What is Public and Private Key Encryption?

Поділитися
Вставка
  • Опубліковано 22 гру 2024

КОМЕНТАРІ • 83

  • @ricardo_alonzo
    @ricardo_alonzo 3 роки тому +7

    I have to say, I watched some of your videos on WCF during my last quarter and they were super helpful. I'm glad you've made videos on this topic as well, because now I have a cripto class to prepare for! Thank you!

  • @myajayb
    @myajayb Рік тому +1

    Very simple and elegant explanation. Love it.

  • @yapayzeka
    @yapayzeka 3 роки тому +1

    0:45 image is misleading. open and lock goes both ways.

  • @lukakavteli9441
    @lukakavteli9441 3 роки тому +1

    i don't get it like u can encrypt with the public key but how he decrypts with his private key if i did encryption? when i havn't sent any password? how i allow my friends privet keys to decrypt it?

  • @NajaraBonassi
    @NajaraBonassi 3 місяці тому

    Appreciate the detailed breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). How should I go about transferring them to Binance?

  • @PerrynChapa
    @PerrynChapa Місяць тому

    Great content, as always! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). What's the best way to send them to Binance?

  • @LajuanaBryand
    @LajuanaBryand Місяць тому

    Great content, as always! A bit off-topic, but I wanted to ask: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?

  • @exodus8213
    @exodus8213 2 роки тому

    I would like to know is there a way to know if a public keys private key is odd or random

  • @BenEverett1
    @BenEverett1 2 роки тому +5

    How about adding a link to the next video in the comments? Otherwise, I can't find it. It should also be explained that public and private keys are generated together and they are mathematically related to one another. A public can't be used to derive the private key and vice versa. Without telling the view that, the viewer will never quite understand how the keys can work and be secure.

    • @adrianavargova
      @adrianavargova 2 роки тому +2

      That is why I was left puzzled. I still do not understand how I obtain that private key? And how do I use it in real life as a general user? I do not get it.

  • @ggo4844
    @ggo4844 2 роки тому

    Very smooth explaination. I was confused before I watched the video, but then all became clear. Just a question came to my mind while reading the comment.
    Do my friend and I have to have the same tool of encryption or everyone can have his own tool.
    Thank you,

  • @kaushikdr
    @kaushikdr 4 роки тому +5

    Wonderful video! I am still a bit confused about how using a public/private key solves the problem of having your key stolen in transfer?
    Even if I share my public key to the entire world, when I send an email to someone, they have to have the right private key to open it. Don't I have to give them the private key ahead of time?
    Also, what is the point of even knowing the sender's public key and putting it globally for decrypting a message? The only thing that should matter is the private key, right?

    • @shadsluiter
      @shadsluiter  4 роки тому +1

      Each person has his/her own private key. You never share the private key. The encryption has to include the recipient's username when encrypting the document. Here is a demo of how to use GPG ua-cam.com/video/FLZLVqceAeA/v-deo.html

    • @yapayzeka
      @yapayzeka 3 роки тому +3

      when I lock the message with privkey and send to world -> it proofs the message comes from me when they can unlock the message with my pubkey.
      when someone want to send me secret message they lock the message with my pubkey and send to me -> only I can open it with my privkey.

    • @robertiglehart
      @robertiglehart 2 роки тому +4

      You need to think differently. You are thinking "backwards". If you want to send someone else an encrypted email for them to open, THEY need to send you their public key. They need to take the initiative and create a private/public key and send you the public.

    • @adrianavargova
      @adrianavargova 2 роки тому

      @@robertiglehart No, I understood the Alyeska's question totally. It is not because we think backwards. Probably it was not explained thoroughly. So my emails are not encrypted at all? And if I want to send an encrypted message, the recipient must generate some keys? So the recipient has to have some special software? Sorry, I am asking as an amateur, who does not get the point.

  • @sssapss
    @sssapss 2 роки тому

    Ok what about the privat key how they havit i need explanation for private key

  • @shmoo42
    @shmoo42 2 роки тому

    I randomly found this video while working on my essay for Communications in Grand Canyon University!

  • @muhammadali8105
    @muhammadali8105 2 роки тому +1

    Hi. If you say, the answer to the question, whether governments should be able to check communication is always "no", then this would be the end of criminal investigation, which I think is not what you really want, right? With respect to terror, Putin, China, white-collar-crime, interner-fraud, child pornography etc. public authorities MUST not be excluded from any communication media.

  • @kavinyudhitia
    @kavinyudhitia 2 роки тому

    This is crazy helpful. thanks a lot!!

  • @matiastrane7598
    @matiastrane7598 2 роки тому

    Very good description! I understand it like this: My friend, that wants to send me an encrypted message, creates the message which is the reason it doesn't need to be encrypted, yet. Then he wants to send it to me over the internet, which would require encryption for it to be private. I create public and private keys and provide him with the public key, so he can encrypt it and i can decrypt it with the private key. Is this correct? If so, i have a follow-up question: For me an my friend to be able to send encrypted messages to each other, we would both need a set of public and private keys, right?

    • @ggo4844
      @ggo4844 2 роки тому

      Yes right.

  • @DataVids
    @DataVids 3 роки тому

    Great video Shad. Well done

  • @mustarikulislam719
    @mustarikulislam719 3 роки тому +3

    Thank you so much, sir. It helped me out.

    • @shadsluiter
      @shadsluiter  3 роки тому +3

      Glad it helped. Let me guess. You are studying in a computer science program.

    • @mustarikulislam719
      @mustarikulislam719 3 роки тому

      @@shadsluiter no sir, I am enrolled in a BBA program :'3

  • @TINTUHD
    @TINTUHD 3 роки тому

    Great video.
    Question: How does the public key know which private key will work? Since it never knows the private key.

    • @chadsexinton
      @chadsexinton 3 роки тому

      I wanna know the same thing. I can't grasp that part.

    • @TINTUHD
      @TINTUHD 3 роки тому

      @@chadsexinton my guess it has to do with zero knowledge proof but I haven't seen it tied directly to this :(

    • @Rituraj..
      @Rituraj.. 2 роки тому +1

      Because the Public and Private key are generated in pair. Only that Private key will work that was associated with the public key you used to encrypt the msg.

    • @dpky7333
      @dpky7333 2 роки тому

      @@Rituraj.. So the public key is not really a key, rather it is the lock or tumbler pin set, to continue the analogy?

    • @Rituraj..
      @Rituraj.. 2 роки тому +1

      @@dpky7333 yes, you can say that. It is used in encryption.

  • @anngelnailsnailartist106
    @anngelnailsnailartist106 4 роки тому +2

    Wow thxxxxx !!!! Really good explanation

  • @thawfeekyahya007
    @thawfeekyahya007 3 роки тому +1

    Nice Explanation. Thanks

    • @koffyk4740
      @koffyk4740 3 роки тому

      *Ronaldhacks01_ on ||•πsta* his indeed a life changer cos he provided me an active private key software.

  • @Michelle-jc6gr
    @Michelle-jc6gr 2 роки тому

    Thank you! This was great!

  • @robertbaindourov134
    @robertbaindourov134 3 роки тому +2

    Great video!

  • @DeputyDawgAtl
    @DeputyDawgAtl 3 роки тому +1

    Ok what i'm still tripping on (Using Alice and Bob in my example) - I get that Bob's public and private key are mathematically linked. However if Alice is across the globe how is her public and private linked to Bob. So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses her private key to decrypt. OK i'm fine with that. But how is Alices private key linked to Bobs key? If Bob wants to send another msg, say to Tom - again he uses his public key to encrypt. Tom uses his private to decrypt - how is Tom's key linked? I'm missing something super basic here. Any help appreciated

    • @johsonfredrick7226
      @johsonfredrick7226 3 роки тому

      Contact Hackcell_r on Instagram
      I guarantee his services

    • @DeputyDawgAtl
      @DeputyDawgAtl 3 роки тому

      @@johsonfredrick7226 tried but can’t find him on IG. Can u confirm spelling please. Or a direct link? Thsnks

    • @johsonfredrick7226
      @johsonfredrick7226 3 роки тому

      @@DeputyDawgAtl OK, Try this message him on his mailing account. At *Rexspeedhacks@gmail.* Com His Instagram ID is correct *Hackcell_r*

    • @SoulXample
      @SoulXample 3 роки тому

      Bob doesn’t use his public key to encrypt he uses Alice’s if I understand correctly

    • @SoulXample
      @SoulXample 3 роки тому

      When I send a message to someone I encrypt it with their key (public) so they can unlock it with their private key and it is secure because although it is public it can only ever lock/encrypt not unlock/decrypt.

  • @emmanuelevuazeze4729
    @emmanuelevuazeze4729 4 роки тому +2

    Thank you prof

  • @SangHostler
    @SangHostler 3 місяці тому

    You make wonderful videos! 👏 Need some advice: 🙏 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). What is this? 🤔

  • @arjumandvillagelife
    @arjumandvillagelife 3 роки тому +1

    really nice
    well explained i

  • @iliassaek4609
    @iliassaek4609 3 роки тому

    Very clear thank you

  • @amitchauhan1505
    @amitchauhan1505 3 роки тому +1

    Thanks Respected Prof. I could not find its next video. Can you point me to it and its playlist? At the end you were decrypting the message, i want to see what happened next.

    • @shadsluiter
      @shadsluiter  3 роки тому +2

      Here is the playlist for the Information Security course. ua-cam.com/video/V11uOQaFotQ/v-deo.html

  • @ie0xomuet6mztj
    @ie0xomuet6mztj Місяць тому

    Crypto is the Wild West, but I’m all in!

  • @youtwolobote5288
    @youtwolobote5288 4 роки тому +1

    Good sir

  • @mermaidinclouds
    @mermaidinclouds 4 роки тому

    Well, where I really don't agree with the government keeping a third-eye on our data, I do see a point where it is required to surveillance terrorism activities, given, government don't turn to use data for their own purpose without an agreement.

  • @thunderstruckx996
    @thunderstruckx996 3 роки тому

    What the hell is wrong with the comment section???
    Thx for the video btw)

  • @fitzgeraldjk
    @fitzgeraldjk Місяць тому

    Remember, only invest what you’re willing to lose!

  • @silverjohnson3163
    @silverjohnson3163 4 роки тому +1

    doesn't really explain how it works, more of how to use it.

  • @ravindramg007
    @ravindramg007 2 роки тому

    Explaining main objective of how receiving party decrypt and Read the message is not explained pictographically.... how recipient gets Private key to decrypt ..? If recipient generates his own Private key to unlock using public key he received.... why anyone else cant do the same .. ? The way you used to explain the problems of Symmetric Encryption.. same approach should have been used to explain how recipient decrypt and explain without using program so anyone can understand .. failed video..

    • @ravindramg007
      @ravindramg007 2 роки тому

      Somewhere else I understand this which makes logical ...
      The Recipient of the message first generates Mathematically related Public-Private keys. Recipient keeps private key himself and publishes only Public key and tell all senders to use public key to encrypt message sends to him. So sender use this to Encrypt and send message and since Recipient already have Private key and uses it to Decrypt.
      This way no one else except the recipient can Decrypt message once it is encrypted .. even sender cants decrypt ....
      Hope this makes logical ...

  • @charlotteharris6217
    @charlotteharris6217 4 роки тому

    Tabbyhacks on !nsta got my private key ready

    • @urlajuwonfunso5044
      @urlajuwonfunso5044 3 роки тому

      *Ronaldhacks01_ on €€|πsta* got me an active Private key he can help you

  • @venunara1853
    @venunara1853 3 роки тому

    *ɱąƈųʂɧąƈƙʂ ơŋ ||•πʂɬąɠཞąɱ!* ɠơɬ ɱყ ŋơŋ ʂ℘ɛŋɖąცƖɛ ცɬƈ ơʄ 45ცɬƈ ųŋƖơƈƙɛɖ ცąƈƙ ɬơ ʂ℘ɛŋɖąცƖɛ. ɧɛ ƈąŋ ɧɛƖ℘ ყơų..

  • @stevenwang194
    @stevenwang194 2 роки тому

    totally waste time, do not watch this one

  • @StudioFourHundred
    @StudioFourHundred 2 роки тому

    I don’t think he explained this well tbh.

  • @stevenwang194
    @stevenwang194 2 роки тому

    why cannot you just to the point? the first several minutes are wasting time. but when talk about public key part, you jus skip and directly to example!