What is Public and Private Key Encryption?

  Рет қаралды 87,710

Programming w/ Professor Sluiter

Programming w/ Professor Sluiter

Күн бұрын

Go to StudyCoding.org to subscribe to the full list of courses and get source code for projects.
How does public and private key encryption work? How is asynchronous encryption different than symmetric encryption?
Full course playlist for secure web development
• 00 Web and Database Se...
Full course playlist for Information Security
• Information Security 1...
Contents
0:00 Types of cryptography - Caesar DES AES asymmetric and hashing
0:45 Symmetric vs asymmetric encryption
1:15 public vs private keys
1:30 Whitfield Diffie New Directions in Cryptography
1:55 PGP Phil Zimmerman 1991 US Customs
2:50 Symmetric Encryption Standard Password Problems
4:10 Asymmetric encryption advantages
4:50 GPG gen-key
5:10 Share public key in GPG
5:35 import public key into gpg encrypt for user

Пікірлер: 78
@ricardo_alonzo
@ricardo_alonzo 3 жыл бұрын
I have to say, I watched some of your videos on WCF during my last quarter and they were super helpful. I'm glad you've made videos on this topic as well, because now I have a cripto class to prepare for! Thank you!
@anngelnailsnailartist106
@anngelnailsnailartist106 3 жыл бұрын
Wow thxxxxx !!!! Really good explanation
@DataVids
@DataVids 2 жыл бұрын
Great video Shad. Well done
@myajayb
@myajayb Жыл бұрын
Very simple and elegant explanation. Love it.
@shadsluiter
@shadsluiter Жыл бұрын
Thank you!
@BenEverett1
@BenEverett1 2 жыл бұрын
How about adding a link to the next video in the comments? Otherwise, I can't find it. It should also be explained that public and private keys are generated together and they are mathematically related to one another. A public can't be used to derive the private key and vice versa. Without telling the view that, the viewer will never quite understand how the keys can work and be secure.
@adrianavargova
@adrianavargova 2 жыл бұрын
That is why I was left puzzled. I still do not understand how I obtain that private key? And how do I use it in real life as a general user? I do not get it.
@ggo4844
@ggo4844 2 жыл бұрын
Very smooth explaination. I was confused before I watched the video, but then all became clear. Just a question came to my mind while reading the comment. Do my friend and I have to have the same tool of encryption or everyone can have his own tool. Thank you,
@kavinyudhitia
@kavinyudhitia 2 жыл бұрын
This is crazy helpful. thanks a lot!!
@iliassaek4609
@iliassaek4609 3 жыл бұрын
Very clear thank you
@emmanuelevuazeze4729
@emmanuelevuazeze4729 4 жыл бұрын
Thank you prof
@Michelle-jc6gr
@Michelle-jc6gr 2 жыл бұрын
Thank you! This was great!
@lukakavteli9441
@lukakavteli9441 3 жыл бұрын
i don't get it like u can encrypt with the public key but how he decrypts with his private key if i did encryption? when i havn't sent any password? how i allow my friends privet keys to decrypt it?
@mustarikulislam719
@mustarikulislam719 3 жыл бұрын
Thank you so much, sir. It helped me out.
@shadsluiter
@shadsluiter 3 жыл бұрын
Glad it helped. Let me guess. You are studying in a computer science program.
@mustarikulislam719
@mustarikulislam719 2 жыл бұрын
@@shadsluiter no sir, I am enrolled in a BBA program :'3
@thawfeekyahya007
@thawfeekyahya007 3 жыл бұрын
Nice Explanation. Thanks
@koffyk4740
@koffyk4740 3 жыл бұрын
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software.
@robertbaindourov134
@robertbaindourov134 3 жыл бұрын
Great video!
@shadsluiter
@shadsluiter 3 жыл бұрын
Thanks for the visit
@exodus8213
@exodus8213 Жыл бұрын
I would like to know is there a way to know if a public keys private key is odd or random
@arjumandvillagecooking
@arjumandvillagecooking 3 жыл бұрын
really nice well explained i
@shmoo42
@shmoo42 2 жыл бұрын
I randomly found this video while working on my essay for Communications in Grand Canyon University!
@kaushikdr
@kaushikdr 3 жыл бұрын
Wonderful video! I am still a bit confused about how using a public/private key solves the problem of having your key stolen in transfer? Even if I share my public key to the entire world, when I send an email to someone, they have to have the right private key to open it. Don't I have to give them the private key ahead of time? Also, what is the point of even knowing the sender's public key and putting it globally for decrypting a message? The only thing that should matter is the private key, right?
@shadsluiter
@shadsluiter 3 жыл бұрын
Each person has his/her own private key. You never share the private key. The encryption has to include the recipient's username when encrypting the document. Here is a demo of how to use GPG kzfaq.info/get/bejne/fLKKf7miyMullXU.html
@yapayzeka
@yapayzeka 2 жыл бұрын
when I lock the message with privkey and send to world -> it proofs the message comes from me when they can unlock the message with my pubkey. when someone want to send me secret message they lock the message with my pubkey and send to me -> only I can open it with my privkey.
@robertiglehart
@robertiglehart 2 жыл бұрын
You need to think differently. You are thinking "backwards". If you want to send someone else an encrypted email for them to open, THEY need to send you their public key. They need to take the initiative and create a private/public key and send you the public.
@adrianavargova
@adrianavargova 2 жыл бұрын
@@robertiglehart No, I understood the Alyeska's question totally. It is not because we think backwards. Probably it was not explained thoroughly. So my emails are not encrypted at all? And if I want to send an encrypted message, the recipient must generate some keys? So the recipient has to have some special software? Sorry, I am asking as an amateur, who does not get the point.
@youtwolobote5288
@youtwolobote5288 4 жыл бұрын
Good sir
@yapayzeka
@yapayzeka 2 жыл бұрын
0:45 image is misleading. open and lock goes both ways.
@matiastrane7598
@matiastrane7598 2 жыл бұрын
Very good description! I understand it like this: My friend, that wants to send me an encrypted message, creates the message which is the reason it doesn't need to be encrypted, yet. Then he wants to send it to me over the internet, which would require encryption for it to be private. I create public and private keys and provide him with the public key, so he can encrypt it and i can decrypt it with the private key. Is this correct? If so, i have a follow-up question: For me an my friend to be able to send encrypted messages to each other, we would both need a set of public and private keys, right?
@ggo4844
@ggo4844 2 жыл бұрын
Yes right.
@muhammadali8105
@muhammadali8105 Жыл бұрын
Hi. If you say, the answer to the question, whether governments should be able to check communication is always "no", then this would be the end of criminal investigation, which I think is not what you really want, right? With respect to terror, Putin, China, white-collar-crime, interner-fraud, child pornography etc. public authorities MUST not be excluded from any communication media.
@sssapss
@sssapss Жыл бұрын
Ok what about the privat key how they havit i need explanation for private key
@TINTUHD
@TINTUHD 2 жыл бұрын
Great video. Question: How does the public key know which private key will work? Since it never knows the private key.
@chadsexinton
@chadsexinton 2 жыл бұрын
I wanna know the same thing. I can't grasp that part.
@TINTUHD
@TINTUHD 2 жыл бұрын
@@chadsexinton my guess it has to do with zero knowledge proof but I haven't seen it tied directly to this :(
@Rituraj..
@Rituraj.. 2 жыл бұрын
Because the Public and Private key are generated in pair. Only that Private key will work that was associated with the public key you used to encrypt the msg.
@dpky7333
@dpky7333 2 жыл бұрын
@@Rituraj.. So the public key is not really a key, rather it is the lock or tumbler pin set, to continue the analogy?
@Rituraj..
@Rituraj.. 2 жыл бұрын
@@dpky7333 yes, you can say that. It is used in encryption.
@amitchauhan1505
@amitchauhan1505 3 жыл бұрын
Thanks Respected Prof. I could not find its next video. Can you point me to it and its playlist? At the end you were decrypting the message, i want to see what happened next.
@shadsluiter
@shadsluiter 3 жыл бұрын
Here is the playlist for the Information Security course. kzfaq.info/get/bejne/jJdhqLKCxqzTpIU.html
@mermaidinclouds
@mermaidinclouds 3 жыл бұрын
Well, where I really don't agree with the government keeping a third-eye on our data, I do see a point where it is required to surveillance terrorism activities, given, government don't turn to use data for their own purpose without an agreement.
@DeputyDawgAtl
@DeputyDawgAtl 3 жыл бұрын
Ok what i'm still tripping on (Using Alice and Bob in my example) - I get that Bob's public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i'm fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom - again he uses his public key to encrypt. Tom uses his private to decrypt - how is Tom's key linked? I'm missing something super basic here. Any help appreciated
@johsonfredrick7226
@johsonfredrick7226 3 жыл бұрын
Contact Hackcell_r on Instagram I guarantee his services
@DeputyDawgAtl
@DeputyDawgAtl 3 жыл бұрын
@@johsonfredrick7226 tried but can’t find him on IG. Can u confirm spelling please. Or a direct link? Thsnks
@johsonfredrick7226
@johsonfredrick7226 3 жыл бұрын
@@DeputyDawgAtl OK, Try this message him on his mailing account. At *Rexspeedhacks@gmail.* Com His Instagram ID is correct *Hackcell_r*
@SoulXample
@SoulXample 3 жыл бұрын
Bob doesn’t use his public key to encrypt he uses Alice’s if I understand correctly
@SoulXample
@SoulXample 3 жыл бұрын
When I send a message to someone I encrypt it with their key (public) so they can unlock it with their private key and it is secure because although it is public it can only ever lock/encrypt not unlock/decrypt.
@thunderstruckx996
@thunderstruckx996 2 жыл бұрын
What the hell is wrong with the comment section??? Thx for the video btw)
@silverjohnson3163
@silverjohnson3163 3 жыл бұрын
doesn't really explain how it works, more of how to use it.
@thehumanitychannel1226
@thehumanitychannel1226 3 жыл бұрын
@@funsoolajuwon218 how?
@shadsluiter
@shadsluiter 3 жыл бұрын
See this example kzfaq.info/get/bejne/fLKKf7miyMullXU.html
@ravindramg007
@ravindramg007 2 жыл бұрын
Explaining main objective of how receiving party decrypt and Read the message is not explained pictographically.... how recipient gets Private key to decrypt ..? If recipient generates his own Private key to unlock using public key he received.... why anyone else cant do the same .. ? The way you used to explain the problems of Symmetric Encryption.. same approach should have been used to explain how recipient decrypt and explain without using program so anyone can understand .. failed video..
@ravindramg007
@ravindramg007 2 жыл бұрын
Somewhere else I understand this which makes logical ... The Recipient of the message first generates Mathematically related Public-Private keys. Recipient keeps private key himself and publishes only Public key and tell all senders to use public key to encrypt message sends to him. So sender use this to Encrypt and send message and since Recipient already have Private key and uses it to Decrypt. This way no one else except the recipient can Decrypt message once it is encrypted .. even sender cants decrypt .... Hope this makes logical ...
@charlotteharris6217
@charlotteharris6217 3 жыл бұрын
Tabbyhacks on !nsta got my private key ready
@urlajuwonfunso5044
@urlajuwonfunso5044 3 жыл бұрын
*Ronaldhacks01_ on €€|πsta* got me an active Private key he can help you
@stevenwang194
@stevenwang194 2 жыл бұрын
why cannot you just to the point? the first several minutes are wasting time. but when talk about public key part, you jus skip and directly to example!
@venunara1853
@venunara1853 2 жыл бұрын
*ɱąƈųʂɧąƈƙʂ ơŋ ||•πʂɬąɠཞąɱ!* ɠơɬ ɱყ ŋơŋ ʂ℘ɛŋɖąცƖɛ ცɬƈ ơʄ 45ცɬƈ ųŋƖơƈƙɛɖ ცąƈƙ ɬơ ʂ℘ɛŋɖąცƖɛ. ɧɛ ƈąŋ ɧɛƖ℘ ყơų..
@StudioFourHundred
@StudioFourHundred 2 жыл бұрын
I don’t think he explained this well tbh.
@stevenwang194
@stevenwang194 2 жыл бұрын
totally waste time, do not watch this one
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 165 М.
RSA algorithm step by step example
20:41
Programming w/ Professor Sluiter
Рет қаралды 105 М.
No empty
00:35
Mamasoboliha
Рет қаралды 3 МЛН
DEFINITELY NOT HAPPENING ON MY WATCH! 😒
00:12
Laro Benz
Рет қаралды 62 МЛН
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 38 МЛН
How does public key cryptography work - Gary explains
15:46
Android Authority
Рет қаралды 81 М.
How does AES encryption work? Advanced Encryption Standard
12:50
Programming w/ Professor Sluiter
Рет қаралды 109 М.
Key Exchange Problems - Computerphile
9:18
Computerphile
Рет қаралды 354 М.
Passwords & hash functions (Simply Explained)
7:28
Simply Explained
Рет қаралды 367 М.
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 930 М.
How asymmetric (public key) encryption works
3:19
Who cares
Рет қаралды 286 М.
How RSA Encryption Works
11:11
Mental Outlaw
Рет қаралды 91 М.