Is your key Private or Public?

Поділитися
Вставка

КОМЕНТАРІ • 100

  • @davidbombal
    @davidbombal  5 місяців тому +45

    Did you know this? And that digital signatures use private and public keys?

    • @bonfirehost
      @bonfirehost 5 місяців тому +1

      Yes

    • @mr2ti41
      @mr2ti41 5 місяців тому +2

      Had to learn this when I became a middleware admin. What tripped me up later in my career was cross-signed certificates.

    • @LiveNLearnBeHappy
      @LiveNLearnBeHappy 5 місяців тому

      @@mr2ti41be me 😂 my head spins

    • @einzelganger5290
      @einzelganger5290 14 днів тому

      It's the central premise of the Public Key Infrastructure (PKI).

  • @WhiteSheep-fj6fw
    @WhiteSheep-fj6fw 5 місяців тому +102

    Thanks David, please make more videos on Cryptography for beginners.

    • @davidbombal
      @davidbombal  5 місяців тому +39

      Do you want more shorts? Or long form videos? Or both?

    • @wh1tef4ng24
      @wh1tef4ng24 5 місяців тому +36

      @@davidbombal A long video on this would be great!

    • @aanya942
      @aanya942 5 місяців тому

      ​@@davidbombalboth would be fantastic

    • @Darkev77
      @Darkev77 5 місяців тому +1

      @@davidbombalthis short was very beneficial for me as a beginner in the crypto world!

    • @Rvmoss
      @Rvmoss 5 місяців тому +12

      Both. But more about creating your own private keys.

  • @Fizadigital
    @Fizadigital 5 місяців тому +19

    I am now about 13 years in IT career, i always love your way of simplifying things, your shorts are very short and useful, thank you 😊

  • @LeoHolanda_CANBR
    @LeoHolanda_CANBR 4 місяці тому +8

    "If I wanted to send you something and you want to make sure it came from me, I would encrypt with my private key and only my public key can decrypt". Not exactly, this is not "encryption" per se, this is called signature. You sign with your private key and the public key confirms the message came from you. The message contents might still be intercepted. If you want confidentiality, you need to encrypt the message with the recipient public key and only the recipient private key can decrypt.

    • @LoZander
      @LoZander 4 місяці тому +1

      yeah, thats what I was thinking. I assume he wanted to simplify to convey the general idea. Im sure the fact that RSA decryption and signing, and encryption and verification are the same fundamental algorithms respectively :p

  • @mmokhtabad
    @mmokhtabad 5 місяців тому +3

    You may think that your explanations helped out but I only heard many times private key and public key😂

  • @adammiller9029
    @adammiller9029 4 місяці тому +4

    Computerphile has a very good video explaining exactly how public and private keys word with some good analogies.

  • @drickzee
    @drickzee 24 дні тому

    This made my understanding of keys even better. Simple but effective explanation! Thank you!!

  • @quintencabo
    @quintencabo 4 місяці тому +1

    Encrypt with your private key is not how you should call it. That operation is called signing. To encrypt something you use a public key of someone else (or establish a shared secret and use that) and you could also sign it with your private key.

  • @limitlessuniverse9381
    @limitlessuniverse9381 5 місяців тому +10

    Hi, David! I’m now studying IT-security and your videos help me a lot to understand the things I couldn’t catch on my lections. Thank you for your videos.

    • @terrence369
      @terrence369 5 місяців тому +2

      Most lecturers upload a single piece of paper with questions and expect the students to research and do the entire assignment in Harvard standards without teaching anything.

  • @journel_8
    @journel_8 4 місяці тому +2

    Can kind of think of it as a PO box system. The post office has a public key. Individual box owners have private key

  • @Think_Up
    @Think_Up 4 місяці тому

    This was explained better than I've ever heard before. Well done!

  • @supriyochatterjee4095
    @supriyochatterjee4095 16 днів тому

    Thanks excellent well explained

  • @tham-18472
    @tham-18472 5 місяців тому +5

    Private Key Encryption - Document signing where docs are signu using Private key and anyone can validate it with public key.
    Public Key Encryption- Whatsapp - Sender encrypt message with ReceiptA's public and only ReceiptA can decrypt it with their private key.

    • @jackroark6928
      @jackroark6928 4 місяці тому

      better explanation than video!

  • @tbremard
    @tbremard 5 місяців тому +2

    That's why my private place can only be open by a public key.

    • @MercedesDenz
      @MercedesDenz 5 місяців тому +1

      _THATS WHAT SHE SAID_
      ahahahahhahaha

  • @ZoltanSzaszBenedek
    @ZoltanSzaszBenedek 5 місяців тому +1

    And big tech guys then behind scenes decrypt all basically ! Lol 😅

  • @Soda-stream
    @Soda-stream 5 місяців тому +1

    Thank you so much , learned so much from you!!! ❤

  • @allenmano
    @allenmano 5 місяців тому +1

    💓 Love from Chennai, India.

  • @rctech1237
    @rctech1237 5 місяців тому +1

    Wow sir you are great love from india ❤❤

  • @QuirkyQuests23
    @QuirkyQuests23 5 місяців тому +5

    Literally same with your email
    Public key is your email address.. its is accessible and available
    Private key is your email password.
    when someone is sending you a message using your email address ( Public key)
    and only your private key can decrypt it (Your password to access and see it)
    and when you will need to send it using your private key (when you are connected to your email accoun and you write your email) and it uses your public key to send your message to the other person ( your email address when it appears to the messages of the other person mailbox) that is your public key.

  • @KyleManel
    @KyleManel 4 місяці тому

    This is how TLS is utilized in many cases;
    A receiver will initiate a request to a website by;
    ENCRYPTing their public key with the website's public key, received from their certificate.
    The website will then;
    DECRYPT the payload with their private key,
    Providing the website with the receivers public key.
    The website will then;
    ENCRYPT the data requested with the receivers public key,
    The receiver will then;
    DECRYPT the data received from the website with their private key.

  • @AFreakingAxeCH
    @AFreakingAxeCH 4 місяці тому

    Sooo a private key is kinda like your signature, and the public key is a confirmation tool for your signature

  • @jackal6902
    @jackal6902 5 місяців тому +1

    Ahhh yeah cool. Still really confusing.

    • @aronm5329
      @aronm5329 5 місяців тому +2

      I'm currently studying this, and it's impossible to fully explain this in 59secs. Professor Messer's video on the subject is like 15mins along and requires l like 3 video prerequisites

  • @dodde216
    @dodde216 4 місяці тому

    Public key = Doorlock you can hand out
    Private key = Key to said door you should keep safe

  • @engalipak
    @engalipak 5 місяців тому

    Wow..thanks alot.

  • @maji0
    @maji0 5 місяців тому

    I think the formula is interesting as well.

  • @128Worldman
    @128Worldman 4 місяці тому

    Awesome thanks ❤

  • @pezwarrior4
    @pezwarrior4 15 днів тому

    Quantum computers have entered the chat for deciphering encryption.

  • @SimSpark1
    @SimSpark1 5 годин тому

    Does the public key expire or has a timeframe? Or if you give or sent the key to someone, can it be intercepted and reused?!

  • @rasoolabeditabar3143
    @rasoolabeditabar3143 4 місяці тому

    Okey I'm listening

  • @YouSmokeChed
    @YouSmokeChed Місяць тому

    This is just PGP I had to learn it for TOR

  • @OscarF20
    @OscarF20 3 місяці тому

    I only listened key, key, key, key, key, key, public and private

  • @comeycallate9959
    @comeycallate9959 4 місяці тому

    yeah, but how do you provide the clients with the public key without the message been intercepted because the attackers have access to the same public key?

  • @user-qy6db7yi2b
    @user-qy6db7yi2b 5 місяців тому +2

    So it goes both ways? I always thought only Data encrypted with a public key could be decripted with the corresponding private key, Not the other way around!

    • @tristancomerford
      @tristancomerford 5 місяців тому

      When used the other way around it's usually referred to as 'signing'.

    • @aronm5329
      @aronm5329 5 місяців тому

      It's how you can verify software you're unsure about

    • @deang5622
      @deang5622 5 місяців тому

      ​@@aronm5329Verify what aspect of the software ?

  • @MichaelFlenderson
    @MichaelFlenderson 4 місяці тому

    🥶

  • @aryanjain9972
    @aryanjain9972 5 місяців тому

    thats so true do you do java

  • @SiAdiaMu
    @SiAdiaMu 3 місяці тому

    my brain hurts 😵

  • @JoseVargas-dx7wz
    @JoseVargas-dx7wz 5 місяців тому +2

    If I use pub key from google, then only google can see it. That's what's happening on the browser when I send data to backend, but when we get data from google?

    • @tristancomerford
      @tristancomerford 5 місяців тому +2

      Not quite. Unfortunately while using Google's certificate as an example of a public key is useful to set context, when it's used as part of an https (or other TLS) session it's a lot more complicated. You want to look at DH Key Exchange.

    • @aronm5329
      @aronm5329 5 місяців тому

      I'm studying for my Sec+, and not an expert but basically...
      Google is a certificate authority (a root CA), so they can issue certificates to domains including thier own, using a public/privatekey signing process. They or another CA can issue certificates to your browser as well. Then they will run the hashing algorithms, as long as the as the keys work and none of the of the certificates are on the CRL (certificate revocation list), you will be able to decrypt any info that comes from Google or any approve site.

  • @Memespark
    @Memespark 5 місяців тому

    We use this daily in winscp for file sharing via sftp 22 port

  • @chrisfellon9905
    @chrisfellon9905 5 місяців тому

    Proton Mail

  • @user-bc9jq6hm4k
    @user-bc9jq6hm4k 5 місяців тому

    More obviosly it will be with some commands in shell.
    Could you show it that way?

  • @Soundwave-F7Z
    @Soundwave-F7Z 4 місяці тому +1

    So If you encrypt a message with your private key, that means anybody with your public key can decrypt it?

    • @jjpaq
      @jjpaq 4 місяці тому

      Yes, the purpose of cryptography like this isn't to hide information but to verify that a message came from you.
      Going the other way, though, anybody can encrypt a message with your public key, and then you'll be the only person who can decrypt and read it (unless your private key gets stolen).

    • @Soundwave-F7Z
      @Soundwave-F7Z 4 місяці тому

      @@jjpaq so if it’s purpose is not to hide information and only verify, then how do you hide it?

    • @jjpaq
      @jjpaq 4 місяці тому

      @@Soundwave-F7Z there are other types of encryption for that-essentially, information is as secure as the key needed to unlock it, so if a public key can unlock it, it's not secure.
      If you wanted to hide data, you'd use a key that others _don't._ Even signing it with your own public key would accomplish that.

    • @LeoHolanda_CANBR
      @LeoHolanda_CANBR 4 місяці тому

      ​@@Soundwave-F7ZYou encrypt with recipient's public key, and only the recipient can decrypt with their private key.

    • @LeoHolanda_CANBR
      @LeoHolanda_CANBR 4 місяці тому

      ​@@jjpaqthis is not really encryption. This is just message signature to ensure authenticity of sender

  • @science.20246
    @science.20246 5 місяців тому +2

    still confusing

  • @JerimiahRasmussen-vh7vx
    @JerimiahRasmussen-vh7vx 5 місяців тому

    You want to team up are you still looking for the trazor bridge

  • @fokerfakerfuker
    @fokerfakerfuker 4 місяці тому

    i need more of these videos!

  • @charbelmakhlouf5336
    @charbelmakhlouf5336 15 днів тому

    At the end of the video , he said i encrypt with my private key & decrypt with a public key?
    This looks wrong .

  • @timmyhuynh3859
    @timmyhuynh3859 5 місяців тому

    Desr UA-cam algorithm, please Show me more reels like this please.

  • @bonfirehost
    @bonfirehost 5 місяців тому

    1

  • @alsadekalkhayer7007
    @alsadekalkhayer7007 5 місяців тому

    Maybe I am asking the wrong question, but which data are shared this way?

  • @rickyankit
    @rickyankit 5 місяців тому

    Hi, I am trying to code sign efi file on my arch linux using my safenet code signing token but not able to do so can anyone help me with that?

  • @mrsheabutter
    @mrsheabutter 14 днів тому

    😂😂 still don't understand

  • @itisazman
    @itisazman 5 місяців тому

    i listen only pub pub pub pub public key

  • @Frozen_stars
    @Frozen_stars 5 місяців тому

    Can we Crack wifi passwords without using any adapter?

  • @BC.702
    @BC.702 5 місяців тому

    Pgp

  • @MrRaveelhussain
    @MrRaveelhussain 15 днів тому

    So if a hacker has the publoc key, he can decrypt the data?

    • @bobmusil1458
      @bobmusil1458 13 днів тому

      The public key is public. Everybody can have it. You don’t need to be a hacker.

  • @helmanfrow
    @helmanfrow 5 місяців тому

    Really simple explanation for a complex topic. Thanks.

  • @JerimiahRasmussen-vh7vx
    @JerimiahRasmussen-vh7vx 5 місяців тому

    Can you fix it if I accidentally sent a private key on accident `π`|π-;

    • @1337kaas
      @1337kaas 5 місяців тому +1

      Create new keys

  • @oswaldorodriguez1128
    @oswaldorodriguez1128 5 місяців тому

    Public key 🗝

  • @useromid
    @useromid 5 місяців тому +2

    Wrong!!! You create a session key, encrypt the message, then encrypt the session key with public key. You dont’r try to encrypt a message with a 1024/2048 public key.

  • @souvikray-vn2ws
    @souvikray-vn2ws 5 місяців тому

    I've 46% hs rate but damn i lack confidence like yours on the omen kill

  • @the_object_777
    @the_object_777 5 місяців тому

    I really got the windows 10 activation key from chat gpt