Public Key Encryption (Asymmetric Key Encryption)

Поделиться
HTML-код
  • Опубликовано: 3 янв 2025

Комментарии • 236

  • @tedwoodpeacock4689
    @tedwoodpeacock4689 6 лет назад +151

    When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +33

      Thanks a lot for your encouragement and kind words. I appreciate it very much.

    • @abhishekyadav0007
      @abhishekyadav0007 5 лет назад +2

      I also mentioned the same thing in other video

    • @misaacs98
      @misaacs98 4 года назад +1

      I agree keep up the good work

    • @abdirahmanabdullahi1150
      @abdirahmanabdullahi1150 2 года назад

      Agree

    • @JoeDepp-o7e
      @JoeDepp-o7e 5 дней назад

      Hello, I hate to intrude, but could I ask for some help? my OKX wallet holds USDT TRX20, and the phrase is (clean party soccer advance audit clean evil finish tonight involve whip action). How can I send it to EXMO or OKX?

  • @Ada-hd3zp
    @Ada-hd3zp Год назад +4

    Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!

    • @JoeDepp-o7e
      @JoeDepp-o7e 5 дней назад

      Hey, I don’t mean to bother you, but could you help me out? In my OKX wallet, I store USDT TRX20, protected by the phrase (clean party soccer advance audit clean evil finish tonight involve whip action). How do I transfer it to EXMO or OKX?

  • @mountain_del1863
    @mountain_del1863 4 года назад +6

    Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the process.....not the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад

      Glad I could help

    • @JoeDepp-o7e
      @JoeDepp-o7e 5 дней назад

      Hello, I hate to interrupt, but might you lend a hand? USDT TRX20 is saved in my OKX wallet, and I have the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How can I send it to EXMO or OKX?

  • @mattredgate5740
    @mattredgate5740 9 месяцев назад +1

    Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.

  • @tonydebaka3967
    @tonydebaka3967 2 года назад +2

    i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done

    • @maicakhylafrancisco3163
      @maicakhylafrancisco3163 Год назад

      Heey, same here! I've watched really lots of videos only to search another and another. And so the search continues until I've watched this video. Thankful that I have found this!

    • @JoeDepp-o7e
      @JoeDepp-o7e 5 дней назад

      Hey, I don’t mean to inconvenience you, but could you help me out? USDT TRX20 is in my OKX wallet and I know the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I transfer it to EXMO or OKX?

  • @proptbro
    @proptbro 6 лет назад +30

    Best explanation on youtube thanks for clearing my confusion

  • @joshkdasan2517
    @joshkdasan2517 4 года назад +9

    Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it , hence the confusion . Thank you for clearing that.

    • @AliShaikh_744
      @AliShaikh_744 2 года назад

      Yes such an important part.

    • @greymind0072
      @greymind0072 2 года назад

      one of the most crucial thing to be mentioned explicitely. That's why sunny is a great educator , look at all his videos.

  • @zoozoo1060
    @zoozoo1060 5 лет назад +2

    I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.

  • @jamesharris3109
    @jamesharris3109 6 лет назад +14

    I would love to see more videos about different algorithm types. Your explanations are so easy to understand. Thanks again Sunny!

  • @chillasey
    @chillasey 3 года назад +1

    Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!

  • @troyv808
    @troyv808 6 месяцев назад

    Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!

  • @adamtechdays
    @adamtechdays 6 лет назад +24

    Sunny, your explanation on such a technical subject is excellent. Keep up this great work.

  • @Bchicken2
    @Bchicken2 2 года назад

    Sunny, I love your smile and friendly aura. Your work is honest charity and I admire that.

  • @jiukam856
    @jiukam856 2 года назад

    Actually very clear and get to the point despite not native English... Great work!

  • @ESEben10
    @ESEben10 Год назад +1

    Such a clear explanation about asymmetric key encryption! Thank you for the video!

  • @christopherbrooks5269
    @christopherbrooks5269 5 лет назад +1

    Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.

  • @Sats33
    @Sats33 5 лет назад +4

    Thank u so much. I am really able to understand the concept in a clear way. I watched many videos of yours and u are a great teacher!!! U're brilliant . I loved ur simple yet on to the point teaching...

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад +1

      Thanks a lot for saying so nice things. I hope my own students think so :)

  • @luisdelorbe6838
    @luisdelorbe6838 3 года назад

    My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing.
    One more time, professor Sunny, congrats!!... Please do not stop your videos!!

  • @Anas-qv2lj
    @Anas-qv2lj 4 года назад +1

    Thank you so much, You are my first reference when I need clear explanation about anything related to networks. God bless you Mr. Sunny

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад

      Glad it was helpful!

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад

      I create this for learning channel to beginners. spread this channel to the people who want to learn networking.

  • @vinaygupta2436
    @vinaygupta2436 4 года назад

    Never quoted in any document that the receiver initiate the key pair generation.. that's very important to understand assymetric encryption and u have nailed it..

  • @a-face9333
    @a-face9333 6 лет назад +1

    One of the best explanation of asymmetric encryption.

  • @vikasbhardwaj455
    @vikasbhardwaj455 6 лет назад +1

    By far the best explanation that i have come across. Subscribed to your channel. Please keep publishing.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      Thank you Vikas for leaving nice comments. I will do, sir.

  • @Hanna-yn5ou
    @Hanna-yn5ou 6 лет назад +3

    These videos by Sunny are fantastic! SOOO helpful! Thank you!

  • @ing.sebastianfernandezverg2245
    @ing.sebastianfernandezverg2245 6 лет назад +3

    your videos makes to me want watch more and more, your explanations are very simples, a lot of thanks!!.

  • @uzmamahfooz2305
    @uzmamahfooz2305 5 лет назад

    My O Levels books didn't explain this topic so well. Great job!

  • @mugume
    @mugume 4 года назад +2

    As always, you do an awesome job Sunny. Thank you so much for your wonderful videos. Keep going bro!

  • @HorseyWorsey
    @HorseyWorsey 3 года назад

    Me: *Need random IT concept explained*
    Sunny: "Hello, this is Sunny. Welcome back"

  • @waiphyotun7633
    @waiphyotun7633 2 года назад

    best teacher out there.. and catching tune at start of videos

  • @sarahm578
    @sarahm578 4 года назад +1

    Thank you alot sunny, you are the best teacher, I enjoy learning from your videos, , thanks again

  • @themindhealer6912
    @themindhealer6912 2 года назад

    Much better explanation than in universities

  • @Ghost_Unknown_Fade_Away_
    @Ghost_Unknown_Fade_Away_ Год назад

    This channel is a gem. Thank you so much.

  • @kubraniler
    @kubraniler 5 лет назад +1

    Your explanations are very understandable.

  • @Userforeverneverever
    @Userforeverneverever 4 года назад

    Great job on the video! I hope your channel grows!

  • @shamyzazaki8845
    @shamyzazaki8845 4 года назад +1

    good explanation and easy to understand bcos you use a simple English. keep up the good work. and thank you for making me more understand

  • @andydrexx1928
    @andydrexx1928 4 года назад +2

    Bless you! Bless you! finally I've found a good explanation for Asymmetric cryptography. Thanks a lot!

  • @thilininisansala9649
    @thilininisansala9649 4 года назад

    Your explanation is very clear professor sunny. Thank you very much. Grate work

  • @chandanisanthiyagu3786
    @chandanisanthiyagu3786 4 года назад +2

    Really appreciate your dedication. Thank you for your clear explanations.

  • @sankalppotdar9950
    @sankalppotdar9950 6 лет назад +5

    very informative, thank you for your video, simple explanation for a complex subject

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +1

      You are welcome. And thank you for leaving nice feedback!

  • @sabbeneinnab.9253
    @sabbeneinnab.9253 3 года назад

    I like the way you explained the public key 😉 keep the good work,👍🏿

  • @enginakar-q7t
    @enginakar-q7t Год назад

    Very informative and clearly explained. Great job! Thank you

  • @LunaIthil
    @LunaIthil 5 лет назад +1

    best explaination on youtube. congrats

  • @xcoverx2525
    @xcoverx2525 6 лет назад +1

    Perfect Simple And Easy To Understand. Thank you Sunny

  • @ifargantech
    @ifargantech 3 года назад

    My teacher! what a great aexplanation!

  • @Deltainteractive
    @Deltainteractive 6 лет назад

    Excellent work Sunny! Please keep making these videos.

  • @ceherediav
    @ceherediav 3 года назад +1

    great explanation and great way to explain. thanks for sharing your knowledge and help the community.

  • @jadissa7464
    @jadissa7464 4 года назад +1

    Best Tutorials ever, well designed and clear steps
    Thank you, God Bless

  • @arsenmkrtchyan4832
    @arsenmkrtchyan4832 3 года назад

    The best
    Only you have such content and only you can tech me topics i dont grasp

  • @nandaanbu5305
    @nandaanbu5305 4 года назад

    Extraordinary teaching sir....

  • @techgeek6773
    @techgeek6773 Год назад

    fantastic explanation sunny thank you a million!

  • @tinashemuwodzeri9812
    @tinashemuwodzeri9812 4 года назад +1

    This is on point sunny

  • @alisongibbs6451
    @alisongibbs6451 4 года назад

    Great concise explanation

  • @smtownish
    @smtownish 6 лет назад +2

    Great explanation. Easy to understand

  • @imena476
    @imena476 5 лет назад +3

    Thank you so much professor ! I wish I had you in college..
    God bless you°°

  • @rajeshgeorge6093
    @rajeshgeorge6093 4 года назад +1

    superb explation. thanks for simplifying the topic .

  • @wrenches5243
    @wrenches5243 3 года назад

    Sunny thank you so much for making these videos. It has helped me tremendously.

  • @frannelk
    @frannelk 4 года назад +1

    Master explanation brother :-)

  • @_Anna_Nass_
    @_Anna_Nass_ Год назад

    The animations are very helpful, thank you!

  • @TheWholeBits
    @TheWholeBits 4 года назад +1

    Excellent explanation!!!

  • @heshanyodagama8886
    @heshanyodagama8886 5 лет назад +1

    Nice lecture...well explained

  • @SM-kl2cc
    @SM-kl2cc 11 месяцев назад

    You're cool, Sunny ♥ Thank you for making these lessons

  • @levyax1964
    @levyax1964 Год назад

    Thank you so much Prof. Sunny!

  • @Fashoda225
    @Fashoda225 7 лет назад +1

    Very good lesson..everything is clear. Thank you and want to have more video from you.

    • @sunnyclassroom24
      @sunnyclassroom24  7 лет назад

      Many thanks, Essanin Arnaud, for your encouragement. I will do my best. I have at least 50 videos ready to be made and uploaded. I have already made animation parts for lessons. Many thanks. I will find time to make videos at the end of the semester ( I am teaching computer at University of Saint Mary by the way) or during the Christmas break.

  • @dinethlive
    @dinethlive 4 года назад +1

    Wow amazing explanation

  • @jamesharris3109
    @jamesharris3109 6 лет назад +1

    Love your videos man! I hope to see more.

  • @ece7700
    @ece7700 7 месяцев назад

    Thank you very much for this clear explanation

  • @dmytroshchotkin2939
    @dmytroshchotkin2939 4 года назад

    Such a good and clear video. Bravo!

  • @thuynguci99
    @thuynguci99 3 года назад

    Thankyou very much, all your videos are amazing!

  • @razlouk
    @razlouk 3 года назад

    Sunny your videos are so good!! Thank you so much!!

  • @sabujdeeptudu6215
    @sabujdeeptudu6215 Год назад

    THIS IS WHAT I NEEDED. THANKS

  • @ArpanDasS
    @ArpanDasS 5 лет назад +1

    Explained very well... Thank you sir...

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад +1

      You are welcome and thanks for taking the time to write a nice comment.

  • @Seraphelle777
    @Seraphelle777 5 лет назад +1

    Awesome video 👍👍👌 I understood easily thq sir 🙏😍

  • @ajaxaj8470
    @ajaxaj8470 4 года назад +1

    Nice explanation. Are you from North Eastern India?

  • @jananiwelaratne279
    @jananiwelaratne279 3 года назад

    very well explained using videos. Thanks alot sir

  • @Daniel_CLopes
    @Daniel_CLopes 5 лет назад +1

    Hi Professor Sunny! Always good to be back to your videos!! I only have one question:
    The private/public key pair is created using RSA algorithm (most likely) and the keys are distributed by Diffie-Hellman algorithm, correct?

  • @dr.robbackstein2348
    @dr.robbackstein2348 6 лет назад +1

    Seems that most important point is that the public and private keys are mathematically linked, ie. a public key value is what generates the private key value. Is that correct?

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      correct! they are mathematically related pairs. Only private key can decode what the public key encodes.

  • @ylbong954
    @ylbong954 4 года назад +1

    Exellent, clear and simple to understand. Thank you!
    Do you have any of Active directory video?

  • @surgingcircuits6955
    @surgingcircuits6955 4 года назад +1

    Thx! Do you have to use a service to create/use these keys? Or, are their apps for Mac and PC that can be used?

  • @satishdhoni4096
    @satishdhoni4096 6 лет назад +1

    Tq sir .....love 😍👏👌🙏🙏🙏🙏 From India

  • @34521ful
    @34521ful 6 лет назад +1

    Hi Sir, around the 4:22 mark, you say that "can verify that no one has read or "changed" the document in transport", is this entirely true? I understand that a man in the middle can't read it. But can't a man in the middle still "change" it due to no integrity being offered?
    Awesome videos!
    Thanks

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      yes, man in the middle can still change it, that is why we need digital certificate, which is another video in my channel.

  • @erandaweerasingha404
    @erandaweerasingha404 5 лет назад +1

    supper sir ..Best explanation

  • @小林勇次郎-r8t
    @小林勇次郎-r8t 3 года назад

    Hi Sunny, thank you for all your helpful and dedicated work for explaining Network concepts. In this video, I did not understand the point from @1:30 where Mary as the receiver creates a pair of keys. If she is the receiver then why does she generate the two keys? I thought this would be up to the Sender, in this case Tom. Would you be kind enough to elaborate on that? Many thanks

    • @edmilson2712
      @edmilson2712 3 года назад +2

      Hello, let me try to help here:
      Before understanding this use case, you need to understand how asymmetric keys work.
      In asymmetric key, It is necessary to work with a pair of keys:
      - one private key, that you must keep secret. (so only you will know this one)
      - one public key, that you can share with anyone who wants to communicate with you. (many people will know this one)
      How to use them?
      - If you encrypt with the public key, only the private key will decrypt
      - If you encrypt with the private key, only the public key will decrypt
      So what?
      To ensure confidentiality:
      - Mary sents her public key to Tom
      - Tom encrypts the message with Mary´s public key
      Who in the whole world is able to decrypt a message with Mary´s public key?
      - Only Mary can do it because she has the private key!
      Later on, when Mary wants to send an encrypted message to Tom she must use Tom's public key, so:
      - Tom sends his public key to Mary
      - Mary encrypts the message with Tom´s public key.
      - Only Tom can decrypt that message using his private key!
      As you can see, to have a privacy bidirectional conversation:
      - Tom must have a pair of keys and Mary must have a pair of keys.
      - Both senders must use the public key of the other end to encrypt and ensure privacy.
      Another use case:
      How If Tom encrypts with his private key?
      - Anyone with the public key will decrypt, right?
      - Wait, because many people know Tom's public key, so privacy is not ensured!
      - Right, in this case, the asymmetric keys do not ensure privacy, however, it ensures authenticity, because if a message can be decrypted with Tom´s public key, we can ensure Tom is the sender of such message. This is the principle of digital signature.
      I hope this helps.
      Edmilson

  • @psoidonym2389
    @psoidonym2389 3 года назад

    Sunny, I got one question. The public and private key used here. Are those the same public an private key used for digital signature? Or are public and private key used for digitalsignature different from those used for encryption?

  • @flashpundit
    @flashpundit 6 лет назад

    vry vry concise and apt explaintation

  • @thisaraharshana2168
    @thisaraharshana2168 4 года назад +1

    sir thank you for clear explanation

  • @abdulqadirabdulhamid4080
    @abdulqadirabdulhamid4080 2 года назад

    Good explanations sir 🤳🤳
    👍👍

  • @Faruk-zt5iw
    @Faruk-zt5iw 2 года назад

    Thanks for the good explanation

  • @ciscoliveciscolive8048
    @ciscoliveciscolive8048 3 года назад

    Excellent instructions

  • @kirstenmeates8248
    @kirstenmeates8248 6 лет назад

    Great video Sunny

  • @bold-erdenelkhagvasuren9188
    @bold-erdenelkhagvasuren9188 4 года назад

    Hi Sunny, Best explanation about Digital signature. Thanks. by the way how u create that animation, what programm did u use?

  • @osraneslipy
    @osraneslipy 3 года назад

    Love your videos!

  • @dhanush2715
    @dhanush2715 4 года назад +1

    So if Alice wants to reply to bob's message should they use a different pair
    of keys

  • @QaAutomationAlchemist
    @QaAutomationAlchemist 5 лет назад

    Really great and clear video... thanks a lot.

  • @kidgurupratyush2288
    @kidgurupratyush2288 6 лет назад +2

    Wow amazing information :)
    Thank you

  • @asoteico9528
    @asoteico9528 4 года назад +1

    Great Sunny !
    🥇🎖🏅!

  • @gabrielphilips6980
    @gabrielphilips6980 2 года назад

    So if a public key is used to encrypt the message sent, what prevents someone to decrypt and read it?

  • @kworgz
    @kworgz 11 месяцев назад

    YOU ROCK SUNNY!

  • @weisihuang7022
    @weisihuang7022 4 года назад

    The explaining is different than what is showing in the video. In the video, it is showing sending the public key to Alice, and storing the private key in the public key server. However, your explanation is sending the private key to Alice and storing the public key to the public server.

  • @vivekprajapati7911
    @vivekprajapati7911 6 лет назад

    thanks sir you are new hope in my learning.....

  • @ramshidbnuhassan5451
    @ramshidbnuhassan5451 6 лет назад +1

    Sir I have a doubt, how is the receiver Alis know boby sending a message to Alis. for creat the both keys?

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      the typical situation is when a browser wants to access a web server asking for web content. The browser is Alice, and the web server is Bob. When Alice wants to get access to the web content (receiver), Bob would have two keys: private key and public key and its public key would be sent to the receiver Alice.

    • @ramshidbnuhassan5451
      @ramshidbnuhassan5451 6 лет назад

      Sunny Classroom ok sir

  • @NickEnchev
    @NickEnchev 6 лет назад +1

    great videos!