Это видео недоступно.
Сожалеем об этом.

Public key cryptography: What is it? | Computer Science | Khan Academy

Поделиться
HTML-код
  • Опубликовано: 27 апр 2014
  • Why do we need public key cryptography?
    Watch the next lesson: www.khanacadem...
    Missed the previous lesson? www.khanacadem...
    Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information).
    About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything.
    For free. For everyone. Forever. #YouCanLearnAnything
    Subscribe to Khan Academy’s Computer Science channel: / channel
    Subscribe to Khan Academy: www.youtube.co...

Комментарии • 13

  • @dhayes5143
    @dhayes5143 3 года назад +5

    This paint analogy is much much better than any involving secret messages or simplified versions of the maths involved. After many videos on the topic, I finally understand it! Thank you.

  • @spock7945
    @spock7945 6 лет назад +3

    such non technical or non jargon laden educational videos can be a good starting point to go on and hook students/people up!

  • @78anurag
    @78anurag 2 года назад +4

    Who's thought of this must have been genius

  • @alvinkatojr
    @alvinkatojr 8 лет назад +3

    Brilliant explanation!

  • @UhOohSpaghettiOs
    @UhOohSpaghettiOs 9 лет назад +4

    So... encryption algorithms which only use 1 key (private key) are known as Symmetric Encryption methods right?
    and encryption algorithms which use a private key and a public key like the example above are Asymmetric encryption methods? Is this correct? and is the Symmetric encryption method (1 key) still in use today?

    • @AlekseyVitebskiy
      @AlekseyVitebskiy 9 лет назад +5

      Yes, the symmetric encryption methods are still used today. Public key cryptography is only used for key exchange. The reason for this is that public key cryptography tends to be slow, while private key cryptography is fast(er). For example in SSL, the initial handshake is usually done with RSA (public key encryption) and actual communication is done with AES. Essentially the only thing that's encrypted by RSA is the AES private key, the actual message is encrypted using AES.

  • @nacs
    @nacs 8 лет назад +5

    0:17 -- Apparently Bush narrated this video -- "Nu-key-ler"

  • @tennma6250
    @tennma6250 6 лет назад

    Thank you for korean subtitle

  • @ahfbemdlcnr
    @ahfbemdlcnr 5 лет назад

    I think it is not an explanation of public key cryptography, but Diffie-Hellman key exchange.

  • @rupert2002
    @rupert2002 6 лет назад

    Early works of Christian Bale 2:13

  • @melp7614
    @melp7614 3 года назад

    Just 19secs in & this video is invalidated by the fact you seemingly don't know that new-cue-lar is not a word. President GW Bush saying a thousand times while in office doesn't change that. It's pronounced new-clee-er. 🤦‍♀️