An encryption can be anything that you and another person can agree to. You can think of it as a password you give to someone without giving the password. A code that only you know how to crack using an agreed system. Hope that helps.
This is overly scripted an lacks answers. I wish this video focused more on the educational part than desperately trying to entertain. This video tells us encryption by its definition but not how it works. I dislike this video. Sorry.
Unless I'm mistaken at 1:20 there is a mistake. Data encrypted with a public key can only be opened and read with a private key. - correct Data encrypted with a private key can... - STOP that's wrong It's a one way interaction. If you want to send something to another person with this type of encryption you need to have their public key so that they can open it with their private key. So encrypted communication between two people consists of each person having the other's unique public key and each person having their own unique private key. The public keys are for sending encrypted messages to specific people that own the matching private key. Let me know if I'm wrong. Hope this helps anyone.
Isn't there is a small mistake at 1:27? My observation is: you can't "open" a private key encrypted message with a public key, you can only proof it has been 'signed' with a certain private key; that you relate to the public key somebody. But how do you know who actually signed? Imagine Eve gets hold of Alice's private keys... But anyways: the content remains hidden. an asymmetric public key can (with some effort) be generated from its private key anyway; however this NOT vice versa.
I think this is pretty good but.... u should explain how do u make the translation from the input with the private key to the output and the public key, for example using XOR to translated the data but make a real life example with actual data. thx
Public key vs. symmetric key Tools that support public key (emial etc.) How to make and share a public key Types and sizes of keys 128 vs 256 vs 512 vs Public 1024 vs public 4096 What e-mail is encrypted, and where it may be "in-the-clear". Gmail to Gmail is encrypted by google "end to end" but still visible to Google. Same for Hotmail, but Gmail to Hotmail goes "in-the-clear" when it goes from the Google serve to the Microsoft server. May be hard to find (for a bad guy) but it is out there.
Thanks for the big abstraction! For all the haters who want more details: There are other longer videos available. For me this was very helpful to understand the general idea =) Thank you !
I have a problem. Will say "Eve" has already stolen my code I changed my code and turned off the wifi NO longer using it. Eve is trying to get my new code using security cameras. Can eve get the code any other way? like data useage? Does she need my phone itself?
+Drake B Eh, close enough. For RSA at least, the signature is just a hash of the message encrypted with the sender's private key. Having to explain all that though would just complicate the analogy, and doesn't really add any important information for the average person.
Well if it is Public Key as described, then you had to make you own Public/private pair. You will get the e-mail and it will probably say see attached, encrypted with your public key. If it is Symmetric key (you both use the same key to encrypt and de-crypt) then you will have already shared the key so you will know what to do when you get a message from Bob...
You lost me at "data from a public key can only be opened using a private key..." This sounds like the key concept (pardon the pun). My brain screamed "so why can't the public key open the data encrypted with the public key?" and promptly shut down.
Everybody is so salty lol I think it is a great way to explain "what is encryption and how does it work", the title doesn't say anything about "learn everything about cryptography in this 3 minutes long youtube video"
This literally made my understanding of encryption worse...
+Kevin Stovall Agree.
Kevin Stovall it's actually a good example
An encryption can be anything that you and another person can agree to. You can think of it as a password you give to someone without giving the password. A code that only you know how to crack using an agreed system. Hope that helps.
He literally doesn't explain it all! Wtf is this lol. This explanation is horrible
Thought I was the only one
I somehow get how it worked now but I got lost on the keys.
Can you clarify the analogy? Is the encryption analogous to putting the letter in the box?
This actually cleared up some questions I was having. Now that I have the fundamental, I can build on that.
bc of this i failed my exam thanks
Absolutely phenomenal explanation, short, to the point and the illustration made it so easy to understand
this made me even more confused
I would like a refund for the last 3min of my life.
lmao...dead
And the last 1 second?
ahahahahah
lmao same god please help me
Why does Eve even have Alice's public ket to begin with? If its private, should the key not only belong to the people who has access to it?
What an explanation. Made it so simple to understand! Great video :)
This is overly scripted an lacks answers. I wish this video focused more on the educational part than desperately trying to entertain. This video tells us encryption by its definition but not how it works. I dislike this video. Sorry.
This is a "how it works" video, not an explanation.
Unless I'm mistaken at 1:20 there is a mistake.
Data encrypted with a public key can only be opened and read with a private key. - correct
Data encrypted with a private key can... - STOP that's wrong
It's a one way interaction. If you want to send something to another person with this type of encryption you need to have their public key so that they can open it with their private key.
So encrypted communication between two people consists of each person having the other's unique public key and each person having their own unique private key. The public keys are for sending encrypted messages to specific people that own the matching private key.
Let me know if I'm wrong. Hope this helps anyone.
well you're right you just heard the guy wrong bc he said exactly what you said lmao
Isn't there is a small mistake at 1:27? My observation is:
you can't "open" a private key encrypted message with a public key, you can only proof it has been 'signed' with a certain private key; that you relate to the public key somebody. But how do you know who actually signed? Imagine Eve gets hold of Alice's private keys... But anyways: the content remains hidden.
an asymmetric public key can (with some effort) be generated from its private key anyway; however this NOT vice versa.
I think this is pretty good but.... u should explain how do u make the translation from the input with the private key to the output and the public key, for example using XOR to translated the data but make a real life example with actual data. thx
wow, great explanation. You explain everything very clearly. Thanks a ton.
This is a great explanation of how public key encryption works. I'll have to remember this one...
+Andrew Meyer Thanks Andrew. Let us know if there's anything you'd like us to explain in the future!
Public key vs. symmetric key
Tools that support public key (emial etc.)
How to make and share a public key
Types and sizes of keys 128 vs 256 vs 512 vs Public 1024 vs public 4096
What e-mail is encrypted, and where it may be "in-the-clear". Gmail to Gmail is encrypted by google "end to end" but still visible to Google. Same for Hotmail, but Gmail to Hotmail goes "in-the-clear" when it goes from the Google serve to the Microsoft server. May be hard to find (for a bad guy) but it is out there.
Thanks for the video. Pretty helpful !
Is there one private key used to decrypt multiple messages or is there a private key for every decryption
Thanks for the big abstraction!
For all the haters who want more details: There are other longer videos available.
For me this was very helpful to understand the general idea =)
Thank you !
easily explained thanks...😊😊😊
Thanks for your help ❤️❤️❤️
I have a problem. Will say "Eve" has already stolen my code I changed my code and turned off the wifi NO longer using it. Eve is trying to get my new code using security cameras. Can eve get the code any other way? like data useage? Does she need my phone itself?
What does the" key " represent?
thanks a lot studying for my A+ cert
Nice explanation. appreciatable
Nice video and metaphor but RSA encryption is not "double" encryption, authentication is checked by encryption a "signature" with the private key
+Drake B Eh, close enough. For RSA at least, the signature is just a hash of the message encrypted with the sender's private key. Having to explain all that though would just complicate the analogy, and doesn't really add any important information for the average person.
Oh my, I'm more confused than the granny next door.
it is very helpful to me . thax for video.
Best explanation. Thank you
why did eve do that?
So... how does it actually work? I found this explanation everywhere, but no one says how it works.
Basic question here.
how does the person receiving an encrypted message know the password to Access the Data/email/etc..
Well if it is Public Key as described, then you had to make you own Public/private pair. You will get the e-mail and it will probably say see attached, encrypted with your public key.
If it is Symmetric key (you both use the same key to encrypt and de-crypt) then you will have already shared the key so you will know what to do when you get a message from Bob...
soooo ummmm whats a key? I still don't get it. its like a password, right?
Interesting Presentation.. Looking forward for more
+Rokibul Hasan Tanzim Thanks! Anything you'd like us to explain next?
Good explanation
I lost all my files when i accidentaly encrypted my sd card
How do you accidentally encrypt something?
Brian W when you try something you dont know about checking random operations
great job !!
very well explanation!
Is it possible for me to download your video and dub in my language?
I'm So excited and don't know why😁😁😁Thanks
thanks very muchhh
You lost me at "data from a public key can only be opened using a private key..." This sounds like the key concept (pardon the pun). My brain screamed "so why can't the public key open the data encrypted with the public key?" and promptly shut down.
The first example of shifting the letters is just obfuscation and not encryption.
i am not an expert on cryptography but that is encrypting a message
Nicely Explained keep it up
Anyone know who Eve is?
very well explained :)
+Shaffiullah khan Thanks!
Netflix and Chill? Yep ;)
So Elon musk buying twitter mean we’re all doomed
thanks a lot dude...!
That helped. tnx.
HI EVERYBODY I AM FROM MALAYSIA , SEREMBAN , IN A METHODIST SCHOOL ,MY NAME IS MG
Nice Video
Mmm... Actually, you can learn how to encrypt your Wireless Network here: www.router-reset.com/how-encrypt-your-wireless-network/
Hey nice video dude thanks 😎😏 could you make a video how a cryptanalysts decrypts AES 256 and cryptography please and thanks
Your wish is in the link I provided
Alice is Thick AF
I think you meant Eve, but hell yeah she is.
I think you mean me, but yeah I am.
Anyone know her name?
Digital signature (Authenticity)
Found this on textbook
Tally software please
why i need to learn this 😭
very welll
Why is it always Alex and Bob? :D
damn bob you player
I don't think you understand what Netflix and chill actually means...
Justin Timberlake wants to know what's in the box, too.
+Eric Torres (SizZle) :|
I LOVE BOOKS
Is the memory of my phone will lost? Please answer me
Sweet dance has it what should i do
They set me up
I get how it works, I don't understand how my whatsapp messages are encrypted...I've never gotten a key goddamit
I think I'm more confused after watching this
Ok... now tell me wtf is this???
That was funny 😂😂😂👏👏👏👏
the line on the video hurt my eyes
Everybody is so salty lol
I think it is a great way to explain "what is encryption and how does it work", the title doesn't say anything about "learn everything about cryptography in this 3 minutes long youtube video"
was this a practical joke? this explained nothing, why did it come up in my search?
a-z is a2b too?ai aye hanoi
I got lost on the keys
Visit thetechiehome.com for more blogs on cryptography
Umm... what?
Dharmesh Barot
iThis is not a go to info
WHAT?????
noice
more confusing explaination
👍👍
This is literally the worst clip I’ve ever watched
Hello. LOL
+Omar J yo!
hahahaha not funny didn't laugh jkjkjkjk
first!
pee pee poo poo
}:)
That lisp sound... Seriously dude. Can't watch past 25 seconds.
cheap