Encryption - Symmetric Encryption vs Asymmetric Encryption - Cryptography - Practical TLS

Поделиться
HTML-код
  • Опубликовано: 22 дек 2024

Комментарии • 157

  • @PracticalNetworking
    @PracticalNetworking  3 года назад +8

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

  • @gmeister3022
    @gmeister3022 2 года назад +76

    My friend, I've heard many people tried to explain this, some with many years in the tech industry, but you do it so clearly that you put other explanations to shame. Thanks for this video!!

  • @drakezen
    @drakezen 3 года назад +32

    Easily one of the best explanations between the two types of encryption. Well done!

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Thank you kindly, glad you enjoyed it!

    • @solowolf5304
      @solowolf5304 Год назад

      @@PracticalNetworking I didn't understand the fact that private key is required to decrypt the cipher text, if that is the case then why don't u need to share this private key to the receiver ? How will a receiver decrypt the cypher text without having a private key ?

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      @@solowolf5304 Private Keys only exist in Asymmetric Encryption -- which features _two_ keys, a Private Key, and a Public Key. With Symmetric Encryption, there is only 1 key, and you could consider it also "Private".
      Try this video, see if it helps make sense of it: ruclips.net/video/_zyKvPvh808/видео.html

  • @x0rZ15t
    @x0rZ15t Год назад +4

    The way you explained symmetric vs asymmetric encryption was simply magnificent in it's simplicity and effectiveness. Bravo!

  • @santoshkumar-dr4qg
    @santoshkumar-dr4qg 3 года назад +7

    Excellent explanation - I have been trying to learn SSL/TLS for the last few years but am unable to grab a basic understanding.
    A couple of points I would like to highlight that were observed while going through the content.
    > Just enough talk ( not too short or too long videos)
    > Each video is mostly equivalence of reading several pages of the textbooks/articles/blogs
    > Simple demonstrations that can be easily followed.
    > Animations used to lay down the foundation/concepts are very effective.
    > Use of simple English that can be understood by non-spoken English people like me.
    > Along with SSL/TLS, Basic networking concepts are also very effective for people who want to learn how networking works.
    > Last but not the least, author/speaker/teacher also explains international events (like Facebook outage) as an example to let other people understand the concept behind the scene.
    > Even though few videos are long enough but they are very engaging, you will never feel bore.
    So thank you once again for distributing clear and concise knowledge. God bless you.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Thanks for the thorough feedback and the kind words, Santosh. That is kind of you to say!
      You're very welcome, I'm so happy you've found a lot of value from this channel =)

  • @peterchmelar8886
    @peterchmelar8886 3 года назад +6

    The level of clarity in your explanation is absolute :) Thanks for that

  • @worop
    @worop 10 месяцев назад +1

    This is the best explanation of this concept I’ve seen to date. Great stuff! Thanks! The other videos in this playlist are equally helpful!

  • @runner4102
    @runner4102 2 года назад +2

    Thanks!

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Thank you for supporting this channel, Runner. Much appreciated =)

  • @alittax
    @alittax 3 года назад +7

    Man, this is BEAUTIFUL! I don't say this very often, but your explanations really are that!!! You've probably given us an insight into the minds of those people who have invented these concepts or work with them on a regular basis: I imagine that they have this clear understanding of the concepts! Bravo!

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Thanks for the kind words AlittA. It's nice to hear this content is appreciated =)

  • @Franco-ss4bu
    @Franco-ss4bu 3 месяца назад +2

    your example using the alphabet is perfect. Finally understood it. Extremely well explained

  • @scottspa74
    @scottspa74 3 года назад +2

    I NEEDED this video so bad. In college, cybersecurity fundamentals 274, my instructor (highly regarded, consults DHS, etc) could not seem to get it thru to me, or I just couldn't get it. Sooo looking forward to this video. Thank you!

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      You're in for a treat next week then =). And the weeks that follow! Lot's of good stuff coming out.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Congrats! You won free access to the course! Reach out to me on Discord to claim your prize! pracnet.net/discord

  • @Spellzzzweaver
    @Spellzzzweaver 3 года назад +5

    The cypher forwards backwards is a genius way of showing asymmetric.

  • @ramkowsu5295
    @ramkowsu5295 Год назад +1

    Awesome, I watched all outside videos but they are cipher text to me; but your videos are "clear text". Thanks for the great work. Keep up

  • @KENDYJOSEPH-ef8md
    @KENDYJOSEPH-ef8md Год назад

    One of the best explanations between the two types of encryption. Awesome.

  • @e2622
    @e2622 8 месяцев назад

    Sweet jesus, this is the best tutorial on youtube regarding the types of encryption! Thank you!

  • @RenzoCotta
    @RenzoCotta Год назад

    this is one of the best explanations about ssl out there .... thanks a lot

  • @ajayb9392
    @ajayb9392 3 года назад +2

    Awesome explanation. As always you make it simpler. Thank you very much for making these contents free for us.

  • @vishalrugle538
    @vishalrugle538 3 года назад +4

    The way you explain the concept is highly appreciated. I am commenting on this after going through your courses NAT, NAT on ASA, NAT on IOS ,CCNA Basic videos on RUclips and the one-course INE. Really looking for BGP, Security and F5-related courses from you in the future. I request other audiences to please share and encourage Ed Harmoush so that we will get quality content on a different topic. Thanks a lot Ed.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Thank you for the kind words, Vishal, and for all your support =). I hope the TLS course will free me up to put all my effort into course creation!

  • @ragemoody
    @ragemoody Год назад +2

    This is the third video of yours I've watched today and I'm super impressed by how good your explanations of all these topics are. So many people struggle explaining these concepts but you make it sound very easy. Again, I'm super impressed. I will make sure to share your channel whenever I can, thank you for your work!!

  • @arishkhan8325
    @arishkhan8325 3 года назад +1

    Outstanding explanation .all content of this channel are mind-blowing ....thank you for making video for free of cost.

  • @scottspa74
    @scottspa74 3 года назад +1

    Super excited for the next video you teased, getting more into public and private, and asymmetric. My understanding is that the primary function of asymmetric keys is to securely share the symmetric key - bit I could certainly have misunderstood (in class). And, that the private key facilitates authentication, in that, since only the sender (encryptor) of a message has their own private key to decrypt said message, that proves it was sent from their machine and that they encrypted it. I don't know if I'm right about all this. I'm sooo hoping you can touch on this in the follow up video. Thanks for the great content.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      We'll be touching on all this in the next two videos, actually. But yes, you're on the right track =)

  • @sunyatalove
    @sunyatalove 2 года назад +1

    Very good explanation . Am working with symmetric and asymmetric encryption libraries in telecoms systems without knowing the internals. This video gives a really clear explanation

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      Glad these helped you, Kevin. If the work involves SSL/TLS in any way, I'm sure your employer would happily fund the full Practical TLS course =).

    • @sunyatalove
      @sunyatalove 2 года назад +1

      @@PracticalNetworking Yes i will enroll for sure

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      @@sunyatalove Excellent. Looking forward to having you in class =)

  • @aspected
    @aspected 11 месяцев назад +1

    These videos are absolutely fantastic. You explain stuff so well

  • @jonathannagy786
    @jonathannagy786 2 года назад +2

    At 8:07, the data is encrypted with the public key to be later decrypted with the private key. What is it that prevents someone from decrypting it with the public key?

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +2

      Answered around 6:00~ -- the math features trap door algorithms which can only go one way. Knowing the public key does not let you decrypt the content back into clear text.

  • @divyagupta3685
    @divyagupta3685 8 месяцев назад

    So many praises from the persons from computer technology world but your explanation also made me to understand this topic while I am a layman in this world

  • @pautome461
    @pautome461 3 года назад +1

    Great job! I'll recomend your videos to my pupils at school. Thanks

  • @GurkanALTAY
    @GurkanALTAY 3 года назад +2

    Very simple and clear definition. Thanks! 💚

  • @BBbyMM
    @BBbyMM 6 месяцев назад

    Hands down THE BEST explanation

  • @lahmeurayoub6106
    @lahmeurayoub6106 3 года назад +2

    the way your break down things and make them simpler is mind blowing, thanks for sharing with us this video.

  • @misterkevin_rs4401
    @misterkevin_rs4401 2 года назад +1

    One of the best explainations on the topic.

  • @andriykuts1981
    @andriykuts1981 2 года назад +1

    the best explanations of the encryption

  • @utoobbott8817
    @utoobbott8817 Год назад +1

    I have shared your video with my friends!! Excellent video!!!!!

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Thank you kindly, Uto. Thank you for supporting the channel with shares =).

  • @dustinhxc
    @dustinhxc Год назад +2

    Fantastic explanation!!!! Thank you!

  • @tareqalhammoodi1061
    @tareqalhammoodi1061 6 месяцев назад

    BEST VIDEO ON THE INTERNET!!!!

  • @adnanfaridi
    @adnanfaridi Год назад

    Better than many books sold on the market.

  • @jaehyi2009
    @jaehyi2009 2 года назад +1

    You never disappoint! Thanks again for a great video!

  • @wwolfram33
    @wwolfram33 2 года назад +1

    This is a great lesson. Thanks Ed!

  • @vanweldenpaul
    @vanweldenpaul 10 месяцев назад +1

    Hello, diffie-Hellman is not a asymmetric ecrypition algorithm. It is a key exchange algoritm. Paul

  • @adrianairda
    @adrianairda 2 года назад +1

    Very informative and easy to understand, thank you

  • @rafay1708
    @rafay1708 3 года назад +1

    thank you Sir. I love the way you explain. Like always perfect, waiting for next Video.✌

  • @richasharma598
    @richasharma598 Год назад

    In awe of your explanation.

  • @ROckOn66000
    @ROckOn66000 Год назад +1

    You are amazing. May ALLAH (GOD) gives you success. You explained the complex things into simple and understandable words.

  • @lallu1122
    @lallu1122 Год назад

    Best video i ever watched.

  • @ComputerCornerCafe
    @ComputerCornerCafe 2 месяца назад +1

    i love pracnet

  • @hosseinshourabi398
    @hosseinshourabi398 2 года назад +1

    Very well explained.
    Thanks Ed.

  • @NW-lj6oo
    @NW-lj6oo 2 года назад +1

    Excellent and simple explanation.

  • @duggy2114
    @duggy2114 Год назад +1

    How can we have 'h' in the cipher "khoor" when we shift forward the letters in the word hello by 3 positions for symmetric encryption? Shouldn't the result be "knqqt"?

    • @PracticalNetworking
      @PracticalNetworking  Год назад +1

      Hrmm... how are you getting N / Q / T for the letters E / L / O? By my calculation, shifting 3 from E / L / O gets H / O / R

    • @duggy2114
      @duggy2114 Год назад

      @@PracticalNetworking Thanks! I misunderstood because I thought my current position will be used as a point of reference instead of the letters in the message.

    • @PracticalNetworking
      @PracticalNetworking  Год назад +2

      @@duggy2114 There it is ;) GLad you figured it out now! Cheers, Duggy!

  • @JordanScanlon
    @JordanScanlon Год назад

    It will be interesting to see how quantum computing affects the industry.

  • @hasnaa7316
    @hasnaa7316 7 месяцев назад

    you’re amazing and you saved me

  • @LuvxJacqu4li8e
    @LuvxJacqu4li8e Год назад

    Nice. This is more than what I learned in my Master's cryptography course. LOL. No wonder college is nor worth it anymore.

  • @NikhodeCastro
    @NikhodeCastro 9 месяцев назад

    Hi! I have something to ask, if the Symmetric Encryption called Caesar Cipher can I know what method called for Asymmetric Encryption?

  • @murattasova7598
    @murattasova7598 21 день назад

    Thanks for the excellent explanation!

  • @RafaelGonzalez-p2o
    @RafaelGonzalez-p2o 26 дней назад

    Excellent explanation

  • @silverbell6160
    @silverbell6160 2 года назад +1

    Excellent! Thank you!

  • @SaikrishnaBala
    @SaikrishnaBala Месяц назад

    Thanks for your wonderful explanation

  • @Moocow2003
    @Moocow2003 9 месяцев назад

    thank you! this video broke down the topic really well :)

  • @NikhodeCastro
    @NikhodeCastro 9 месяцев назад

    Hi! I have something to ask, if the Symmetric called Caesar cipher, can I know what is called for Asymmetric?

  • @yadgayan
    @yadgayan 2 года назад +1

    what if user use asymmetric encrypt key to decrypt pkt? or we cnt decrypt with with encrypt key?

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      The key itself is completely different. You won't be able to decrypt with an asymmetric key something that was encrypted with a symmetric key.

  • @adedejiemmanuel1
    @adedejiemmanuel1 3 года назад +1

    Another great video. Thank you

  • @basmamjouel2893
    @basmamjouel2893 2 года назад +1

    i didn't quite undertsand why not move backwards with the asymetric encryption.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Asymmetric Math uses trap door functions that can only be done in one direction.
      Actually, when I talked about TLS with David Bombal, I provided an example of the "can't go backwards" with Asymmetric encryption. The exact portion starts around the 12 minute mark in this video: ruclips.net/video/25_ftpJ-2ME/видео.html

  • @xcelnt2000in
    @xcelnt2000in 3 года назад +1

    Very well explained...Thanks

  • @IliyaDamyanov
    @IliyaDamyanov Год назад +1

    This is very good video.

  • @maciejwodecki9294
    @maciejwodecki9294 Год назад

    Thank you very much for those videos, they helped me a lot to fill gaps in my knowledge.

  • @realnanact
    @realnanact 3 года назад +1

    Very informative. Keep it up.,Sir.

  • @user-cc8kb
    @user-cc8kb Год назад

    GREAT explanation! Thanks a lot.

  • @maryanne2025
    @maryanne2025 Год назад

    Absolutely superb

  • @youthfull3616
    @youthfull3616 Год назад

    Amazing explanation. ❤

  • @rockinron5113
    @rockinron5113 Год назад

    Great tutorial. Thanks. 👍🏻

  • @randyg666
    @randyg666 2 года назад +1

    Man this was great!!!!

  • @LuvxJacqu4li8e
    @LuvxJacqu4li8e Год назад

    Amazingly done

  • @blackberry9283
    @blackberry9283 8 месяцев назад

    Please explain Chiper Text Expansion ?

  • @PKJamal-b5q
    @PKJamal-b5q 9 месяцев назад +1

    THANKS

  • @nocare3356
    @nocare3356 3 года назад +1

    Iam learning this lesson today…. RUclips algorithm is cryzy 😜

  • @a143r
    @a143r 3 года назад +1

    Excellent we need more videos

  • @haroldhale3964
    @haroldhale3964 2 года назад +1

    Thank you.✌🏾

  • @lallu1122
    @lallu1122 Год назад

    Great work-

  • @FKU7777
    @FKU7777 6 месяцев назад

    Excellent, subbed 👍

  • @bernietamberg8581
    @bernietamberg8581 3 месяца назад

    Excellenttttt ❤

  • @dalao3
    @dalao3 2 года назад +1

    You are excellent ...

  • @Saryarkalyk
    @Saryarkalyk 10 дней назад

    Thank you!

  • @danielaloycedaniel
    @danielaloycedaniel Месяц назад

    I don't understand the one that uses different decryption and encryption key

  • @menofy22
    @menofy22 10 месяцев назад

    WDF TPD What does it mean ?

  • @LuvxJacqu4li8e
    @LuvxJacqu4li8e Год назад

    Aaaah public vs private greatly explained.

  • @Gerry_Raserole
    @Gerry_Raserole 7 месяцев назад

    Nice 1....I should have been here earlier!!!

  • @ahmadhaider9713
    @ahmadhaider9713 2 месяца назад

    Thank you so much

  • @kalegety
    @kalegety 6 месяцев назад

    thank you

  • @arunrajput1007
    @arunrajput1007 Месяц назад

    I think this is the best example of quote
    if you are expert in something don't do it for free

  • @prasadfalke376
    @prasadfalke376 2 года назад +1

    This person is god.

  • @Рельныйобзор
    @Рельныйобзор Год назад

    thank you very mach for best working

  • @robertapalmert
    @robertapalmert Год назад

    Thank youu!

  • @SpencerBoucher
    @SpencerBoucher 3 года назад +1

    Nice

  • @davinderkumar903
    @davinderkumar903 Год назад

    Wow, thanks :)

  • @Don-Carillo
    @Don-Carillo 3 года назад +1

    Thanks 😊.

  • @Gorlung
    @Gorlung Год назад

    Still unclear. Why an attacker couldn't take the public key (5) and decrypt the "hello" going back and not forward, ignoring the asymmetric decryption algorithm?

    • @grandevalpha
      @grandevalpha 8 месяцев назад

      For the symetric one? The key is shouldnt be sent together with the data itsel

  • @Nunesi
    @Nunesi 2 года назад +1

    👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻👏🏻❤️

  • @ahmetkarakartal9563
    @ahmetkarakartal9563 7 месяцев назад

    THANK YOU SO MUCCCHHH, I WİLL BUY YOUR COURSES IF I HAVE MONEYYYYY

  • @manee427
    @manee427 5 месяцев назад

    wow

  • @skeletron9505
    @skeletron9505 2 года назад +1

    el barto was here

  • @shanebutler9876
    @shanebutler9876 Год назад +1

    Thanks!

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Thank you for supporting the channel, Shane.

    • @shanebutler9876
      @shanebutler9876 Год назад +1

      It is by far the best content I have ever come across bar none in this space, keep the content coming 🤩🤩🤩

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      @@shanebutler9876 =) I'll do my best.
      If you enjoyed this video, consider the full TLS course. It's the same quality instruction covering the entire TLS ecosystem =).