When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!
Hello, I hate to intrude, but could I ask for some help? my OKX wallet holds USDT TRX20, and the phrase is (clean party soccer advance audit clean evil finish tonight involve whip action). How can I send it to EXMO or OKX?
Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!
Hey, I don’t mean to bother you, but could you help me out? In my OKX wallet, I store USDT TRX20, protected by the phrase (clean party soccer advance audit clean evil finish tonight involve whip action). How do I transfer it to EXMO or OKX?
Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the process.....not the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again
Hello, I hate to interrupt, but might you lend a hand? USDT TRX20 is saved in my OKX wallet, and I have the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How can I send it to EXMO or OKX?
Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.
i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done
Heey, same here! I've watched really lots of videos only to search another and another. And so the search continues until I've watched this video. Thankful that I have found this!
Hey, I don’t mean to inconvenience you, but could you help me out? USDT TRX20 is in my OKX wallet and I know the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I transfer it to EXMO or OKX?
Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it , hence the confusion . Thank you for clearing that.
I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.
Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!
Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.
Thank u so much. I am really able to understand the concept in a clear way. I watched many videos of yours and u are a great teacher!!! U're brilliant . I loved ur simple yet on to the point teaching...
My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing. One more time, professor Sunny, congrats!!... Please do not stop your videos!!
Never quoted in any document that the receiver initiate the key pair generation.. that's very important to understand assymetric encryption and u have nailed it..
Many thanks, Essanin Arnaud, for your encouragement. I will do my best. I have at least 50 videos ready to be made and uploaded. I have already made animation parts for lessons. Many thanks. I will find time to make videos at the end of the semester ( I am teaching computer at University of Saint Mary by the way) or during the Christmas break.
Hi Professor Sunny! Always good to be back to your videos!! I only have one question: The private/public key pair is created using RSA algorithm (most likely) and the keys are distributed by Diffie-Hellman algorithm, correct?
Seems that most important point is that the public and private keys are mathematically linked, ie. a public key value is what generates the private key value. Is that correct?
Hi Sir, around the 4:22 mark, you say that "can verify that no one has read or "changed" the document in transport", is this entirely true? I understand that a man in the middle can't read it. But can't a man in the middle still "change" it due to no integrity being offered? Awesome videos! Thanks
Hi Sunny, thank you for all your helpful and dedicated work for explaining Network concepts. In this video, I did not understand the point from @1:30 where Mary as the receiver creates a pair of keys. If she is the receiver then why does she generate the two keys? I thought this would be up to the Sender, in this case Tom. Would you be kind enough to elaborate on that? Many thanks
Hello, let me try to help here: Before understanding this use case, you need to understand how asymmetric keys work. In asymmetric key, It is necessary to work with a pair of keys: - one private key, that you must keep secret. (so only you will know this one) - one public key, that you can share with anyone who wants to communicate with you. (many people will know this one) How to use them? - If you encrypt with the public key, only the private key will decrypt - If you encrypt with the private key, only the public key will decrypt So what? To ensure confidentiality: - Mary sents her public key to Tom - Tom encrypts the message with Mary´s public key Who in the whole world is able to decrypt a message with Mary´s public key? - Only Mary can do it because she has the private key! Later on, when Mary wants to send an encrypted message to Tom she must use Tom's public key, so: - Tom sends his public key to Mary - Mary encrypts the message with Tom´s public key. - Only Tom can decrypt that message using his private key! As you can see, to have a privacy bidirectional conversation: - Tom must have a pair of keys and Mary must have a pair of keys. - Both senders must use the public key of the other end to encrypt and ensure privacy. Another use case: How If Tom encrypts with his private key? - Anyone with the public key will decrypt, right? - Wait, because many people know Tom's public key, so privacy is not ensured! - Right, in this case, the asymmetric keys do not ensure privacy, however, it ensures authenticity, because if a message can be decrypted with Tom´s public key, we can ensure Tom is the sender of such message. This is the principle of digital signature. I hope this helps. Edmilson
Sunny, I got one question. The public and private key used here. Are those the same public an private key used for digital signature? Or are public and private key used for digitalsignature different from those used for encryption?
The explaining is different than what is showing in the video. In the video, it is showing sending the public key to Alice, and storing the private key in the public key server. However, your explanation is sending the private key to Alice and storing the public key to the public server.
the typical situation is when a browser wants to access a web server asking for web content. The browser is Alice, and the web server is Bob. When Alice wants to get access to the web content (receiver), Bob would have two keys: private key and public key and its public key would be sent to the receiver Alice.
When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!
Thanks a lot for your encouragement and kind words. I appreciate it very much.
I also mentioned the same thing in other video
I agree keep up the good work
Agree
Hello, I hate to intrude, but could I ask for some help? my OKX wallet holds USDT TRX20, and the phrase is (clean party soccer advance audit clean evil finish tonight involve whip action). How can I send it to EXMO or OKX?
Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!
Hey, I don’t mean to bother you, but could you help me out? In my OKX wallet, I store USDT TRX20, protected by the phrase (clean party soccer advance audit clean evil finish tonight involve whip action). How do I transfer it to EXMO or OKX?
Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the process.....not the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again
Glad I could help
Hello, I hate to interrupt, but might you lend a hand? USDT TRX20 is saved in my OKX wallet, and I have the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How can I send it to EXMO or OKX?
Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.
i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done
Heey, same here! I've watched really lots of videos only to search another and another. And so the search continues until I've watched this video. Thankful that I have found this!
Hey, I don’t mean to inconvenience you, but could you help me out? USDT TRX20 is in my OKX wallet and I know the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I transfer it to EXMO or OKX?
Best explanation on youtube thanks for clearing my confusion
Many thanks!
Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it , hence the confusion . Thank you for clearing that.
Yes such an important part.
one of the most crucial thing to be mentioned explicitely. That's why sunny is a great educator , look at all his videos.
I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.
Same for me.
I would love to see more videos about different algorithm types. Your explanations are so easy to understand. Thanks again Sunny!
I will put them in my to-do-list.
Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!
Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!
Sunny, your explanation on such a technical subject is excellent. Keep up this great work.
Thanks a lot.
Sunny, I love your smile and friendly aura. Your work is honest charity and I admire that.
Actually very clear and get to the point despite not native English... Great work!
Such a clear explanation about asymmetric key encryption! Thank you for the video!
Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.
Thank u so much. I am really able to understand the concept in a clear way. I watched many videos of yours and u are a great teacher!!! U're brilliant . I loved ur simple yet on to the point teaching...
Thanks a lot for saying so nice things. I hope my own students think so :)
My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing.
One more time, professor Sunny, congrats!!... Please do not stop your videos!!
Thank you so much, You are my first reference when I need clear explanation about anything related to networks. God bless you Mr. Sunny
Glad it was helpful!
I create this for learning channel to beginners. spread this channel to the people who want to learn networking.
Never quoted in any document that the receiver initiate the key pair generation.. that's very important to understand assymetric encryption and u have nailed it..
One of the best explanation of asymmetric encryption.
Many thanks!
By far the best explanation that i have come across. Subscribed to your channel. Please keep publishing.
Thank you Vikas for leaving nice comments. I will do, sir.
These videos by Sunny are fantastic! SOOO helpful! Thank you!
You are very welcome!
your videos makes to me want watch more and more, your explanations are very simples, a lot of thanks!!.
many thanks!
My O Levels books didn't explain this topic so well. Great job!
As always, you do an awesome job Sunny. Thank you so much for your wonderful videos. Keep going bro!
Thanks, will do!
Me: *Need random IT concept explained*
Sunny: "Hello, this is Sunny. Welcome back"
best teacher out there.. and catching tune at start of videos
Thank you alot sunny, you are the best teacher, I enjoy learning from your videos, , thanks again
You are very welcome!
Much better explanation than in universities
This channel is a gem. Thank you so much.
Your explanations are very understandable.
Thank you very much!
Great job on the video! I hope your channel grows!
good explanation and easy to understand bcos you use a simple English. keep up the good work. and thank you for making me more understand
You are welcome!
Bless you! Bless you! finally I've found a good explanation for Asymmetric cryptography. Thanks a lot!
You're very welcome!
Your explanation is very clear professor sunny. Thank you very much. Grate work
Really appreciate your dedication. Thank you for your clear explanations.
My pleasure!
very informative, thank you for your video, simple explanation for a complex subject
You are welcome. And thank you for leaving nice feedback!
I like the way you explained the public key 😉 keep the good work,👍🏿
Very informative and clearly explained. Great job! Thank you
best explaination on youtube. congrats
Thanks a lot.
Perfect Simple And Easy To Understand. Thank you Sunny
You are welcome!
My teacher! what a great aexplanation!
Excellent work Sunny! Please keep making these videos.
great explanation and great way to explain. thanks for sharing your knowledge and help the community.
Best Tutorials ever, well designed and clear steps
Thank you, God Bless
You're very welcome!
The best
Only you have such content and only you can tech me topics i dont grasp
Extraordinary teaching sir....
So nice of you!
fantastic explanation sunny thank you a million!
This is on point sunny
Thank you for watching!
Great concise explanation
Great explanation. Easy to understand
Thank you so much professor ! I wish I had you in college..
God bless you°°
superb explation. thanks for simplifying the topic .
Glad it was helpful!
Sunny thank you so much for making these videos. It has helped me tremendously.
Master explanation brother :-)
Happy to help
The animations are very helpful, thank you!
Excellent explanation!!!
Glad it was helpful!
Nice lecture...well explained
Thanks a lot.
You're cool, Sunny ♥ Thank you for making these lessons
Thank you so much Prof. Sunny!
Very good lesson..everything is clear. Thank you and want to have more video from you.
Many thanks, Essanin Arnaud, for your encouragement. I will do my best. I have at least 50 videos ready to be made and uploaded. I have already made animation parts for lessons. Many thanks. I will find time to make videos at the end of the semester ( I am teaching computer at University of Saint Mary by the way) or during the Christmas break.
Wow amazing explanation
Glad you liked it!
Love your videos man! I hope to see more.
I am glad you like them.
Thank you very much for this clear explanation
Such a good and clear video. Bravo!
Thankyou very much, all your videos are amazing!
Sunny your videos are so good!! Thank you so much!!
THIS IS WHAT I NEEDED. THANKS
Explained very well... Thank you sir...
You are welcome and thanks for taking the time to write a nice comment.
Awesome video 👍👍👌 I understood easily thq sir 🙏😍
You are welcome!
Nice explanation. Are you from North Eastern India?
Thank you for watching!
very well explained using videos. Thanks alot sir
Hi Professor Sunny! Always good to be back to your videos!! I only have one question:
The private/public key pair is created using RSA algorithm (most likely) and the keys are distributed by Diffie-Hellman algorithm, correct?
I believe you are correct!
@@sunnyclassroom24 Thank you!!
@@Daniel_CLopes YOu are welcome!
Seems that most important point is that the public and private keys are mathematically linked, ie. a public key value is what generates the private key value. Is that correct?
correct! they are mathematically related pairs. Only private key can decode what the public key encodes.
Exellent, clear and simple to understand. Thank you!
Do you have any of Active directory video?
Thx! Do you have to use a service to create/use these keys? Or, are their apps for Mac and PC that can be used?
Tq sir .....love 😍👏👌🙏🙏🙏🙏 From India
Hi Sir, around the 4:22 mark, you say that "can verify that no one has read or "changed" the document in transport", is this entirely true? I understand that a man in the middle can't read it. But can't a man in the middle still "change" it due to no integrity being offered?
Awesome videos!
Thanks
yes, man in the middle can still change it, that is why we need digital certificate, which is another video in my channel.
supper sir ..Best explanation
Thank you for your time!
Hi Sunny, thank you for all your helpful and dedicated work for explaining Network concepts. In this video, I did not understand the point from @1:30 where Mary as the receiver creates a pair of keys. If she is the receiver then why does she generate the two keys? I thought this would be up to the Sender, in this case Tom. Would you be kind enough to elaborate on that? Many thanks
Hello, let me try to help here:
Before understanding this use case, you need to understand how asymmetric keys work.
In asymmetric key, It is necessary to work with a pair of keys:
- one private key, that you must keep secret. (so only you will know this one)
- one public key, that you can share with anyone who wants to communicate with you. (many people will know this one)
How to use them?
- If you encrypt with the public key, only the private key will decrypt
- If you encrypt with the private key, only the public key will decrypt
So what?
To ensure confidentiality:
- Mary sents her public key to Tom
- Tom encrypts the message with Mary´s public key
Who in the whole world is able to decrypt a message with Mary´s public key?
- Only Mary can do it because she has the private key!
Later on, when Mary wants to send an encrypted message to Tom she must use Tom's public key, so:
- Tom sends his public key to Mary
- Mary encrypts the message with Tom´s public key.
- Only Tom can decrypt that message using his private key!
As you can see, to have a privacy bidirectional conversation:
- Tom must have a pair of keys and Mary must have a pair of keys.
- Both senders must use the public key of the other end to encrypt and ensure privacy.
Another use case:
How If Tom encrypts with his private key?
- Anyone with the public key will decrypt, right?
- Wait, because many people know Tom's public key, so privacy is not ensured!
- Right, in this case, the asymmetric keys do not ensure privacy, however, it ensures authenticity, because if a message can be decrypted with Tom´s public key, we can ensure Tom is the sender of such message. This is the principle of digital signature.
I hope this helps.
Edmilson
Sunny, I got one question. The public and private key used here. Are those the same public an private key used for digital signature? Or are public and private key used for digitalsignature different from those used for encryption?
vry vry concise and apt explaintation
sir thank you for clear explanation
You are welcome
Good explanations sir 🤳🤳
👍👍
Thanks for the good explanation
Excellent instructions
Great video Sunny
Hi Sunny, Best explanation about Digital signature. Thanks. by the way how u create that animation, what programm did u use?
flash
Love your videos!
So if Alice wants to reply to bob's message should they use a different pair
of keys
Really great and clear video... thanks a lot.
Wow amazing information :)
Thank you
Great Sunny !
🥇🎖🏅!
So if a public key is used to encrypt the message sent, what prevents someone to decrypt and read it?
YOU ROCK SUNNY!
The explaining is different than what is showing in the video. In the video, it is showing sending the public key to Alice, and storing the private key in the public key server. However, your explanation is sending the private key to Alice and storing the public key to the public server.
thanks sir you are new hope in my learning.....
Sir I have a doubt, how is the receiver Alis know boby sending a message to Alis. for creat the both keys?
the typical situation is when a browser wants to access a web server asking for web content. The browser is Alice, and the web server is Bob. When Alice wants to get access to the web content (receiver), Bob would have two keys: private key and public key and its public key would be sent to the receiver Alice.
Sunny Classroom ok sir
great videos!