Understanding Encryption! | ICT #9

Поділитися
Вставка
  • Опубліковано 22 гру 2024

КОМЕНТАРІ •

  • @SabinCivil
    @SabinCivil  5 років тому +33

    We truly appreciate your support at www.patreon.com/LearnEngineering . Even a $1 support can give us a big boost.

    • @christophermarcelo2215
      @christophermarcelo2215 3 роки тому +2

      i guess im asking randomly but does anyone know of a method to get back into an Instagram account?
      I was dumb lost my password. I appreciate any tricks you can offer me.

    • @braxtonjakob9834
      @braxtonjakob9834 3 роки тому

      @Christopher Marcelo Instablaster ;)

    • @christophermarcelo2215
      @christophermarcelo2215 3 роки тому +1

      @Braxton Jakob Thanks for your reply. I found the site thru google and Im waiting for the hacking stuff now.
      Seems to take quite some time so I will reply here later when my account password hopefully is recovered.

    • @christophermarcelo2215
      @christophermarcelo2215 3 роки тому +1

      @Braxton Jakob it did the trick and I now got access to my account again. I am so happy!
      Thanks so much you saved my account!

    • @braxtonjakob9834
      @braxtonjakob9834 3 роки тому +1

      @Christopher Marcelo you are welcome :)

  • @Alessandro-nq3tm
    @Alessandro-nq3tm 5 років тому +287

    I'm a software engineer and I can say that this really complicated concept is really well explained. Good job Learn engineer!

    • @SabinCivil
      @SabinCivil  5 років тому +36

      I am glad to know that a computer engineering finds our video helpful :)

  • @nihaspa6250
    @nihaspa6250 5 років тому +66

    The complicated concept of encryption explained in the most simplified manner.Brilliant work !
    Thanks learn engineering and thankyou Sabin..

  • @TheVikrant997
    @TheVikrant997 2 роки тому +3

    What a marvellous explanation guy's. I have been struggling to understand this concept since last 10years. This explanation is a gem.

  • @m.i-ansari
    @m.i-ansari 5 років тому +12

    I really want to appreciate admin or learn engineering team for easy explanations with good example...
    To learn this encrypt method my lecture took 3 classes...

  • @praphulsamavedam4588
    @praphulsamavedam4588 5 років тому +1

    Very simple explanation , thanks Learn Engineering. I had read about this twice and got confusion about private key and session key, this is more insightful.

  • @haanpham4667
    @haanpham4667 5 років тому +4

    encryption ( and those keys and signature) is very hard to understand at first and confusing after that if you don't have to work with it daily. As a normal software developer who study these things since 2005 but have been struggling to forget how they work. This video would help new comers alot and even "pro" like me

  • @Chaosdude341
    @Chaosdude341 5 років тому +3

    Thank you for these little videos. They really add up in engineering knowledge and principles!

  • @sriharsha7709
    @sriharsha7709 4 роки тому +2

    Man this video give clear insight about encryption, for more depth you have to go through wire shark/ packet tracer- where you can actually see private/public key certificates being exchanged in real-time

  • @insafo
    @insafo 5 років тому +9

    Very knowledgeable video. Thanks to Learn Engineering.
    Everyone Like and share the video.

  • @rakeshgoswami1784
    @rakeshgoswami1784 5 років тому +26

    Sir, We need more networking related videos in animation.
    Aise videos se hard topic bhi Asani se clear ho jate hai.
    🤗🤗🤗🤗🤗🤗🤗🤗🤗🤗

  • @DS-ow2ge
    @DS-ow2ge 5 років тому +6

    Love this! Explain 5G / millimeter wave and massive MIMO!

  • @sagarkapasi099
    @sagarkapasi099 5 років тому +37

    Thanks That Was Difficult

  • @alessandrogreggio7724
    @alessandrogreggio7724 2 роки тому +3

    Great video. The only thing I don't get is at 5:30 how (26)^7 mod 33=104. This is impossible since 104 is greater than 33 and the mod operation only gives the remainder of any number when divided by 33. Shouldn't that be 5? How does one arrive at 104 by decryption? Appreciated

  • @Official_JosephYT
    @Official_JosephYT Рік тому

    Im a young Electronics Expert I'm Finding A Best Way Of Encryption So I Can Understand It Well Thank's To Technology :)

  • @qingyangzhang887
    @qingyangzhang887 5 років тому +5

    In session key symmetric encryption, how are sessions keys transferred safely? What encryption mechanisms are used to make sure the session key is not stolen?

  • @simplemechanics8729
    @simplemechanics8729 5 років тому

    Two videos in one day. Your channel is the best

  • @سالم-ض7ف
    @سالم-ض7ف 5 років тому +1

    We need translation because your programs are very fun and very useful. I went to Google and translated my words to hear him you channel owner. Your channel is very useful and I love it a lot ... and I hope you translate it for us always we suffer a lot of translation. Even if we translate it does not lead to the right information you want. I repeat my thanks to you, our able teacher

    • @Gonza-lh2vo
      @Gonza-lh2vo 5 років тому +1

      You can enable UA-cam's auto-generated subtitles, but they are not perfect.

    • @سالم-ض7ف
      @سالم-ض7ف 5 років тому

      @@Gonza-lh2vo
      do not know how ... Overall thank you very much

  • @abdulrawoof9839
    @abdulrawoof9839 4 роки тому +3

    😃Excellent channel with Excellent explanation 😃

  • @mcbotface
    @mcbotface 4 роки тому +1

    I couldn't understand this concept any better than after watching this video.

  • @intron9
    @intron9 5 років тому +24

    Good video, however , it presented whatsapp as an encrypted communications app, and it's not a good idea to present it as such. Because they don't encrypt your chats if you upload them to G.drive , and also, photos or videos are never encrypted, Neither on normal chatting nor when backuping . That's why it says "messages" are encrypted (referring to only text msgs.) instead of showing "this chat or conversation is encrypted". I understand the backup part is optional, but the photo&video thing is a dangerous one, and they kinda of mislead the users. It's just good to know what they avoid telling.

  • @iamexplorer6052
    @iamexplorer6052 5 років тому +1

    clear understanding with super simple visualization very good

  • @russellcannon9194
    @russellcannon9194 4 роки тому

    This is a good introduction to encryption used for web communications. Cheers, Russ

  • @getartsywithyogita8291
    @getartsywithyogita8291 4 роки тому +2

    So well explained!

  • @JenKwok91
    @JenKwok91 5 років тому

    Clear explanation of public key, private key, KDC, Symmetric, Asymmetric

  • @qaswedfrewq717
    @qaswedfrewq717 3 роки тому +1

    I have few questions:
    1. What keeps someone from creating a list of factors for prime numbers and by that way making it quicker to figure out later?
    2. How is the first private key tranfered without giving anybody a change to steal it?

    • @rgk1579
      @rgk1579 3 роки тому +1

      keeping a list of prime numbers will accelerate our brute force work and thats fine .
      Anyone has some answer about 2nd question ?

  • @iezioaudi22
    @iezioaudi22 7 місяців тому

    What a brilliant video!!

  • @DhanunjaiBandlamudi
    @DhanunjaiBandlamudi Рік тому

    Thank you for making it so simple to understand!

  • @tunekx
    @tunekx 4 роки тому

    Your channel always have something to learn

  • @s888r
    @s888r 2 роки тому

    3:16 That's counter intuitive! How can a key that can close a lock not open it, while another one exactly similar to it can?

  • @legilawrence162
    @legilawrence162 5 років тому +2

    Great. Really great....presentation...

    • @ObamaSexGaming2007
      @ObamaSexGaming2007 5 років тому

      Click here for india punjabi sex movie HD 2016 FREE DOWNLOAD 👏👏 भारत पंजाबी सेक्स मूवी मुफ्त डाउनलोड

  • @TheVitalOne
    @TheVitalOne 3 роки тому +1

    What keeps someone from creating a list of factors for large prime numbers, thus making it quicker to figure out later?

  • @csjames69
    @csjames69 5 років тому +10

    What if a government can get the encryption key?

  • @godhaniyagnik7642
    @godhaniyagnik7642 5 років тому +2

    Thanks a lot and best explanation

  • @hvyoviayguaritadiuno3237
    @hvyoviayguaritadiuno3237 4 роки тому

    Your videos are the best

  • @boatengjeff
    @boatengjeff 4 місяці тому

    we really can't assume that the KDC doesn't decrypt our data while on transit but i feel great to have learned a lot in this explanation.

  • @mercelliaa
    @mercelliaa 5 років тому +1

    I am from Bihar India
    And watch to luv your videos I am not engineer or college student .

  • @rishabhsharma540
    @rishabhsharma540 5 років тому +1

    Please make a video about formula1 cars.Your videos on automobile engineering were amazing

  • @SA-ov6mb
    @SA-ov6mb 4 роки тому

    Awesome explanation👌👌👌

  • @varsharanisharma5717
    @varsharanisharma5717 5 років тому +1

    Excellent Explanation😊👍👍

  • @mohamedeljabri4970
    @mohamedeljabri4970 5 років тому

    What a wonderful explanation

  • @blaaze7611
    @blaaze7611 5 років тому

    I'm a 8th grade student was always thinking why we need to find factors in linear equations well now I got why it is a very imp thing

  • @saikiran-cy1vl
    @saikiran-cy1vl 5 років тому +3

    Bro, can u tell me what is graphics tool used by you

  • @ByteDesk
    @ByteDesk 4 роки тому

    Sir your videos are always awesome

  • @danbromberg
    @danbromberg 2 роки тому

    At 4:06 you show 33 and 3; was that second 3 a typo and supposed to have been -33?

  • @labscience8271
    @labscience8271 5 років тому

    *Wow!* 2 videos a day!
    You're really a hard worker

  • @EstanciaTimesDocumentary
    @EstanciaTimesDocumentary 5 років тому

    Thank for the clear and simple ideas you shared. the best one

  • @kiran-be2tz
    @kiran-be2tz 4 роки тому

    8:14 this confidential message is
    "Hi"

  • @akshatsharma264
    @akshatsharma264 3 роки тому

    Amazing video!!

  • @aminasworld8524
    @aminasworld8524 5 років тому

    الله يعطيك الصحة 🌹👍🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺

  • @fansolit
    @fansolit 5 років тому +1

    New find the channel of creatin' great contents 👌

  • @davidsi5376
    @davidsi5376 5 років тому +11

    The motercycle delivery guy has a very big head! It might be from storing all the data keys like the NSA.

    • @alephii
      @alephii 5 років тому +3

      I would store the keys in my ass

    • @An.Individual
      @An.Individual 5 років тому +3

      we could store the keys in the bra used by the huge breasted woman that is normally in the videos on this channel

    • @johnbenson4927
      @johnbenson4927 5 років тому

      @@An.Individual I wonder what happened to that sexy redhead girl, she doesn´t appear anymore

  • @crewrangergaming9582
    @crewrangergaming9582 5 років тому +2

    That delivery guy be like "yo, wtf, I do not have the whole day"

  • @DJ1973DZ
    @DJ1973DZ 5 років тому +1

    Great information 👍 thanks.
    Can you please explain how the emails works?

  • @ektabindal2748
    @ektabindal2748 2 роки тому

    You secured the so much time of someone's to found all that things.

  • @sahal922
    @sahal922 4 роки тому +1

    please make a video about how volte works

  • @DharambirPoddar
    @DharambirPoddar 5 років тому +2

    sir from long time you havent made a video for mechanical engineering related,, so please make some,,,by the way this video is awesome

  • @m5s10
    @m5s10 5 років тому +1

    Great explanations! I really enjoyed remembering all this stuff I did in college. However, I'm kind of disappointed that you didn't say that messages can be both signed and encrypted. I guess that would be a bit too much for someone who's not in the matter. Anyway, great video, thanks for making it. Cheers.

  • @funz389
    @funz389 5 років тому +1

    Pls make video on Electric Vehicles Manufacturing

  • @ken_tafari
    @ken_tafari 4 роки тому

    Good job guys!!!!!!!

  • @diegolozano2397
    @diegolozano2397 5 років тому

    Awesome video, i learnd a lot. Hugs from colombia

  • @junaidahmed9617
    @junaidahmed9617 5 років тому +1

    Yeah . Thank you for sharing knowledge of encryption and decryption. Can any one explain me in detail about symmetric encryption with advanced encryption standard?

  • @pranoypaul4020
    @pranoypaul4020 5 років тому +3

    Its very helpfull

  • @kurubamounika6689
    @kurubamounika6689 Рік тому

    Hello good morning sir.ur video is very clear and it helped me a lot.currently iam working on a project dna cryptography so in that ism facing small problem how can i connect mealy machine to the cryptography..can u help me in this sir?

  • @Jarrod_C
    @Jarrod_C 5 років тому

    You said the access point provider cannot see what we are looking at but then you said they can see that we have accessed a website? I am confused.

  • @RajendraSingh-py8pm
    @RajendraSingh-py8pm 4 роки тому

    In senior secondary school this video helpful for me to understanding the modern physics with computer science

  • @gabrielphilips6980
    @gabrielphilips6980 2 роки тому

    But if the key is sent as the first message and someone intercepts it, then he can view all of the following messages. How is this prevented?

  • @ares1399
    @ares1399 5 років тому +1

    Please make a video on how a combustion chamber works in rockets? 🙏🙏

  • @MJazStudio
    @MJazStudio 5 років тому +1

    Are you using blender for these animations. I just saw in that laptop in the animation 😊

    • @SabinCivil
      @SabinCivil  5 років тому +3

      Yah, got it right :) We are using Blender

  • @tanmaysinghal8370
    @tanmaysinghal8370 4 роки тому

    But public keys cant open the lock. They could only be used to lock. then how did it open at the end of video

  • @gksagar8055
    @gksagar8055 5 років тому

    hi sir. Your teaching technique is very good .. please make video's on networking.ccna

  • @flankerskioneniner4290
    @flankerskioneniner4290 4 роки тому

    Wow... thanks 👍

  • @kawserbegum1198
    @kawserbegum1198 5 років тому

    I watch many video of your channel. I really empress your voice. Please tell which software are use for voice. Thanks.

  • @createyou7827
    @createyou7827 3 роки тому

    My favourite ❤️ animation

  • @AyeshDumindu
    @AyeshDumindu 5 років тому

    Thank You 😊

  • @dileebanthilakaraja8702
    @dileebanthilakaraja8702 5 років тому

    This was great . !
    We need a video about SSO - Single Sign on

  • @tlotlisomoletsane3598
    @tlotlisomoletsane3598 5 років тому

    Amazing explanation

  • @bhartisingh7376
    @bhartisingh7376 5 років тому +1

    please making video internet protocols and circuit switching and packet switching

  • @magicmystery4211
    @magicmystery4211 5 років тому

    Guys how to create animation like this ? Which software to use?

  • @ScienceSeekho
    @ScienceSeekho 5 років тому

    Can someone please tell me how this animations are done on this channel? Which software?
    More precisely the mechanical one the gear and car ones....

  • @devtalk9967
    @devtalk9967 5 років тому

    hey do this channel have any video on cloud computing infrastructure

  • @andyohil7465
    @andyohil7465 5 років тому

    Very good explanation.... 😎👍. Could you give me a hint which software do you use for these animations?

  • @shis10
    @shis10 5 років тому

    Awesome video

  • @sciencetech9922
    @sciencetech9922 5 років тому +1

    👌👌👌Sir,pls make videos about Electronics and commutation engineering topics

  • @anurag808
    @anurag808 5 років тому

    Which software is used to make such videos?

  • @haninemourad7971
    @haninemourad7971 24 дні тому

    📡 SMART SATILEET GESTION A DISTANCE
    IF A PALLET IN EMPLACEMENT IN P7
    YOU HAVE THE POSIBILITY TO GETTING TPE BY ANY MOUVEMENT IS TFS SUPPORT TO ANOTHER SUPPORT INFORMATIQUEMENT AND AFTER CONFIRMED THE PROCESS IN PHYSICAL CONDITION

  • @nfscsk
    @nfscsk 5 років тому +1

    and who is the key maker???. can he be easily hacked???

    • @chaintuts
      @chaintuts 5 років тому

      Hi Orton - In real digital encryption, the user creates their own public/private key pair and shares the public key with whomever they want to receive encrypted messages from. In order to "hack" them, you would have to compromise the device they are storing their private key on.

  • @evergreengaming2.053
    @evergreengaming2.053 2 роки тому

    I was watching this and those numbers just broke my brain

  • @beastbala7818
    @beastbala7818 5 років тому

    Dude how regulating governors are function in the automobile plz put the video for that......

  • @intelligentcam
    @intelligentcam 4 роки тому

    👏👏👏

  • @sal_strazzullo
    @sal_strazzullo 5 років тому +1

    1:15 I would add however that the person who installed the router could produce a Man in the Middle attack by making the router/DNS route the request to a fake copy of it, and make you think that you are connected to the real one while in reality you are not.
    Using HTTPS websites prevents this thanks to digital signature.

  • @ammarhussain8694
    @ammarhussain8694 5 років тому

    Please make a video on IC in detail

  • @muryarhausa24onlinemedia23
    @muryarhausa24onlinemedia23 5 років тому +5

    PLEASE HOW DOES DATA WORK PLEASE...?
    I WANT TO KNOW , MANY PEOPLES WANT TO KNWO HOW DOES DATA WORK?🙏🙏🙏 PLEASE EXPLAIN..IT

    • @sal_strazzullo
      @sal_strazzullo 5 років тому

      What do you mean exactly

    • @muryarhausa24onlinemedia23
      @muryarhausa24onlinemedia23 5 років тому

      @@sal_strazzullo How does Data Work ( Mb)

    • @Nikkk6969
      @Nikkk6969 5 років тому

      Muryar Hausa24 Online Media mb is a measure of storage. 100mb is 1 gb

    • @muryarhausa24onlinemedia23
      @muryarhausa24onlinemedia23 5 років тому

      @@Nikkk6969 This is not what i mean..
      How the DATA (MB) working on our Mobile Phone/Computer?

  • @Sunilrautdailyvlog
    @Sunilrautdailyvlog 5 років тому +4

    need computer network series

  • @eloimeyer9378
    @eloimeyer9378 5 років тому

    I like your new graphics

  • @undesministresdimhotepdont26
    @undesministresdimhotepdont26 4 роки тому

    But what if, as the thief, when Nina ask for Alex private key, I make her think I'm the KDC and send my public key to her?

  • @loganjack7395
    @loganjack7395 5 років тому +8

    No one
    literally no one
    .
    .
    .
    That man on scooter : Aa shit here we go again

    • @phizaics
      @phizaics 5 років тому +1

      Would have upvoted your comment if you hadn't written that cringey "literally no one" line.

    • @JulioLopez-xz5kx
      @JulioLopez-xz5kx 5 років тому +1

      These jokes are played out dude.

  • @khurin3938
    @khurin3938 Рік тому

    Hello,
    how can i made an animation like your excellent video!!!

  • @boybhatt1345
    @boybhatt1345 5 років тому

    If anybody know which editing app this is plss tell me??

  • @martonbalogh6021
    @martonbalogh6021 3 роки тому

    I maked a program, that can divide a number to prime numbers (it is a very simple program) but it is very slow at high numbers.