understand the exact concept, then I came across your video and yoo!! I understand the concept in no time... Thank you so much 😇😊
The only video that help me to understand the topic really well. "Mathematically linked with each other..." is the key phrase of understanding. Thanks for video.
Really nice vid, clear and straight forward with a non-IT person like me. Thank you very much
Thanks to the CS Team for sharing this video
Beautifully put, thank you.
You cleared my confusion. Thanks a ton. Good presentation too.
That was easy to digest and understand. Thank you.
great video, thanks! the best explainer videos like this one take a complex topic and simplify it
I have a Cyber-Security Test coming up Tuesday. These videos have helped me a lot. Thank you.
Brilliant Concise Explanation
thanks for helping me understand this concept!
Very clear and right to the point thank you
I watched like 5 videos on this and this one is the best.
Between the video, I thought that u should give this guy a like but then accidentally closed the video when I had finished so I had to open it again just to like it. Good work!
Thank you for making it too easy to understand
This solved my confusion very easily. Great presentation
thank you so much for explaining this. It took me so long to understand this technical concept until I found your video.
Very comprehensive. Thanks!
Very very simple and well explained, thank you
Very nice job explaining. Thank you for a job well done. Helps a ton.
Simple yet very clear. Good job
Thanks a lot!