Asymmetric Encryption - Simply explained

  Переглядів 1,312,820

Simply Explained

Simply Explained

6 років тому

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain all of these in plain English!
💌 Sign up for Simply Explained Newsletter:
newsletter.simplyexplained.com
Monthly newsletter with cool stuff I found on the internet (related to science, technology, biology, and other nerdy things)! No spam. Ever. Promise!
🌍 Social
Twitter: / savjee
Facebook: / savjee
Blog: savjee.be
❤️ Become a Simply Explained member: / @simplyexplained
#encryption #simplyexplained

КОМЕНТАРІ: 845
@johnathonbatz662
@johnathonbatz662 2 роки тому
the mailbox analogy of everyone knowin the address of the mailbox being the public key, and only the mailbox owner with the keys to his own mailbox as the private key, is a really really really well done analogy. probably the best one ive seen so far with relating public/private keys as a concept to everyday life and making it easier to understand.
@mjk012579
@mjk012579 3 роки тому
Very clear and straightforward. I’ve been beating myself over the head with this topic in my fundamentals class and this just made the differences make a whole lot more sense
@justArandomfellar
@justArandomfellar 8 місяців тому
same
@tadeob_UB
@tadeob_UB 7 місяців тому
likewise
@ender5023
@ender5023 4 місяці тому
Same! This totally makes sense to me now!
@SannySinghs
@SannySinghs 6 років тому
LoL 221b BakerStreet . I have been trying to understand Asymmetric encryption concept for nearly 3 hours. None of the clips i watch explained as clearly as you do about exchanging public key. Well done. Thank you so much
@simplyexplained
@simplyexplained 6 років тому
You're the first one who noticed the address! Thanks for the kind words ;)
@JonathanCoffey1087
@JonathanCoffey1087 6 років тому
Same here, this idea helped me a little. Since most of these videos keep mentioning TONS of keys, why not use a lock analogy? We generate a key pair, one public and one private. Think of the public key as the unique "lock" you've just made. You can give that lock to as many friends as you want. If you send me your lock, I can put anything in a box and put your lock on it. Once secured with your custom lock, I can no longer open or see the contents of that box without your key that's paired with that lock.
@juancamilo1370
@juancamilo1370 5 років тому
everyone talks about keys here and there but nobody mention the interchange step... good explanation!
@teddyboggs1851
@teddyboggs1851 5 років тому
As an American I can honestly say 221 baker is literally the only address I know in that entire country.
@TheVirumXD
@TheVirumXD 5 років тому
Teddy Boggs Sherlock
@kairollmann
@kairollmann 6 років тому
And the next important thing to understand is: Asymmetric encryption algorithms take WAY longer than symmetric encryption algorithms. So people 1) use symmetric encryption to encrypt LARGE amounts of data / files, 2) encrypt the symmetric key with asymmetric encryption and 3) send that (asymmetrically) encrypted symmetric key together with the (symmetrically) encrypted file.
@simplyexplained
@simplyexplained 6 років тому
+Kai Rollmann jep, 100% true. Should've added that to the video.
@Markd315
@Markd315 5 років тому
And after that, probably how RSA can also be used to sign and verify data integrity.
@lallu1122
@lallu1122 5 років тому
I never thought about it! Great!!
@sivasankarclouddeveloper1114
@sivasankarclouddeveloper1114 5 років тому
Thank you Kai Rollmann
@uayfb1
@uayfb1 4 роки тому
I believe that is how Pretty Good Privacy works.
@alvfig
@alvfig 6 років тому
Great introduction, even for non-technical people. Thanks a lot! I'd love if you could make a similar video to digital signature.
@ACEofMCB
@ACEofMCB 6 років тому
Awesome explanation and graphics for a visual understanding. I was looking for something simple to show friends and family and you've covered it better than I ever could, thank you!
@scienceblossom6197
@scienceblossom6197 5 років тому
It used to be super complicated for me but even watching this awesome video up to 02:16 helped me understand how public/private keys work in general and now it makes TOTAL sense. THANKS!
@aditi3112
@aditi3112 5 років тому
Wow..how clearly & beautifully explained. From a long -long time, I was highly confused why 2 keys in asymmetric encryption...never been able to understand...but your explanation made it clear completely. Tons of thanks to you :)
@marriagedance8657
@marriagedance8657 6 років тому
You deserve so much more subscribers.. Hats off
@supadupaforever
@supadupaforever 6 років тому
Thanks for keeping it simple, yet intriguingly educational for a layman curious as to how this technology works in the World Wide Web. Much appreciated sir!
@RM_1964
@RM_1964 5 років тому
Man you explained it in so much simple manner. I don't even need to note it anywhere. It was like a story that's in my head. Thanks a lot sir.
@anirudhpathak2559
@anirudhpathak2559 5 років тому
The best and clearest description of public-private key cryptography I have seen so far!
@OHTV2016
@OHTV2016 6 років тому
Excellent video, I’ve been watching many videos about this topic and you’re the only one who I actually understood from. Wonderful Job ❤️
@tmyh
@tmyh 6 років тому
Great presentation, you make it easier to figure this new tech for a no-tech person. Keep the blockchain videos coming mate.
@AbhijitChandekar
@AbhijitChandekar 4 роки тому
This is the best video on public key encryption. What i found was that, many other videos does not mention the fact that the public keys are exchanged between the two parties. Thank you to the maker of this video!!!
@simplyexplained
@simplyexplained 4 роки тому
Glad you liked it!
@anandarivu
@anandarivu 6 років тому
This is the best video to understand the algorithm. I was always amused at how ssh works with keys. No one ever showed the exchange of public keys. Thanks a lot for the video.
@simplyexplained
@simplyexplained 6 років тому
Glad you liked it! Cheers!
@lakerfan4life308
@lakerfan4life308 Рік тому
Excellent explanation on asymmetric encryption. I was uncertain on how could the encryption of locking/unlocking the data worked since the private key never crossed the wire. You introduced and delivered that difficult concept in an easy relatable manner. Thank you for that! Best video ever. I now feel more confident about asymmetric encryption.
@falmanna
@falmanna 6 років тому
Very nice and clear presentation
@simplyexplained
@simplyexplained 6 років тому
Thank you very much! First time I'm trying this new way of creating video's. Glad you liked it!
@abodexblode2347
@abodexblode2347 4 роки тому
Firas almannaa what the different b/n Encryptions and programming
@erasmonascimento6298
@erasmonascimento6298 3 роки тому
@@simplyexplained ou pega
@reginaluciaferreiralimafer1817
@reginaluciaferreiralimafer1817 3 роки тому
Bom
@reginaluciaferreiralimafer1817
@reginaluciaferreiralimafer1817 3 роки тому
Bom, dzzjbc
@phanurutpeammetta2066
@phanurutpeammetta2066 Рік тому
After watching so many videos about encryption, this is the first one that makes sense to me. Thanks for the simple explanation and beautiful illustration!
@buzztrucker
@buzztrucker 8 місяців тому
Short, sweet, and to the point. Thanks for this great info condensed in short amount of time.
@chenbiton9469
@chenbiton9469 5 років тому
Really clarified this topic for me. Thank you for this video!
@Notaraehs
@Notaraehs 6 років тому
Your channel is amazing. Keep them coming!
@user-uf6fs2rn6s
@user-uf6fs2rn6s Рік тому
This really helped loud, clear and straight to the point!!! Thank you so much
@fotoMwahine
@fotoMwahine 2 роки тому
Thank you so much for this easy to understand explanation. Studying cybersecurity and symmetric/asymmetric encryption; this is right on time. Excellent!
@seetsamolapo5600
@seetsamolapo5600 9 місяців тому
Which cert?
@ernestgrouns8710
@ernestgrouns8710 2 роки тому
Thank you for explaining this in a way that now makes sense to me!! Much appreciated!!
@Nawdiral
@Nawdiral 6 років тому
The key words here I was really looking for since a while are: "...algorithm will generate a public and private key that are mathematically linked to each othere. Public keys can be used to encrypt data and only the matching private key can be used to decrypt it.".
@futuresocieties.
@futuresocieties. 5 років тому
High levels of security with mathematics.
@futuresocieties.
@futuresocieties. 5 років тому
Mathematics that provide high levels of security.
@JayLim-bn9fh
@JayLim-bn9fh 3 роки тому
Holy lil fuck! Thanks!
@TheGadgetwiz
@TheGadgetwiz 3 роки тому
This kind of irritated me because this was the reason I was watching the video. I wanted to know HOW that part worked. I already knew all the other pieces.
@penguin-tc1cx
@penguin-tc1cx 3 роки тому
@@TheGadgetwiz this channel and video is called "simply explained" for a reason... if you want to learn the more complex process behind it, you should do research or watch other videos. don't complain lmao
@AmirAli-gv7kn
@AmirAli-gv7kn 4 роки тому
Thank you. Watching mins before next lecture so that I stay aligned
@diegoguzman4631
@diegoguzman4631 5 років тому
I was able to understand how asymmetric encryption works in just 4:40 mins! Thanks a lot!!!
@happyboy2323
@happyboy2323 3 роки тому
Just what is it, not how it works
@mr2_pg
@mr2_pg Рік тому
Thank you so much for this helpful video. You're communication and explanation skills are on point!
@ThatTurtleGirl
@ThatTurtleGirl 7 місяців тому
Great video! I couldn't wrap my brain around this concept and the video cleared things right up.
@sabrinemaiz234
@sabrinemaiz234 5 років тому
its awesome how u explain thank you a lot, its beeing one year trying to unterstand this complex IT Security,but i couldnt with all videos in Internet. u just explain it in few minuts and i didnt need to repeat the video thausend time, thank you a lot for your hard work
@mkc0321
@mkc0321 2 роки тому
excellent video, i had so much confusion with private and public key stuff ..you explained it so beautifully..your channel deserve the title
@codecleric4972
@codecleric4972 Рік тому
This is probably the best explanation of this on UKposts
@mailinlindved6214
@mailinlindved6214 5 років тому
Very pedagogically explain. Thanks, keep up the good work!
@aparnaiyer1199
@aparnaiyer1199 18 днів тому
Straight to the point ! Gives good groundwork to take this forward!
@eyewaves...
@eyewaves... 2 роки тому
Watched some of your videos - they are really cool, informative and accurate enough. Great job and thank you.
@cryptocosmos7128
@cryptocosmos7128 5 років тому
You have definitely lived up to your channel name with this one. Nice work.
@lilcoconut3116
@lilcoconut3116 2 роки тому
Thanks man... I watched a lot of videos but was not able to clearly understand the exact concept, then I came across your video and yoo!! I understand the concept in no time... Thank you so much 😇😊
@Yell3x
@Yell3x 11 місяців тому
Thank you so much! This really answered all my remaining questions, just got taught it and asked things like, why would it be public when you can reverse the process and etc. That mailbox example really did it for me!
@brolysmash9333
@brolysmash9333 Рік тому
Omg, dude, this was so straightforward; thank you very much. Cryptography is one of those areas that blows my mind, and today I understood it with a simple video of you.
@theblueraven764
@theblueraven764 Рік тому
Brilliant explanation, thanks! I've been wracking my head over this for ages and then I saw this video. It makes way more sense now!
@mosespeter9711
@mosespeter9711 Рік тому
The is the best video on internet for this topic. Thanks a bunch!
@lesleykramer7207
@lesleykramer7207 5 років тому
Finally! I understand this! Thanks for a clear, simple explanation.
@francis191
@francis191 2 роки тому
Clear and concise. To the point with great graphical representation.
@benny.6588
@benny.6588 2 роки тому
Excellent, this kind of analogies, depicts better the problem for being understood, as the coffer or something like it, than a plain explanation declaring rules and results, because is better mentally thought in mind...beyond and respecting the math matter that is another more complex and low lever discussion. i love this class of analogy when is well applied. thanks for the video
@duyanh2471
@duyanh2471 2 роки тому
thank you so much for explaining this. It took me so long to understand this technical concept until I found your video.
@N3vermake
@N3vermake 2 роки тому
Thanks, you summed up a 2h lecture in 4 minutes. Lovely!
@kishcool
@kishcool 2 роки тому
Great explanation. It would be great to see you explain how you can be sure that you’re using the Alice (or bob) public key and not an attacker public key who would be in the middle.
@joshvanathan1000
@joshvanathan1000 4 роки тому
Perfect explain !! Thank you for your effort
@kisme01
@kisme01 5 років тому
thank you. finally someone who can explain
@emufandango
@emufandango 5 років тому
You’ve got my sub! Thanks for the video, as I’ve been trying to understand this for quite a while, and no one else has been able to explain it to me. Simply put, Alice is encrypting the file in a way that only Bob can understand, and vice versa.
@fatinistiaque5892
@fatinistiaque5892 Рік тому
This solved my confusion very easily. Great presentation
@MrRahulKumarKandula
@MrRahulKumarKandula 5 років тому
You cleared my confusion. Thanks a ton. Good presentation too.
@GrantClementi
@GrantClementi 8 місяців тому
Beautifully put, thank you.
@keithfreeman2139
@keithfreeman2139 3 роки тому
I have a Cyber-Security Test coming up Tuesday. These videos have helped me a lot. Thank you.
@Tamilkaraokevideos
@Tamilkaraokevideos 2 роки тому
The mailbox example nailed it.. Thanks for the ghaphics and explanation.
@-MikaelaWuisan
@-MikaelaWuisan 2 роки тому
Thank youu so much for this easy to understand explanation! Truly truly helpful :)
@kaushal4nanda867
@kaushal4nanda867 5 років тому
Best and simple explanation.. Thank you
@aqua123670
@aqua123670 6 років тому
nice explanation, clear and concise, also you put a great analogy there
@zokir.finance
@zokir.finance 2 роки тому
Thank GOD, finally I understood the concept, after days of research, this video and youtube channel should be on top))) Simplicity is genious. Thank you so much.
@mrlima2953
@mrlima2953 2 роки тому
Excellent video. The most well explained I have found so far on the internet!
@gpardhu
@gpardhu Рік тому
blessed are the souls who impart such valuable information for free
@mehul1458h
@mehul1458h 3 роки тому
that's very smooth explain of asymmetric encryption. I have read many paragraph to learn that but i didn't understand. very heplfull. thanks for that
@ecommercetechbuild1354
@ecommercetechbuild1354 Рік тому
Simple and clean explanation. Kudos to you
@godlychild7925
@godlychild7925 4 роки тому
Fantastically explained! Thank you.
@xuanhoahoang6959
@xuanhoahoang6959 2 роки тому
Really nice vid, clear and straight forward with a non-IT person like me. Thank you very much
@user-np5ig1pn1o
@user-np5ig1pn1o Рік тому
sweet and simple , just what i needed , thanks a ton
@adityabhat3108
@adityabhat3108 4 роки тому
Thank you.. the concept was really well explained :)
@PyThon253
@PyThon253 5 років тому
Can you make one that explains Cast-128(Cast5) and the use in PGP? Maybe an explanation video on how the encryption and decryption are used. Great video! Wish there were more channels like this.
@brd8764
@brd8764 Рік тому
send, en-
@abelashenafi6291
@abelashenafi6291 4 роки тому
Video truly worth watching. Thanks for the vivid explanation
@Ahmad-iu8dq
@Ahmad-iu8dq 3 дні тому
The mailbox analogy is a state of the art. Well done!
@saar331
@saar331 5 років тому
Perfect explanation, better than my lecturer and now I got the idea clear.
@eraykacmaz
@eraykacmaz 5 років тому
The only video that help me to understand the topic really well. "Mathematically linked with each other..." is the key phrase of understanding. Thanks for video.
@chamjeewantha
@chamjeewantha 4 роки тому
Thank you for shearing your knowledge
@Chris-ez1ly
@Chris-ez1ly 3 роки тому
Very nice job explaining. Thank you for a job well done. Helps a ton.
@carcamp5451
@carcamp5451 4 місяці тому
Damn. I understood after trying to understand for months. You're a life saver. Thanks for your amazing work.
@alyssayoung421
@alyssayoung421 4 роки тому
thanks for helping me understand this concept!
@pranavchebolu7961
@pranavchebolu7961 5 років тому
This video really helps explain this concept. Awesome presentation
@penguinmonk7661
@penguinmonk7661 3 роки тому
Thank you, this was a very good refresher and a great example to share with students.
@user-ps3zo7ux1e
@user-ps3zo7ux1e 5 місяців тому
the only video that explained it properlly, thank you very much!
@at_tap
@at_tap 5 років тому
Very very simple and well explained, thank you
@UnowknKlol
@UnowknKlol Місяць тому
Good content! the explanation is very easy to understand. I hope all concepts in this world has videos that explained them as good as this.
@Karen-jj9xe
@Karen-jj9xe 10 місяців тому
Excellent explanation - greatly appreciated!
@luisrios1989
@luisrios1989 Рік тому
I love you! The mail box analogy made me understand everything.
@tasapornv
@tasapornv Рік тому
Thanks for this. It is well explained and very easy to understand. Keep up good work.
@mrplay.playful
@mrplay.playful 3 роки тому
Thank you so much. Well explained. I now understand asymetric encryption
@anshumanbaruah4161
@anshumanbaruah4161 5 місяців тому
Beautifully explained. Thanks! I now have a better understanding.
@joehaynes6829
@joehaynes6829 5 років тому
Watched three videos on symmetrical Encryption , only this one made sense to me , good video
@PatrickHarlen
@PatrickHarlen 6 років тому
This is amazing work! Keep going. It's a very helpful content.
@ttaylor705
@ttaylor705 4 місяці тому
Simply explained! I really enjoyed the video. Thanks for this.
@MegaKalkas
@MegaKalkas 6 років тому
You should also mention that encryption works in the other way too. An encrypted message with a private key can be decrypted only by the paired public key and this insures that the sender (or whoever encrypted the message) is indeed trusted.
@germantarnoski7130
@germantarnoski7130 5 місяців тому
Genius
@parasjoshi7479
@parasjoshi7479 6 років тому
ThankU sir for clearing this concept 😊
@theartofhacking6896
@theartofhacking6896 2 роки тому
I was always struggling to grasp the concept of asymmetric keys but now, within only 4:40 mins it became crystal clear. Keep it up. :)
@brd8764
@brd8764 Рік тому
rightly and it is prosper.
@mikel.2909
@mikel.2909 6 років тому
Subscribed due to your valuable videos! Keep it up!
@incomparable642
@incomparable642 6 років тому
Finally a video that explains it correctly and super clearly.
@bearlifejourney
@bearlifejourney Рік тому
very well-explained video! thank you!
@VijaySinghSambasivam
@VijaySinghSambasivam 3 роки тому
Very well explained. What software did you use to create the video?
@jamarama2242
@jamarama2242 2 роки тому
Finally Understand it. Thanks man!
@user-ku1bv9go6t
@user-ku1bv9go6t 9 місяців тому
great work thanks for good exmplain. finally i understand how is it working
@aminekettani3538
@aminekettani3538 3 роки тому
Thank you very much for your videos! They are amazing and give a lot of value
Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
12:33
Passwords & hash functions (Simply Explained)
7:28
Simply Explained
Переглядів 361 тис.
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Переглядів 925 тис.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Переглядів 933 тис.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Fireship
Переглядів 1,2 млн
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Переглядів 95 тис.
How secure is 256 bit security?
5:06
3Blue1Brown
Переглядів 3,1 млн
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Переглядів 159 тис.
End to End Encryption (E2EE) - Computerphile
8:12
Computerphile
Переглядів 739 тис.
Which Phone Unlock Code Will You Choose? 🤔️
0:12
Game9bit
Переглядів 6 млн
Rabbit R1: Barely Reviewable
19:53
Marques Brownlee
Переглядів 7 млн
Rabbit R1: Barely Reviewable
19:53
Marques Brownlee
Переглядів 7 млн