I have to say, I watched some of your videos on WCF during my last quarter and they were super helpful. I'm glad you've made videos on this topic as well, because now I have a cripto class to prepare for! Thank you!
Appreciate the detailed breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). How should I go about transferring them to Binance?
How about adding a link to the next video in the comments? Otherwise, I can't find it. It should also be explained that public and private keys are generated together and they are mathematically related to one another. A public can't be used to derive the private key and vice versa. Without telling the view that, the viewer will never quite understand how the keys can work and be secure.
That is why I was left puzzled. I still do not understand how I obtain that private key? And how do I use it in real life as a general user? I do not get it.
Very smooth explaination. I was confused before I watched the video, but then all became clear. Just a question came to my mind while reading the comment. Do my friend and I have to have the same tool of encryption or everyone can have his own tool. Thank you,
Hi. If you say, the answer to the question, whether governments should be able to check communication is always "no", then this would be the end of criminal investigation, which I think is not what you really want, right? With respect to terror, Putin, China, white-collar-crime, interner-fraud, child pornography etc. public authorities MUST not be excluded from any communication media.
Wonderful video! I am still a bit confused about how using a public/private key solves the problem of having your key stolen in transfer? Even if I share my public key to the entire world, when I send an email to someone, they have to have the right private key to open it. Don't I have to give them the private key ahead of time? Also, what is the point of even knowing the sender's public key and putting it globally for decrypting a message? The only thing that should matter is the private key, right?
Each person has his/her own private key. You never share the private key. The encryption has to include the recipient's username when encrypting the document. Here is a demo of how to use GPG ua-cam.com/video/FLZLVqceAeA/v-deo.html
when I lock the message with privkey and send to world -> it proofs the message comes from me when they can unlock the message with my pubkey. when someone want to send me secret message they lock the message with my pubkey and send to me -> only I can open it with my privkey.
You need to think differently. You are thinking "backwards". If you want to send someone else an encrypted email for them to open, THEY need to send you their public key. They need to take the initiative and create a private/public key and send you the public.
@@robertiglehart No, I understood the Alyeska's question totally. It is not because we think backwards. Probably it was not explained thoroughly. So my emails are not encrypted at all? And if I want to send an encrypted message, the recipient must generate some keys? So the recipient has to have some special software? Sorry, I am asking as an amateur, who does not get the point.
Because the Public and Private key are generated in pair. Only that Private key will work that was associated with the public key you used to encrypt the msg.
i don't get it like u can encrypt with the public key but how he decrypts with his private key if i did encryption? when i havn't sent any password? how i allow my friends privet keys to decrypt it?
Very good description! I understand it like this: My friend, that wants to send me an encrypted message, creates the message which is the reason it doesn't need to be encrypted, yet. Then he wants to send it to me over the internet, which would require encryption for it to be private. I create public and private keys and provide him with the public key, so he can encrypt it and i can decrypt it with the private key. Is this correct? If so, i have a follow-up question: For me an my friend to be able to send encrypted messages to each other, we would both need a set of public and private keys, right?
You make wonderful videos! 👏 Need some advice: 🙏 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). What is this? 🤔
Well, where I really don't agree with the government keeping a third-eye on our data, I do see a point where it is required to surveillance terrorism activities, given, government don't turn to use data for their own purpose without an agreement.
Ok what i'm still tripping on (Using Alice and Bob in my example) - I get that Bob's public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i'm fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom - again he uses his public key to encrypt. Tom uses his private to decrypt - how is Tom's key linked? I'm missing something super basic here. Any help appreciated
When I send a message to someone I encrypt it with their key (public) so they can unlock it with their private key and it is secure because although it is public it can only ever lock/encrypt not unlock/decrypt.
Thanks Respected Prof. I could not find its next video. Can you point me to it and its playlist? At the end you were decrypting the message, i want to see what happened next.
why cannot you just to the point? the first several minutes are wasting time. but when talk about public key part, you jus skip and directly to example!
Explaining main objective of how receiving party decrypt and Read the message is not explained pictographically.... how recipient gets Private key to decrypt ..? If recipient generates his own Private key to unlock using public key he received.... why anyone else cant do the same .. ? The way you used to explain the problems of Symmetric Encryption.. same approach should have been used to explain how recipient decrypt and explain without using program so anyone can understand .. failed video..
Somewhere else I understand this which makes logical ... The Recipient of the message first generates Mathematically related Public-Private keys. Recipient keeps private key himself and publishes only Public key and tell all senders to use public key to encrypt message sends to him. So sender use this to Encrypt and send message and since Recipient already have Private key and uses it to Decrypt. This way no one else except the recipient can Decrypt message once it is encrypted .. even sender cants decrypt .... Hope this makes logical ...
I have to say, I watched some of your videos on WCF during my last quarter and they were super helpful. I'm glad you've made videos on this topic as well, because now I have a cripto class to prepare for! Thank you!
Very simple and elegant explanation. Love it.
Thank you!
Appreciate the detailed breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). How should I go about transferring them to Binance?
I randomly found this video while working on my essay for Communications in Grand Canyon University!
How about adding a link to the next video in the comments? Otherwise, I can't find it. It should also be explained that public and private keys are generated together and they are mathematically related to one another. A public can't be used to derive the private key and vice versa. Without telling the view that, the viewer will never quite understand how the keys can work and be secure.
That is why I was left puzzled. I still do not understand how I obtain that private key? And how do I use it in real life as a general user? I do not get it.
Very smooth explaination. I was confused before I watched the video, but then all became clear. Just a question came to my mind while reading the comment.
Do my friend and I have to have the same tool of encryption or everyone can have his own tool.
Thank you,
Hi. If you say, the answer to the question, whether governments should be able to check communication is always "no", then this would be the end of criminal investigation, which I think is not what you really want, right? With respect to terror, Putin, China, white-collar-crime, interner-fraud, child pornography etc. public authorities MUST not be excluded from any communication media.
Wonderful video! I am still a bit confused about how using a public/private key solves the problem of having your key stolen in transfer?
Even if I share my public key to the entire world, when I send an email to someone, they have to have the right private key to open it. Don't I have to give them the private key ahead of time?
Also, what is the point of even knowing the sender's public key and putting it globally for decrypting a message? The only thing that should matter is the private key, right?
Each person has his/her own private key. You never share the private key. The encryption has to include the recipient's username when encrypting the document. Here is a demo of how to use GPG ua-cam.com/video/FLZLVqceAeA/v-deo.html
when I lock the message with privkey and send to world -> it proofs the message comes from me when they can unlock the message with my pubkey.
when someone want to send me secret message they lock the message with my pubkey and send to me -> only I can open it with my privkey.
You need to think differently. You are thinking "backwards". If you want to send someone else an encrypted email for them to open, THEY need to send you their public key. They need to take the initiative and create a private/public key and send you the public.
@@robertiglehart No, I understood the Alyeska's question totally. It is not because we think backwards. Probably it was not explained thoroughly. So my emails are not encrypted at all? And if I want to send an encrypted message, the recipient must generate some keys? So the recipient has to have some special software? Sorry, I am asking as an amateur, who does not get the point.
I would like to know is there a way to know if a public keys private key is odd or random
Great video.
Question: How does the public key know which private key will work? Since it never knows the private key.
I wanna know the same thing. I can't grasp that part.
@@chadsexinton my guess it has to do with zero knowledge proof but I haven't seen it tied directly to this :(
Because the Public and Private key are generated in pair. Only that Private key will work that was associated with the public key you used to encrypt the msg.
@@Rituraj.. So the public key is not really a key, rather it is the lock or tumbler pin set, to continue the analogy?
@@dpky7333 yes, you can say that. It is used in encryption.
i don't get it like u can encrypt with the public key but how he decrypts with his private key if i did encryption? when i havn't sent any password? how i allow my friends privet keys to decrypt it?
Thank you so much, sir. It helped me out.
Glad it helped. Let me guess. You are studying in a computer science program.
@@shadsluiter no sir, I am enrolled in a BBA program :'3
0:45 image is misleading. open and lock goes both ways.
Great video Shad. Well done
This is crazy helpful. thanks a lot!!
Very good description! I understand it like this: My friend, that wants to send me an encrypted message, creates the message which is the reason it doesn't need to be encrypted, yet. Then he wants to send it to me over the internet, which would require encryption for it to be private. I create public and private keys and provide him with the public key, so he can encrypt it and i can decrypt it with the private key. Is this correct? If so, i have a follow-up question: For me an my friend to be able to send encrypted messages to each other, we would both need a set of public and private keys, right?
Yes right.
Thank you prof
You make wonderful videos! 👏 Need some advice: 🙏 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). What is this? 🤔
Wow thxxxxx !!!! Really good explanation
Great video!
Thanks for the visit
Nice Explanation. Thanks
*Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software.
really nice
well explained i
Good sir
Ok what about the privat key how they havit i need explanation for private key
Thank you! This was great!
Very clear thank you
What the hell is wrong with the comment section???
Thx for the video btw)
Well, where I really don't agree with the government keeping a third-eye on our data, I do see a point where it is required to surveillance terrorism activities, given, government don't turn to use data for their own purpose without an agreement.
Ok what i'm still tripping on (Using Alice and Bob in my example) - I get that Bob's public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i'm fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom - again he uses his public key to encrypt. Tom uses his private to decrypt - how is Tom's key linked? I'm missing something super basic here. Any help appreciated
Contact Hackcell_r on Instagram
I guarantee his services
@@johsonfredrick7226 tried but can’t find him on IG. Can u confirm spelling please. Or a direct link? Thsnks
@@DeputyDawgAtl OK, Try this message him on his mailing account. At *Rexspeedhacks@gmail.* Com His Instagram ID is correct *Hackcell_r*
Bob doesn’t use his public key to encrypt he uses Alice’s if I understand correctly
When I send a message to someone I encrypt it with their key (public) so they can unlock it with their private key and it is secure because although it is public it can only ever lock/encrypt not unlock/decrypt.
Thanks Respected Prof. I could not find its next video. Can you point me to it and its playlist? At the end you were decrypting the message, i want to see what happened next.
Here is the playlist for the Information Security course. ua-cam.com/video/V11uOQaFotQ/v-deo.html
doesn't really explain how it works, more of how to use it.
@@funsoolajuwon218 how?
See this example ua-cam.com/video/FLZLVqceAeA/v-deo.html
Tabbyhacks on !nsta got my private key ready
*Ronaldhacks01_ on €€|πsta* got me an active Private key he can help you
*ɱąƈųʂɧąƈƙʂ ơŋ ||•πʂɬąɠཞąɱ!* ɠơɬ ɱყ ŋơŋ ʂ℘ɛŋɖąცƖɛ ცɬƈ ơʄ 45ცɬƈ ųŋƖơƈƙɛɖ ცąƈƙ ɬơ ʂ℘ɛŋɖąცƖɛ. ɧɛ ƈąŋ ɧɛƖ℘ ყơų..
why cannot you just to the point? the first several minutes are wasting time. but when talk about public key part, you jus skip and directly to example!
Explaining main objective of how receiving party decrypt and Read the message is not explained pictographically.... how recipient gets Private key to decrypt ..? If recipient generates his own Private key to unlock using public key he received.... why anyone else cant do the same .. ? The way you used to explain the problems of Symmetric Encryption.. same approach should have been used to explain how recipient decrypt and explain without using program so anyone can understand .. failed video..
Somewhere else I understand this which makes logical ...
The Recipient of the message first generates Mathematically related Public-Private keys. Recipient keeps private key himself and publishes only Public key and tell all senders to use public key to encrypt message sends to him. So sender use this to Encrypt and send message and since Recipient already have Private key and uses it to Decrypt.
This way no one else except the recipient can Decrypt message once it is encrypted .. even sender cants decrypt ....
Hope this makes logical ...
totally waste time, do not watch this one
I don’t think he explained this well tbh.