How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain all of these in plain English!
🐦 Follow me on Twitter:
https://twitter.com/savjee
✏️ Check out my blog:
https://www.savjee.be
👍🏻 Like my Facebook page:
https://www.facebook.com/savjee

Views: 175557
Simply Explained - Savjee

Symmetric and Asymmetric Key Cryptography
Watch more Videos at https://www.tutorialspoint.com/videotutorials/index.htm
Lecture By: Mr. Arnab Chakraborty, Tutorials Point India Private Limited

Views: 2888
Tutorials Point (India) Pvt. Ltd.

+++See my latest video: Internet Security or Die+++ https://youtu.be/CzB5n6_pBfk
Learn Public Key Cryptography in just 18 Minutes - Cryptography Tutorial
In this Cryptography Tutorial, I teach you Public Key cryptography basics. Specifically I’m going to explain to you how the cryptography works, that allows you to do online shopping. We are so used to online shopping, a.k.a. e-commerce, that we take it for granted. But e-commerce would not be possible at all without public key cryptography. Not only will I explained to you the details of public-key cryptography and how that makes e-commerce possible, but I’m going to explain it in 15 minutes, and explain it without math, by using the Blackbox model.
IMHO, cryptography basics should not include math. Cryptography explained with math simply muddies the waters to those without extensive math background.
Let’s start by taking a brief look at Classic cryptography, which is been around for thousands of years. Classic cryptography is also called secret key cryptography or Symmetric cryptography.
A cipher is some sort of a mathematical algorithm that we use to scramble text. In the blackbox model the cipher itself is the blackbox into which we input plaintext and the key. The plaintext is the message that we wish to encrypt and the key is simply a string of numbers, generally binary ones and zeros. The output we get from the blackbox is called ciphertext, which is the plaintext that has been encrypted in such a way that it can only be decrypted by someone that has the same key that originally encrypted the data in the first place.
Some examples of Symmetric cryptography that are used today are DES, Triple DES & AES. These are the same as the ciphers used for thousands of years in that the same key encrypts and decrypts them. However the modern algorithm is much stronger.
If we use of good cipher such as AES the only way an attacker can decrypt the ciphertext is to try every possible key, called a brute force attack. That is why the longer the key the more security you get.
Now supposing Bob wants to buy something on the website Alice.com. He needs to make sure his personal information cannot be seen by anybody eavesdropping on his conversation over the public Internet. At first glance it seems easy enough for Bob to encrypt his plaintext personal information with Symmetric cryptography, using a secret key, send it across the Internet in an encrypted fashion, and then have Alice.com decrypt the information with the same secret key. The problem arises: how do Bob and Alice.com both get the same secret key, while making sure no one else gets the key? The answer is no one has ever thought of a very efficient way. In order to do this, a whole new type of encryption called public key encryption, a.k.a. Asymmetric encryption had to be invented first. In fact it was invented in the 1970s thousands of years after mankind first started using cryptography.

Views: 30843
Packethacks.com

Modern day encryption is performed in two different ways. Check out http://YouTube.com/ITFreeTraining or http://itfreetraining.com for more of our always free training videos. Using the same key or using a pair of keys called the public and private keys. This video looks at how these systems work and how they can be used together to perform encryption.
Download the PDF handout
http://itfreetraining.com/Handouts/Ce...
Encryption Types
Encryption is the process of scrambling data so it cannot be read without a decryption key. Encryption prevents data being read by a 3rd party if it is intercepted by a 3rd party. The two encryption methods that are used today are symmetric and public key encryption.
Symmetric Key
Symmetric key encryption uses the same key to encrypt data as decrypt data. This is generally quite fast when compared with public key encryption. In order to protect the data, the key needs to be secured. If a 3rd party was able to gain access to the key, they could decrypt any data that was encrypt with that data. For this reason, a secure channel is required to transfer the key if you need to transfer data between two points. For example, if you encrypted data on a CD and mail it to another party, the key must also be transferred to the second party so that they can decrypt the data. This is often done using e-mail or the telephone. In a lot of cases, sending the data using one method and the key using another method is enough to protect the data as an attacker would need to get both in order to decrypt the data.
Public Key Encryption
This method of encryption uses two keys. One key is used to encrypt data and the other key is used to decrypt data. The advantage of this is that the public key can be downloaded by anyone. Anyone with the public key can encrypt data that can only be decrypted using a private key. This means the public key does not need to be secured. The private key does need to be keep in a safe place. The advantage of using such a system is the private key is not required by the other party to perform encryption. Since the private key does not need to be transferred to the second party there is no risk of the private key being intercepted by a 3rd party. Public Key encryption is slower when compared with symmetric key so it is not always suitable for every application. The math used is complex but to put it simply it uses the modulus or remainder operator. For example, if you wanted to solve X mod 5 = 2, the possible solutions would be 2, 7, 12 and so on. The private key provides additional information which allows the problem to be solved easily. The math is more complex and uses much larger numbers than this but basically public and private key encryption rely on the modulus operator to work.
Combing The Two
There are two reasons you want to combine the two. The first is that often communication will be broken into two steps. Key exchange and data exchange. For key exchange, to protect the key used in data exchange it is often encrypted using public key encryption. Although slower than symmetric key encryption, this method ensures the key cannot accessed by a 3rd party while being transferred. Since the key has been transferred using a secure channel, a symmetric key can be used for data exchange. In some cases, data exchange may be done using public key encryption. If this is the case, often the data exchange will be done using a small key size to reduce the processing time.
The second reason that both may be used is when a symmetric key is used and the key needs to be provided to multiple users. For example, if you are using encryption file system (EFS) this allows multiple users to access the same file, which includes recovery users. In order to make this possible, multiple copies of the same key are stored in the file and protected from being read by encrypting it with the public key of each user that requires access.
References
"Public-key cryptography" http://en.wikipedia.org/wiki/Public-k...
"Encryption" http://en.wikipedia.org/wiki/Encryption

Views: 462629
itfreetraining

http://zerotoprotraining.com
This video provides and overview of Symmetric and Asymmetric Encryptions including the concepts of public and private keys (PKI)

Views: 106800
HandsonERP

Lesson 2 of cryptography series (to see all video check cryptography playlist - link given below).
cryptography playlist : https://www.youtube.com/watch?v=_Yw7QWbk9Vs&list=PLf8bMP4RWebLVGpUnhji9Olkj1jdXfzFd
Subscribe to our new youtube channel also : https://www.youtube.com/channel/UCNx1Gkyy9LfOxDMbcOKuV4g
symmetric vs asymmetric ( public key ) cryptography
symmetric key vs assymetric key encryption
advantages of symmetric key cryptography
advantages of assymetric cryptography
concept of digital signatures
safe and secure communication between systems
encrypted communication between systems
like us on facebook : https://www.facebook.com/guidetohacking/
#symmetric #asymmetric #public #key #cryptography #encryption

Views: 46271
Hacks And Security

https://8gwifi.org/CipherFunctions.jsp
Reference book: http://leanpub.com/crypto
Cryptographic Algorithms generally fall into one of two different categories, or are a combination of both.
Symmetric
Fast
Only provide confidentiality
Examples: DES, AES, Blowfish, RC4, RC5
Asymmetric
Large mathematical operations make it slower than symmetric algorithms
No need for out of band key distribution (public keys are public!)
Scales better since only a single key pair needed per individual
Can provide authentication and nonrepudiation
Examples: RSA, El Gamal, ECC, Diffie-Hellman
problem with symmetric key cryptography
DES (Data Encryption Standard)
64 bit key that is effectively 56 bits in strength
Actual algorithm is called DEA (Data Encryption Algorithm)
DES Modes
Electronic Code Book
Cipher Block Chaining (most commonly used for general purpose encryption)
Cipher Feedback
Output Feedback
Counter Mode (used in IPSec)
3DES
112-bit effective key length
Uses either 2 or 3 different smaller keys in one of several modes
Modes
EEE2/3
EDE2/3
AES
NIST replaced DES in 1997 with this
Uses the Rijndael algorithm
Supports key/block sizes of 128, 192, and 256 bits
Uses 10/12/14 rounds as block size increases
IDEA (International Data Encryption Algorithm)
Operates on 64 bit blocks in 8 rounds with 128 bit key
Considered stronger than DES and is used in PGP
Blowfish
64 bit block cipher with up to 448 bit key and 16 rounds
Designed by Bruce Schneier
RC4
Stream cipher with variable key size created by Ron Rivest
RC5
Another Rivest cipher
Block cipher with 32/64/128 bit blocks and keys up to 2048 bits
RC6
Beefier version of RC5 submitted as AES candidate
CAST
64 bit block cipher with keys between 40-128 bits with 12-16 rounds depending on key length
CAST-256 used 128-bit blocks and keys from 128-256 bits using 48 rounds
SAFER (Secure and Fast Encryption Routine)
Set of patent-free algorithms in 64 and 128 bit block variants
Variation used in Bluetooth
Twofish
Adapted version of Blowfish with 128 bit blocks, 128-256 bit keys and 16 rounds
AES Finalist
Kryptografie mit symmetrischem Schlüssel
symmetric key cryptography
symmetric key cryptography tutorial
symmetric key cryptography example
symmetric key cryptography vs asymmetric key cryptography
symmetric and asymmetric key cryptography
symmetric key cryptography
Kryptografie mit symmetrischem Schlüssel
Kryptographie mit symmetrischem Schlüssel
Kryptographie mit symmetrischem Schlüssel
Kryptografie mit symmetrischem Schlüssel und asymmetrische Schlüsselkryptographie
symmetrische und asymmetrische Schlüsselkryptographie
Kryptografie mit symmetrischem Schlüssel

Views: 40277
Zariga Tongy

Difference between Asymmetric Key and Symmetric Key Cryptography
Keywords:
Asymmetric Key Cryptography
Symmetric Key Cryptography
Network Security Notes

Views: 37012
Easy Engineering Classes

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography
note1: Yes, it should have been 'Obi Wan' not 'Obi One' :)
note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use.
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels

Views: 415956
Computerphile

This video is part of a larger online course, "From Barter to Bitcoin: Society, Technology and the Future of Money" run by Prof. Bill Maurer and Prof. Donald J. Patterson In addition to the video on YouTube there is a variety of other content available to students enrolled in the class.
"In 2008, a person calling himself or herself or themselves Satoshi Nakamoto released a paper suggesting a system for an anonymous, peer-to-peer alternative money. Bitcoin was born. Although not the first digital currency ever proposed, nor the first challenger to fiat money, bitcoin is the first to have captured the broad imagination of speculators, coders, regulators, criminals and the mass media. This course puts Bitcoin in context: how do we understand money as a social, political and technological phenomenon? From discussions of ancient transactions to the rise of state-issued currencies, we will explore the social and technical aspects of bitcoin, its predecessors and potential successors, and how its features echo aspects of many different historical transaction systems. No prior knowledge of economics or computing is required.
There is little academic writing on bitcoin. And this may be the first truly academic class on the topic. We want to put bitcoin in a wider perspective, to reflect on what it means for society, politics and economics, as well as how it helps us think about money both a social and a technical phenomenon. This class is not an advanced seminar on bitcoin--we will not be delving deeply into the inner workings of the system, but instead providing a bird's-eye overview with enough technical detail for you to be able to put media stories, hype and hope around bitcoin in perspective. Similarly, this is not a class in monetary economics--we won't go too deeply into monetary theory or policy, the money supply, or inflation. Instead the class invites you to think more deeply about one of the oldest systems of technology on the planet, and most ubiquitous: money, whether coin, cash, credit card or cryptocurrency, we humans have been making money for most of the past 10,000 years. How we do so in the future is a question bitcoin just maybe helps us answer."

Views: 40927
djp3

How keys are distributed is vital to any encryption system. Find out how to do it with the Diffie–Hellman key exchange and using public-key cryptography. Find out more: https://goo.gl/qI6jxZ
Download the AndroidAuthority App: https://play.google.com/store/apps/details?id=com.androidauthority.app
Subscribe to our YouTube channel: http://www.youtube.com/subscription_center?add_user=androidauthority
----------------------------------------------------
Stay connected to Android Authority:
- http://www.androidauthority.com
- http://google.com/+androidauthority
- http://facebook.com/androidauthority/
- http://twitter.com/androidauth/
- http://instagram.com/androidauthority/
Follow the Team:
Josh Vergara: https://plus.google.com/+JoshuaVergara
Joe Hindy: https://plus.google.com/+JosephHindy
Lanh Nguyen: https://plus.google.com/+LanhNguyenFilms
Jayce Broda: https://plus.google.com/+JayceBroda
Gary Sims: https://plus.google.com/+GarySims
Kris Carlon: http://plus.google.com/+KrisCarlon
Nirave Gondhia: http://plus.google.com/+NiraveG
John Velasco: http://plus.google.com/+JohnVelasco
Bailey Stein: http://plus.google.com/+BaileyStein1

Views: 40952
Android Authority

Encryption was introduced here: https://www.youtube.com/watch?v=yWgKSx0eFzY, and now we are digging deeper into encryption keys, both public and private. This topic is especially important for Internet security.
If this video was useful, please like it and subscribe, it really helps! Also, if you use an ad blocker, whitelisting my channel is very much appreciated!
Any questions/ feedback/ enquiries: [email protected]
These videos will always be free but if you'd consider a donation I'd be extremely grateful: https://www.paypal.me/computersciencetutor
If you are studying for a specific course, to watch the videos in their intended order and only those applicable to your Computer Science course, please use the playlists on my channel page.

Views: 480
Computer Science Tutor

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time complexity.
Link to factoring graph: http://www.khanacademy.org/labs/explorations/time-complexity

Views: 544538
Art of the Problem

In private key encryption, data is encrypted using a single same key that only the sender and the receiver know. That is why private key encryption is also called symmetric key encryption because the same key is used during both encryption and decryption of the transmitted data.
In this video, I will also use an example to demonstrate the process of using private key encryption. Two different methods -stream encryption and block encryption- of private key algorithm are also depicted with animation.
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Please leave comments, questions and
please subscribe!

Views: 20323
Sunny Classroom

Asymmetric Key Cryptography RSA
Watch more Videos at https://www.tutorialspoint.com/videotutorials/index.htm
Lecture By: Mr. Arnab Chakraborty, Tutorials Point India Private Limited

Views: 1336
Tutorials Point (India) Pvt. Ltd.

In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.
The public key encryption is also called asymmetric key encryption because two different keys are used.
Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.
In this video, I will use an example to demonstrate how to use public key.
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Please leave comments, questions and
please subscribe!

Views: 29972
Sunny Classroom

Easy explanation of "public key encryption".
Instead of the usual terms of "public key" and "private key" this tutorial uses "lock" and "key".
==================================================
If you want to start protecting you email:
get free Privacy Everywhere Beta,
http://www.privacyeverywhere.net/

Views: 203924
Veet Vivarto

There are four ways to distribute the public keys among the users.
1) Public Announcement
2) Public Key Directory
3) Public Key Authority
4) Certificate Authority

Views: 23072
Sundeep Saradhi Kanthety

Security+ Training Course Index: http://professormesser.link/sy0401
Professor Messer’s Course Notes: http://professormesser.link/sy0401cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
Our encryption methods will generally use either symmetric encryption or asymmetric encryption, and sometimes both! In this video, you’ll learn the advantages and disadvantages when using symmetric or asymmetric encryption types.
- - - - -
Download entire video course: http://professormesser.link/401adyt
Get the course on MP3 audio: http://professormesser.link/401vdyt
Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/
FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Views: 63379
Professor Messer

Symmetric Key Cryptography - Cipher
Watch more Videos at https://www.tutorialspoint.com/videotutorials/index.htm
Lecture By: Mr. Arnab Chakraborty, Tutorials Point India Private Limited

Views: 1090
Tutorials Point (India) Pvt. Ltd.

In this network security video tutorial we will study the working of RSA Algorithm.
RSA Algorithm theory -
1. Ron Rivest, Adi Shamir and Len Adlemen developed the method called as RSA algorithm.
2. Most popular and proven asymmetric key cryptography algorithm
3. Based on the mathematical fact that it is easy to find and multiply large prime numbers together, but it is extremely difficult to factor their product.
RSA Algorithm Steps -
1. Choose two large prime numbers P and Q.
2. Calculate N = P * Q
3. Select the public key (i.e. the encryption key) E such that it is not a factor of [(P – 1) * (Q – 1)].
4. Select the private key (i.e. the decryption key) D such that the following equation is true:
(D * E) mod (P – 1) * (Q – 1) = 1
5. For encryption calculate the cipher text CT from the plain text PT as follows: CT= PT^E mod N
6. Send CT as the cipher text to the receiver
7. For decryption calculate the plain text PT from the cipher text CT as follows: PT = CT^D mod N
Complete Network Security / Information Security Playlist - https://www.youtube.com/watch?v=IkfggBVUJxY&list=PLIY8eNdw5tW_7-QrsY_n9nC0Xfhs1tLEK
Download my FREE Network Security Android App - https://play.google.com/store/apps/details?id=com.intelisenze.networksecuritytutorials
Simple Snippets Official Website -
http://simplesnippets.tech/
Simple Snippets on Facebook -
https://www.facebook.com/simplesnippets/
Simple Snippets on Instagram -
https://www.instagram.com/simplesnippets/
Simple Snippets on Twitter -
https://twitter.com/simplesnippet
Simple Snippets Google Plus Page -
https://plus.google.com/+SimpleSnippets
Simple Snippets email ID -
[email protected]
For More Technology News, Latest Updates and Blog articles visit our Official Website - http://simplesnippets.tech/
#RSA #RSAalgorithm #NetworkSecurity #AsymmetricCryptography

Views: 818
Simple Snippets

Security+ Training Course Index: http://professormesser.link/sy0501
Professor Messer’s Course Notes: http://professormesser.link/501cn
Frequently Asked Questions: http://professormesser.link/faq
- - - - -
If you’re planning to implement cryptography, then you’ll probably be using either symmetric encryption or asymmetric encryption. In this video, you’ll learn about both of these valuable encryption mechanisms.
- - - - -
Subscribe to get the latest videos: http://professormesser.link/yt
Calendar of live events: http://www.professormesser.com/calendar/
FOLLOW PROFESSOR MESSER:
Professor Messer official website: http://www.professormesser.com/
Twitter: http://www.professormesser.com/twitter
Facebook: http://www.professormesser.com/facebook
Instagram: http://www.professormesser.com/instagram
Google +: http://www.professormesser.com/googleplus

Views: 17131
Professor Messer

In this video you will see how to encrypt and decrypt the text information using the RSA algorithm in Java Cryptography.
For more tutorials visit: http://www.step2know.com

Views: 20907
Infinity

The complete YouTube playlist can be viewed here: https://goo.gl/mjyDev
This lesson explains International Public Key Cryptography, under the course, "Cryptography and Network Security for GATE Computer Science Engineering".
The lesson explains the following subtopics:
Symmetric Cryptography/Private Key Cryptography
Asymmetric Cryptography/Public Key Cryptography
Public Key Cryptography - Authentication
Public Key Cryptography - Applications
Some important terminology and concepts are also illustrated, for the better understanding of the subject.
For the entire course: https://goo.gl/aTMBNZ
For more lessons by Ansha Pk: https://goo.gl/2DX9Wn
Must watch for all the GATE/ESE/PSU Exams.
Download the Unacademy Learning App from the Google Play Store here:- https://goo.gl/02OhYI
Download the Unacademy Educator app from the Google Play Store here: https://goo.gl/H4LGHE
Do Subscribe and be a part of the community for more such lessons here: https://goo.gl/UGFo7b
Visit Our Facebook Group on GATE here: https://goo.gl/cPj5sb
Cryptography and Network Security - Public Key Cryptography - Unacademy GATE(CSE)

Views: 3844
Unacademy - GATE Preparation

This is part 5 of the Blockchain tutorial explaining what symmetric keys and asymmetric keys are.
In this video series different topics will be explained which will help you to understand blockchain.
Bitcoin released as open source software in 2009 is a cryptocurrency invented by Satoshi Nakamoto (unidentified person or group of persons).
After the introduction of Bitcoin many Bitcoin alternatives were created. These alternate cryptocurrencies are called Altcoins (Litecoin, Dodgecoin etc).
Bitcoin's underlying technology is called Blockchain.
The Blockchain is a distributed decentralized incorruptible database (ledger) that records blocks of digital information. Each block contains a timestamp and a link to a previous block.
Soon people realises that there many other use cases where the Blockchain technology can be applied and not just as a cryptocurrency application.
New Blockchain platforms were created based on the Blockchain technology, one of which is called Ethereum.
Ethereum focuses on running programming code, called smart contracts, on any decentralized application.
Using the new Blockchain platforms, Blockchain technology can be used in supply chain management, healthcare, real estate, identity management, voting, internet of things, etcetera, just to name a few.
Today there is a growing interest in Blockchain not only in the financial sector but also in other sectors.
Explaining how Blockchain works is not easy and for many the Blockchain technology remains an elusive concept.
This video series tries to explain Blockchain to a large audience but from the bottom up.
Keywords often used in Blockchain conversation will be explained.
Each Blockchain video is short and to the point.
It is recommended to watch each video sequentially as I may refer to certain Blockchain topics explained earlier.
Check out all my other Blockchain tutorial videos
https://goo.gl/aMTFHU
Subscribe to my YouTube channel
https://goo.gl/61NFzK
The presentation used in this video tutorial can be found at:
http://www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html
#mobilefish #blockchain #bitcoin #cryptocurrency #ethereum

Views: 7669
Mobilefish.com

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm.
We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8

Views: 613433
Art of the Problem

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256 bit encryption, public and private keys, SSL & TLS and HTTPS.
Learn more at http://code.org/
Help us translate into your language: http://code.org/translate/videos
Stay in touch with us!
• on Twitter https://twitter.com/codeorg
• on Facebook https://www.facebook.com/Code.org
• on Instagram https://instagram.com/codeorg
• on Tumblr https://blog.code.org
• on LinkedIn https://www.linkedin.com/company/code...
• on Google+ https://google.com/+codeorg
Help us caption & translate this video!
https://amara.org/v/HGaS/

Views: 208309
Code.org

This video provides a brief introduction to symmetric and asymmetric keys and certificates.

Views: 19726
Paul Turner

Title: Difference between symmetric and asymmetric key cryptography in bangla || symmetric and asymmetric key encryption in bangla
In this video symmetric and asymmetric key encryption is clearly described. The language used in this video is bangla but you'll also understand if you do not understand bangla. If you have any query please put comment.
facebook links :
https://www.facebook.com/jmshejan
https://www.facebook.com/dsteaching/
Please subscribe my channel

Views: 1286
JM Shejan

Important for UGC NET and GATE
Imp for UGC NET and GATE
-------------------------------------------------------------------------------------------------
► Subscribe to me on YouTube-https://www.youtube.com/gatesmashers
► Like Our page on Facebook - https://www.facebook.com/gatesmashers/
► Link for Computer Networks Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_
► Link for Operating System Playlist-
https://www.youtube.com/playlist?list=PLxCzCOWd7aiGz9donHRrE9I3Mwn6XdP8p
► Link for Database Management System Playlist-
https://www.youtube.com/playlist?list=PLxCzCOWd7aiFAN6I8CuViBuCdJgiOkT2Y
► Link for Graph Theory Playlist-
https://www.youtube.com/playlist?list=PLxCzCOWd7aiG0M5FqjyoqB20Edk0tyzVt
► Last Minutes Preparation for UGC NET and GATE Playlist-
https://www.youtube.com/playlist?list=PLxCzCOWd7aiE4LQMkIhAe9amWX_SPNMiZ
For any Query and Suggestions-
[email protected]
-------------------------------------------------------------------------------------------------
#Asymmetrickey #cryptography #GATE #UGCNET #PSU

Views: 4445
Gate Smashers

This tutorial explains how to encrypt and decrypt text using private and public key encryption, also known as asymmetric encryption.

Views: 491
ma academy

In this Video, Dr. Seema Batra, Assistant professor, Biyani Groups of Colleges, Jaipur, explains about the concept of symmetric and asymmetric cryptography.
http://www.gurukpo.com/
http://www.biyanicolleges.org/

Views: 12504
Guru Kpo

Asymmetric Part 2 - RSA includes tutorial on how to encrypt and decrypt as well as calculating the keys and euclidean algorithm.

Views: 61295
Daniel Rees

Views: 3864
nirmal jeyaraj

The first in the series of videos which will hopefully explain the key concepts around Https and SSL encryption, hashing (Sha 1, Sha 256 etc) certificates etc. I am then planning to extend the series into other interesting related subjects like blockchain and Bitcoin.
If you have any questions or requests please feel to ask in the comments section.

Views: 31057
Matt Thomas

Namaskaar Dosto, is video mein maine aapko encryption ke baare mein bataya hai, aap sabhi ne computer aur internet use karte time Encryption aur decryption ke baare mein jarur suna hoga, usme aapko SSL encrytpion TSL Encryption, Public Key encryption, private key encryption wagereh ke baare mein bhi suna hoga, aur abhi recently whatsapp ne bhi end to end encryption launch kiya hai, toh aise mein hamare man mein bahut se sawaal hai ki aakhir yeh encryption hota kya hai? Encryption hum hamari email pe bhi use karte hai, aur hum online banking karte time bhi encryption ka use karte hai. Mujhe umeed hai ki yeh video dekhne ke baad aap encryption aur decryption ke baare mein sab kuch jaan jayenge, aur saath hi saath public key encryption ke baare mein bhi samajh jayenge. aur aap aaraam se whatsapp ke encryption feature ko bhi use kar payenge.
Win Galaxy S7, S7 Edge Here: http://bit.ly/TheMegaGiveaway
Share, Support, Subscribe!!!
Subscribe: http://bit.ly/1Wfsvt4
Youtube: http://www.youtube.com/c/TechnicalGuruji
Twitter: http://www.twitter.com/technicalguruji
Facebook: http://www.facebook.com/technicalguruji
Instagram: http://instagram.com/technicalguruji
Google Plus: https://plus.google.com/+TechnicalGuruji
About : Technical Guruji is a YouTube Channel, where you will find technological videos in Hindi, New Video is Posted Everyday :)

Views: 180333
Technical Guruji

Friends is video m hum Crytography,Encryption,Decryption,Symmetric key,Asymmetric key,Public key,Private key,Plain text and Cipher text kya hote hai in sb k bare main charcha krne wale hai or janne wale hai ki ye kya hote hai kaise ye kaam krte hai or in k kya kya fayde hai or sath hi hum ye bhi janenge ki Android Phone ko kaise encrypt kiya ja sakta hai toh is video ko End tak dekhen.
I hope Aapko ye video Pasand aayegi
Please Like,Share and SUBSCRIBE
#JAI BHARAT
It's My Passion
Facebook :-https://www.facebook.com/TechnicalChoro
Twitter:-https://twitter.com/TechnicalChoro
Google+:-https://plus.google.com/b/114386885239188983906

Views: 20999
Technical Choro

Get Full Course: http://www.engineeringmentor.com/CNYTv3
Networks #3: This tutorial introduces the Cryptography basics. It also explains what is Encryption and Decryption.
a) Cryptography basics (00:21):http://youtu.be/BEb_AnPWPwY?t=21s
how do we provide this security during transmission? Well, One way of ensuring security can be use of CRYPTOGRAPHY!
Cryptography is a field of network security
which deals with hiding "real" infromation
when it is under transmission between the two parties.
Usually, the real information is transformed
or hidden into another message and transmitted over the network.
This transformed message in itself will make no sense
even if any hacker gets hold of this information.
When it reaches the destination,
the receipent will know a method to de-transform
the garbage message into the original information
which the sender had sent.method of transforming message at sender's side
and de transforming at reciever's side forms the basic model of Cryptography.
b) Encryption and Decryption (3:57):http://youtu.be/BEb_AnPWPwY?t=3m57s
First, the information to be transmitted, called as plain text(or message)
is fed to an Encryption system.
The Encyrption system uses a key to convert the plain text to encyrpted form
which looks like garbage value.
This is also called as cipher text.
A corresponding key is used at the other end
to decrypt the cipher text back to original message.
When we say a key, it actually means a piece of string value
which is fed to encyprtion and decryption algorithms
along with the text for transformation.
When the message reaches the destination,
this system at the other end decrypts the cipher text into original message
with the help of the key.
This is called as Decryption System.
The output of the Decryption System is the intended message.
Depending on how the keys are shared,
we can classify crytography as symmetric and asymmetric.
If the keys used by both parties are same,
then it is called symmetric key cryptography, or private key cryptography.
If both parties use different keys for encyrption and decryption,
then it is called asymmetric key cryptography or public key cryptography.
video URL : https://www.youtube.com/watch?v=BEb_AnPWPwY
Watch ALL CN VIDEOS: https://www.youtube.com/playlist?list=PL9OIoIp8YySF4mkIihOb_j2HZIRIlYuEx
For more, visit http://www.EngineeringMentor.com
Facebook: https://www.facebook.com/EngineeringMentor
Twitter : https://twitter.com/Engi_Mentor

Views: 100929
Skill Gurukul

DES algorithm follows the Feistel Structure
Most of the Block cipher algorithms follows Feistel Structure
BLOCK SIZE - 64 bits Plain Text
No. of Rounds - 16 Rounds
Key Size - 64 bits
Sub Key Size - 48 bits
No. of Sub Keys - 16 Sub Keys
Cipher Text - 64 bits

Views: 129235
Sundeep Saradhi Kanthety

AES algorithm is the Block Cipher Symmetric Algorithm
Block Size is 128 bits
Key Size is 128 bits ( 4 words or 16 Bytes )
Sub Key Size is 1 Word (32 bit)
Number of Sub keys 44 Words
Number of Rounds 10
Cipher Text Size is 128 bits

Views: 78216
Sundeep Saradhi Kanthety

MIT 6.046J Design and Analysis of Algorithms, Spring 2015
View the complete course: http://ocw.mit.edu/6-046JS15
Instructor: Srinivas Devadas
In this lecture, Professor Devadas continues with cryptography, introducing encryption methods.
License: Creative Commons BY-NC-SA
More information at http://ocw.mit.edu/terms
More courses at http://ocw.mit.edu

Views: 16308
MIT OpenCourseWare

#rsa #deffiehellman #cryptographylectures #lastmomenttuitions
Take the Full Course of Cryptography and Network Security
What we Provide
1) 20 Videos (Index is given down) + More Update will be Coming Before final exams
2)Hand made Notes with problems for your to practice
3)Strategy to Score Good Marks in Cryptography and Network Scurity
To buy the course click
https://goo.gl/mpbaK3
if you have any query email us at
[email protected]
Sample Notes : https://goo.gl/Ze1FpX
or Fill the form we will contact you
https://goo.gl/forms/2SO5NAhqFnjOiWvi2
Cryptography and System Security Index
Lecture 1 Introduction to Cryptography and Security System
Lecture 2 Security Goals and Mechanism
Lecture 3 Symmetric Cipher
Lecture 4 Substitution Cipher
Lecture 5 Transposition Cipher
Lecture 6 Stream and Block Cipher
Lecture 7 Mono Alphabetic Cipher
Lecture 8 Poly Alphabetic Cipher
Lecture 9 Diffie Hellman
Lecture 10 RSA Algorithm with Solved Example
Lecture 11 IDEA Algorithm Full Working
Lecture 12 SHA-1 Algorithm Full Working
Lecture 13 Blowfish Algorithm Full working
Lecture 14 DES Algorithm Full Working
Lecture 15 Confusion and Diffusion
Lecture 16 AES Algorithm Full working
Lecture 17 Kerberos
Lecture 18 Malicious Software ( Virus and worms )
Lecture 19 DOS and DDOS Attack
Lecture 20 Digital Signature Full working Explained
More videos Coming Soon.

Views: 260209
Last moment tuitions

This Authentication training video is part of the CISSP FREE training course from Skillset.com (https://www.skillset.com/certifications/cissp).
Skillset helps you pass your certification exam. Faster. Guaranteed. https://www.skillset.com
Topic: Symmetric Key Cryptography
Skill: Cryptography Fundamentals
Skillset: Security Engineering
Certification: CISSP
Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam.
+ Unlimited access to thousands of practice questions
+ Exam readiness score
+ Smart reinforcement
+ Focused training ensures 100% exam readiness
+ Personalized learning plan
+ Align exam engine to your current baseline knowledge
+ Eliminate wasted study time
+ Exam pass guarantee
And much more - https://www.skillset.com

Views: 4757
Skillset

Thanks to all of you who support me on Patreon. You da real mvps! $1 per month helps!! :) https://www.patreon.com/patrickjmt !! Part 1: https://youtu.be/PkpFBK3wGJc
Please consider being a supporter on Patreon! https://www.patreon.com/patrickjmt
Twitter: @Patrick_JMT
In this video I show mathematically for RSA encryption works by going through an example of sending an encrypted message!
If you are interested in seeing how Euclid's algorithm would work, check out this video by Emily Jane: https://www.youtube.com/watch?v=fz1vxq5ts5I
A big thanks to the 'Making & Science team at Google' for sponsoring this video!
Please like and share using hashtag #sciencegoals

Views: 39138
patrickJMT

This Algorithm is used to exchange the secret /symmetric key between sender and receiver.
This exchange of key can be done with the help of public key and private key
step 1 Assume prime number p
step 2 Select a such that a is primitive root of p and a less than p
step 3 Assume XA private key of user A
step 4 Calculate YA public key of user A with the help of formula
step 5 Assume XB private key of user B
step 6 Calculate YB public key of user B with the help of formula
step 7 Generate K secret Key using YB and XA with the help of formula at Sender side.
step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.

Views: 54970
Sundeep Saradhi Kanthety

Edit - The connection is set up using the public/private key-pair of the server - but once the server and client have used that to exchange a symmetric key, everything else is encrypted with the symmetric key and a symmetric algorithm.

Views: 1217
A Happy Youngster

Asymmetric Encryption
A common craft video I made for my ITGS lesson.

Views: 79147
Nihal Acar