What is Encryption and How Does it Work? | Mashable Explains

Поделиться
HTML-код
  • Опубликовано: 23 дек 2024

Комментарии • 130

  • @coolmug85
    @coolmug85 9 лет назад +208

    This literally made my understanding of encryption worse...

    • @Burzcasts
      @Burzcasts 9 лет назад

      +Kevin Stovall Agree.

    • @sunilkumar-id5nm
      @sunilkumar-id5nm 7 лет назад

      Kevin Stovall it's actually a good example

    • @leochavez6833
      @leochavez6833 7 лет назад +3

      An encryption can be anything that you and another person can agree to. You can think of it as a password you give to someone without giving the password. A code that only you know how to crack using an agreed system. Hope that helps.

    • @ryanh1869
      @ryanh1869 7 лет назад +1

      He literally doesn't explain it all! Wtf is this lol. This explanation is horrible

    • @Cut3M3xicana1998
      @Cut3M3xicana1998 6 лет назад

      Thought I was the only one

  • @VincentJanNicer
    @VincentJanNicer 5 лет назад +8

    I somehow get how it worked now but I got lost on the keys.
    Can you clarify the analogy? Is the encryption analogous to putting the letter in the box?

  • @kodkid
    @kodkid 6 лет назад +9

    This actually cleared up some questions I was having. Now that I have the fundamental, I can build on that.

  • @jemsnic1916
    @jemsnic1916 5 лет назад +29

    bc of this i failed my exam thanks

  • @xdemon5015
    @xdemon5015 2 года назад +5

    Absolutely phenomenal explanation, short, to the point and the illustration made it so easy to understand

  • @bitchlasagna8232
    @bitchlasagna8232 6 лет назад +28

    this made me even more confused

  • @rickimoore7972
    @rickimoore7972 7 лет назад +108

    I would like a refund for the last 3min of my life.

  • @damacia111
    @damacia111 4 года назад +1

    Why does Eve even have Alice's public ket to begin with? If its private, should the key not only belong to the people who has access to it?

  • @rishabhbhatia932
    @rishabhbhatia932 3 года назад +4

    What an explanation. Made it so simple to understand! Great video :)

  • @brendanschmitz321
    @brendanschmitz321 8 лет назад +25

    This is overly scripted an lacks answers. I wish this video focused more on the educational part than desperately trying to entertain. This video tells us encryption by its definition but not how it works. I dislike this video. Sorry.

    • @kodkid
      @kodkid 6 лет назад +1

      This is a "how it works" video, not an explanation.

  • @j8ahmed
    @j8ahmed 3 года назад

    Unless I'm mistaken at 1:20 there is a mistake.
    Data encrypted with a public key can only be opened and read with a private key. - correct
    Data encrypted with a private key can... - STOP that's wrong
    It's a one way interaction. If you want to send something to another person with this type of encryption you need to have their public key so that they can open it with their private key.
    So encrypted communication between two people consists of each person having the other's unique public key and each person having their own unique private key. The public keys are for sending encrypted messages to specific people that own the matching private key.
    Let me know if I'm wrong. Hope this helps anyone.

    • @TopGook
      @TopGook 2 года назад +1

      well you're right you just heard the guy wrong bc he said exactly what you said lmao

  • @hvancann
    @hvancann 7 лет назад

    Isn't there is a small mistake at 1:27? My observation is:
    you can't "open" a private key encrypted message with a public key, you can only proof it has been 'signed' with a certain private key; that you relate to the public key somebody. But how do you know who actually signed? Imagine Eve gets hold of Alice's private keys... But anyways: the content remains hidden.
    an asymmetric public key can (with some effort) be generated from its private key anyway; however this NOT vice versa.

  • @nicklop9413
    @nicklop9413 6 лет назад +3

    I think this is pretty good but.... u should explain how do u make the translation from the input with the private key to the output and the public key, for example using XOR to translated the data but make a real life example with actual data. thx

  • @zulaikhamohammadi8018
    @zulaikhamohammadi8018 2 года назад

    wow, great explanation. You explain everything very clearly. Thanks a ton.

  • @AndrewMeyer
    @AndrewMeyer 9 лет назад +6

    This is a great explanation of how public key encryption works. I'll have to remember this one...

    • @ARMANDMICHAEL
      @ARMANDMICHAEL 9 лет назад

      +Andrew Meyer Thanks Andrew. Let us know if there's anything you'd like us to explain in the future!

    • @CharlesGauthier
      @CharlesGauthier 7 лет назад +1

      Public key vs. symmetric key
      Tools that support public key (emial etc.)
      How to make and share a public key
      Types and sizes of keys 128 vs 256 vs 512 vs Public 1024 vs public 4096
      What e-mail is encrypted, and where it may be "in-the-clear". Gmail to Gmail is encrypted by google "end to end" but still visible to Google. Same for Hotmail, but Gmail to Hotmail goes "in-the-clear" when it goes from the Google serve to the Microsoft server. May be hard to find (for a bad guy) but it is out there.

  • @arvindpurushotham2577
    @arvindpurushotham2577 4 года назад +1

    Thanks for the video. Pretty helpful !

  • @javathehut3593
    @javathehut3593 4 года назад

    Is there one private key used to decrypt multiple messages or is there a private key for every decryption

  • @MrFischvogel
    @MrFischvogel 3 года назад

    Thanks for the big abstraction!
    For all the haters who want more details: There are other longer videos available.
    For me this was very helpful to understand the general idea =)
    Thank you !

  • @aasthabhattarai6255
    @aasthabhattarai6255 8 лет назад +7

    easily explained thanks...😊😊😊

  • @malenlacostales7923
    @malenlacostales7923 2 года назад

    Thanks for your help ❤️❤️❤️

  • @RobinCeltic
    @RobinCeltic 7 лет назад

    I have a problem. Will say "Eve" has already stolen my code I changed my code and turned off the wifi NO longer using it. Eve is trying to get my new code using security cameras. Can eve get the code any other way? like data useage? Does she need my phone itself?

  • @eko762
    @eko762 4 года назад

    What does the" key " represent?

  • @gordongrier2172
    @gordongrier2172 6 лет назад +1

    thanks a lot studying for my A+ cert

  • @samirimtiaz7537
    @samirimtiaz7537 4 года назад

    Nice explanation. appreciatable

  • @drakeb9093
    @drakeb9093 9 лет назад +2

    Nice video and metaphor but RSA encryption is not "double" encryption, authentication is checked by encryption a "signature" with the private key

    • @AndrewMeyer
      @AndrewMeyer 9 лет назад +3

      +Drake B Eh, close enough. For RSA at least, the signature is just a hash of the message encrypted with the sender's private key. Having to explain all that though would just complicate the analogy, and doesn't really add any important information for the average person.

  • @brayan9645
    @brayan9645 7 лет назад +3

    Oh my, I'm more confused than the granny next door.

  • @rajib01710
    @rajib01710 8 лет назад

    it is very helpful to me . thax for video.

  • @nika-bm8pb
    @nika-bm8pb 6 лет назад +1

    Best explanation. Thank you

  • @markissmall2393
    @markissmall2393 3 года назад +1

    why did eve do that?

  • @-30h-work-week
    @-30h-work-week Год назад

    So... how does it actually work? I found this explanation everywhere, but no one says how it works.

  • @josephpriester8468
    @josephpriester8468 8 лет назад

    Basic question here.
    how does the person receiving an encrypted message know the password to Access the Data/email/etc..

    • @CharlesGauthier
      @CharlesGauthier 7 лет назад

      Well if it is Public Key as described, then you had to make you own Public/private pair. You will get the e-mail and it will probably say see attached, encrypted with your public key.
      If it is Symmetric key (you both use the same key to encrypt and de-crypt) then you will have already shared the key so you will know what to do when you get a message from Bob...

  • @jRex918
    @jRex918 6 лет назад

    soooo ummmm whats a key? I still don't get it. its like a password, right?

  • @ROKIBULHASANTANZIM
    @ROKIBULHASANTANZIM 9 лет назад

    Interesting Presentation.. Looking forward for more

    • @ARMANDMICHAEL
      @ARMANDMICHAEL 9 лет назад

      +Rokibul Hasan Tanzim Thanks! Anything you'd like us to explain next?

  • @cwilson6382
    @cwilson6382 6 лет назад

    Good explanation

  • @Adi-qw4qv
    @Adi-qw4qv 5 лет назад +6

    I lost all my files when i accidentaly encrypted my sd card

    • @brianwilliams8455
      @brianwilliams8455 5 лет назад

      How do you accidentally encrypt something?

    • @belogical2396
      @belogical2396 5 лет назад

      Brian W when you try something you dont know about checking random operations

  • @h.rehaief3567
    @h.rehaief3567 6 лет назад

    great job !!

  • @CyberusTechnologies
    @CyberusTechnologies 8 лет назад

    very well explanation!
    Is it possible for me to download your video and dub in my language?

  • @FireflySA
    @FireflySA 3 года назад

    I'm So excited and don't know why😁😁😁Thanks

  • @alexandragon27
    @alexandragon27 5 лет назад

    thanks very muchhh

  • @Mxyzpitt
    @Mxyzpitt 4 года назад

    You lost me at "data from a public key can only be opened using a private key..." This sounds like the key concept (pardon the pun). My brain screamed "so why can't the public key open the data encrypted with the public key?" and promptly shut down.

  • @GregoryMcCarthy123
    @GregoryMcCarthy123 8 лет назад

    The first example of shifting the letters is just obfuscation and not encryption.

    • @confidential303
      @confidential303 7 лет назад

      i am not an expert on cryptography but that is encrypting a message

  • @flicker12345678
    @flicker12345678 8 лет назад +2

    Nicely Explained keep it up

  • @gabrielcua2428
    @gabrielcua2428 4 года назад

    Anyone know who Eve is?

  • @Shaffiullahkhan
    @Shaffiullahkhan 9 лет назад

    very well explained :)

  • @zillboy
    @zillboy 4 года назад

    Netflix and Chill? Yep ;)

  • @willyguevara8244
    @willyguevara8244 2 года назад

    So Elon musk buying twitter mean we’re all doomed

  • @ravikiranbasuthkar2818
    @ravikiranbasuthkar2818 7 лет назад

    thanks a lot dude...!

  • @johnbritolima
    @johnbritolima 7 лет назад

    That helped. tnx.

  • @blackpanther2968
    @blackpanther2968 5 лет назад

    HI EVERYBODY I AM FROM MALAYSIA , SEREMBAN , IN A METHODIST SCHOOL ,MY NAME IS MG

  • @47shashank47
    @47shashank47 6 лет назад

    Nice Video

  • @longan12
    @longan12 6 лет назад

    Mmm... Actually, you can learn how to encrypt your Wireless Network here: www.router-reset.com/how-encrypt-your-wireless-network/

  • @GorgeousGuy11
    @GorgeousGuy11 8 лет назад

    Hey nice video dude thanks 😎😏 could you make a video how a cryptanalysts decrypts AES 256 and cryptography please and thanks

  • @FGOKURULES
    @FGOKURULES 8 лет назад +6

    Alice is Thick AF

    • @KapnKerfuffle
      @KapnKerfuffle 7 лет назад +1

      I think you meant Eve, but hell yeah she is.

    • @srikarbala246
      @srikarbala246 5 лет назад

      I think you mean me, but yeah I am.

    • @gabrielcua2428
      @gabrielcua2428 4 года назад +1

      Anyone know her name?

  • @adilm9857
    @adilm9857 2 года назад

    Digital signature (Authenticity)

  • @3L4.
    @3L4. Год назад

    Found this on textbook

  • @soumyiajain3410
    @soumyiajain3410 4 года назад

    Tally software please

  • @dahhliaaaa
    @dahhliaaaa 3 года назад

    why i need to learn this 😭

  • @musichub7501
    @musichub7501 4 года назад

    very welll

  • @Akmkm5689
    @Akmkm5689 5 лет назад

    Why is it always Alex and Bob? :D

  • @markissmall2393
    @markissmall2393 3 года назад +1

    damn bob you player

  • @joebarton3234
    @joebarton3234 5 лет назад

    I don't think you understand what Netflix and chill actually means...

  • @EricTorres713
    @EricTorres713 9 лет назад

    Justin Timberlake wants to know what's in the box, too.

  • @blackpanther2968
    @blackpanther2968 5 лет назад

    I LOVE BOOKS

  • @fdagalea
    @fdagalea 7 лет назад

    Is the memory of my phone will lost? Please answer me

  • @BeaxyCodm
    @BeaxyCodm 3 года назад

    Sweet dance has it what should i do

  • @EricaLane-u7g
    @EricaLane-u7g 6 месяцев назад

    They set me up

  • @merc7paul
    @merc7paul 7 лет назад

    I get how it works, I don't understand how my whatsapp messages are encrypted...I've never gotten a key goddamit

  • @brettbjornson
    @brettbjornson 3 года назад

    I think I'm more confused after watching this

  • @mrpeskid7301
    @mrpeskid7301 4 года назад +1

    Ok... now tell me wtf is this???

  • @michaelphilps
    @michaelphilps 7 лет назад

    That was funny 😂😂😂👏👏👏👏

  • @beverlysantarelli650
    @beverlysantarelli650 3 года назад

    the line on the video hurt my eyes

  • @GoronTico
    @GoronTico 5 лет назад

    Everybody is so salty lol
    I think it is a great way to explain "what is encryption and how does it work", the title doesn't say anything about "learn everything about cryptography in this 3 minutes long youtube video"

  • @brianhalsey1869
    @brianhalsey1869 6 лет назад

    was this a practical joke? this explained nothing, why did it come up in my search?

  • @stevebez2767
    @stevebez2767 6 лет назад

    a-z is a2b too?ai aye hanoi

  • @solomonngwenya9091
    @solomonngwenya9091 4 года назад

    I got lost on the keys

  • @sionaiasacademy7482
    @sionaiasacademy7482 5 лет назад

    Visit thetechiehome.com for more blogs on cryptography

  • @DraconicAux
    @DraconicAux 4 года назад

    Umm... what?

  • @dharmeshbarotbarot9358
    @dharmeshbarotbarot9358 6 лет назад

    Dharmesh Barot

  • @kevintv3573
    @kevintv3573 2 года назад

    iThis is not a go to info

  • @debbiekaras2841
    @debbiekaras2841 Месяц назад

    WHAT?????

  • @zeinmir7732
    @zeinmir7732 4 года назад +1

    noice

  • @Soni-Santosh
    @Soni-Santosh 5 лет назад

    more confusing explaination

  • @arvindersingh1376
    @arvindersingh1376 5 лет назад

    👍👍

  • @matthewwitkiewicz376
    @matthewwitkiewicz376 3 года назад +2

    This is literally the worst clip I’ve ever watched

  • @omarj8542
    @omarj8542 9 лет назад

    Hello. LOL

  • @valtterihuuskonen4207
    @valtterihuuskonen4207 9 лет назад

    first!

  • @profipix
    @profipix 8 лет назад

    That lisp sound... Seriously dude. Can't watch past 25 seconds.

  • @omkar2735
    @omkar2735 4 года назад

    cheap