Encryption and public keys | Internet 101 | Computer Science | Khan Academy
HTML-код
- Опубликовано: 21 авг 2024
- Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS.
Watch the next lesson: www.khanacadem...
Missed the previous lesson? www.khanacadem...
Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information).
About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything.
For free. For everyone. Forever. #YouCanLearnAnything
Subscribe to Khan Academy’s Computer Science channel: / channel
Subscribe to Khan Academy: www.youtube.co...
She's a great teacher. It's refreshing to hear someone explain technical things nice and slow. Slowing down gives people time to process the info.
YOU EXPLAINED THIS SOOO WELL!!!
her explanation is by far the best I saw on youtube
simple and easy to understand
She's so good at explaining in the most simpler way. Great job 👏
This is probably the first time I watched a Khan Academy at home on my free will. Other times was at school. Just because I was curious how encryption works
I have an exam for CS External Encryption So I started Studying this! Fully Explained! Thank you for informing us!
I’m going to learn English with this video, I like to learn two things at the same time ❤️ thanks
Great video, very easy to understand! I loved the mailbox demonstration!
I am here revising for my IT exam and I just felt a curiousity of how encryption works. She explained this so well and made it easy for me to understand. Thank you. You are very good at your job.
I just want to THANK YOU for clarifying my thoughts!!!
Something to keep in mind here is that SMTP (a protocol on port 25 for mail) can be used with SSL (a protocol for how encryption is made) so that you can securely get mail even if both protocols are on different ports
Ahhh this was helpful because I was curious about that!
The mailbox analogy was the best way I've seen of explaining public key encryption; it makes so much sense this way
No one has explained it so well ..Thanks for sharing it
Well explained. The Public Key can be shared after authentication before exchanging messages between computers
Thanks a lot for the great lesson! Your teaching style makes learning so much fun.
Im always wondering how the public and private keys works in the basic sense, now that example makes sense
"This is what I'm doing with my work and I'm always about to lose my shit" :^)
How did u comment this 5 years ago? It says the video was posted 2 years ago
@@johnny14980 WHOA HE'S HACKING
Best explanation ever, its too easy to understand
¡¡Woooow!! Her explanation was amazing and only she is a young girl. Incredible!!.
Amazing video. I’m glad I found this channel to learn about networking!
Wow! It makes sense and it is really easy to understand with your words ! Thank you :)
One of the best video in internet to get started to understand encryption. Thanks.
dayummmmmmmm your explanation is sooooo nice thanks for clearing out my confusions in this short and amount of time .
This video was amazing.
My daughter loved this❤
Thank you for this explanation! that was very halpful
This is really cool. It seems that with 256 bit encryption, it would take 2^256 guesses. The concept of public vs private keys is cool as well --> anyone can deposit in your mailbox but only you can access the contents.
why 2?
@@skyblue1599 For every bit, we have two choices.
I was a bit confused first, because 2^256 isn’t (2^256)-1 (number in the video; 3:17), but precisely spoken you don’t have to “try” the last combination, because you already know it’s the right one after trying all others
Extremely well explained. Good job girl!
we need to get a sequel course!!
Amazing explanation... Pretty woman 👩 with Pretty ,true and simple knowledge about encryption and description of a message 😢Many poeple try to explain 🤔 😉 but they can't elaborate it well...
Thanks🎉🎉🎉God bless you 🙏
Amazing explanation, so simple and clear
Mia Gil is so cool and also explained very clearly!!
Daaang.... This is the explaination I'm looking for. So, logical
maaan this video is so great!
amazing explanation and amazing explainer !!!!! Thanks a lot
great explanation
Good Job, thanks
Great Job, Mam
Conference level infinity
thank you.. your video is so well explained
Thanks for the simple n clear explanation
Wow! Thank you. This helped a lot.
allways changing and challenging :) very well explained in simple manner thanks
Amazing video, everything was well explained and I liked the Mailbox example, thanks!
I have a doubt, we use the Public Key to encrypt messages and the Private Key to decrypt them
But, can we encrypt messages using the private key and decrypt them using the public key? Does this has sense? or it is not possible
Another doubt, using a number key in Caesar Cipher we swap N times as the key says, but how does key work with they have letters?
I thought I'm too stupid to understand this, thank you very much
No it will take about 2.78 hours for a computer to brute force a 10 digit code. Love your vids btw
you can see the long hours of coding in her eyes
siyn007 how does it say you posted this 4 years ago if this was published April 2019...
@@iixcloudyxii560 don't question just admire
@@siyn007 lol
@@iixcloudyxii560 😶
How 4 years ago 🙄🙄🤔🤔
*Beautiful and smart!*
NIce explanation. KUDOS👏
Thanks, good information.
Thanks alot... I helped me alot
You are amazing thank you so much good luck!
Great work sis super supportive
Good viedo, very thanks i like the spanish subs
Best video..thanku
A very educating video. Keep it up
You are talented!!!!!
great video! thank you
TOTP code (App Authenticators) is Symmetric
and Hardware keys (Yubikey, Feitian, etc) is Asymmetric?
thanks, really nice video.
What a pro!
Amazing video!
@khanacademy what about quantum computers for decrypting the messages without the private key and trying all possible combinations?
Thanks!
Thnx for video
Straighforward explanation.
awesome video.
Thanks
Beautiful presentation and presenter
thanks
Wow. That's heavy
Too good
Encryption locls my info with institutions i trust!
There is other information you can use to figure out a message. Like "free pizza in the cafeteria" = "kmsg rpche ps upg ehimxlwji" There is other information here. The English language is the other information. There are only a couple of thousand common words. Two letters , is, in, on, to, etc. not that many. You could possible figure out a sentence of just by counting the number of letters per word. You probably know what the general content of the letter might be. For example a military letter of orders will not be a cooking recipe, so the word basket will be limited. If this letter is sent to you at a place where there is a cafeteria, then you have more information. Maybe they have free pizza once a year and you can guess what the message is just by putting together information from diverse places. If you see an encrypted 5 letter word , as the first word of an email. There is a good chance this word is "hello".
Consider a baby who knows no language at all. They can figure out what you are saying. It takes a while but they know, and not from the actual words but all the cumulative information gathered up from the months of watching things.
Bravo.
Me: I only wanna hear about the math
Her: we won’t get into that now
Me:
I really need to find a video that doesnt use an analogy like the mailbox, like i need one where it explains to me how the encrption actually works and doesnt allow the public key to decrypt the the information.
You're an absolute genius, thank you for a fascinating video.
Could you tell me if it is possible to find the encryption key for an Android photo file
if the owner mistakenly wiped the encryption key from the phone?.
Yes it happened to me and so far nobody has been able to shed some light on this
commonly occurring problem with Android phones.
By default from Android 6 upwards all data on the phone is encrypted.
I’m just thinking of what would happen to my potato laptop if I tried to decode one of these.
nice video
Great presentation and explanation
3 years ago comment on a 2 years ago video
I dont get it . If I have a public key of someone else. And g use the key to generate an encryped file with a file of my known content . Then why can't I reverse the encryption and derive the private key?
There are two things I don't understand: If I encrypt an email message, for example using S/MIMES, how does the person I am sending it to get the key to decrypt the email? Secondly, how is a certified signature a guarantee that the email is safe? Isn't it possible for someone to hack someone else's certified account?
How does she work for the dod while still in college?
the quantum computer be like: what only 256 bit key? I'm I a joke to you?
Help me guys which school teaches Computer Science on an Online at affordable price
im still confused :( i just i dont know how to do it in my code assignment...
Use math boom.
Can’t someone reverse engineer your private key from the public one? If you know how something is encrypted, doesn’t that mean you can decrypt it?
you basically have to bruteforce 2^128 or 2^256 keys in order to guess the private key :) no, there's no way to derive a private key from the public key
The whole point of encryption is to develop methods that are essentially irreversible.
great video
“Some math that we won’t get into right now”. That’s what I came here to try to understand aargh!
What they fail to tell you here while the blow encryption out of proportion is that the NSA, CIA and five eyes do not care about cracking codes when they have backdoor access to nodes. They can tailgate any message on the internet that triggers their attention. Encryption although affective to an extent is just being hopeful. It’s all about language mixed with encryption and avoiding the surface.
Isaac W go look up who looks after proton mails servers, and where exactly their servers are located. They even state in their website if you are a “Snowden” do not use proton mail. In other words it won’t protect you. PGP is overrated and filled with flaws. Look up my videos I made a video on PGP
@@ArcadianArt gonna check your videos and will definitely subscribe
Bruh I waited 5 minutes for the math…
To the part where processors get smaller and smaller. We cant go any further smaller anymore
Help me my teacher is constantly restarting the video so we can't get on the computers. Quick someone teach me everything I need to know about this.
Were is Theale green at
Idk, it seems like you could get the mail out of that box with only the public key.
A quantum computer will make this process obsolete one day
Wouldn't a forced decryption by a quantum computer GREATLY decrease the amount of time needed for a brute force attack? Just by the nature of how quantum computers have a third state outside of 0 & 1?
I wish I could remember what made me think this while watching a video on quantum computers. Something about how a Q-Bit is actually guessing values? The video I watched had nothing to do with decryption, but I remember watching the explanation of how each bit, or q-bit worked made complete sense for application towards password cracking.
Of course, there's always the possibility that I'm a moron and got it all wrong.
federal agent
Who's here from Solent?
saw dood