In this video we will discuss:
Symmetric Key Cryptography
Asymmetric Key Cryptography
Encryption
Decryption
#blockchain
#cryptography
#symmetric key cryptography
#asymmetric key cryptography
Editing Monitors :
https://amzn.to/2RfKWgL
https://amzn.to/2Q665JW
https://amzn.to/2OUP21a.
Check out our website: http://www.telusko.com
Follow Telusko on Twitter: https://twitter.com/navinreddy20
Follow on Facebook:
Telusko : https://www.facebook.com/teluskolearn…
Navin Reddy : https://www.facebook.com/navintelusko
Follow Navin Reddy on Instagram: https://www.instagram.com/navinreddy20
Subscribe to our other channel:
Navin Reddy : https://www.youtube.com/channel/UCxmk…
Telusko Hindi :
https://www.youtube.com/channel/UCitz…
Donation:
PayPal Id : navinreddy20
Patreon : navinreddy20
http://www.telusko.com/contactus
7:29 left activities on blockchain in this video we’ll talk about types of cryptography so basically that two types the first one is symmetric key cryptography the second one is all symmetric key cryptography now as names such as the first one should be having symmetric key and second one will have
Two different keys right so let’s start the first one so let’s say assume we have a and B now a want to send a message to B what a will do a will simply encrypt the message using a key so let’s say that key is k1 so using a
Key k1 a will encrypt a message that message will go to be the in fact even B cannot read that message because it is encrypted format so B has to decrypt it now which key B will be using of course the same key right we just gave one so a
And B both will have the same key which is k1 that’s a different question how will they share this key with each other of course not a network right at the end we want them to have the same key which is k1 so now let’s say we have
One more we have a and C so of course we have be there so if a want to send a message to see now what above key a should use should a use k1 of course not right because b has k1 so if a want to
Send a message to C or we should not be interpreted by anyone else it will use a different key now and let’s say we will leave that as k2 so between a and B we have k1 between a and C we have k2 let’s say B and C won’t attract what key they
Will use will they use k1 of course not will they use k2 of course not they will need a different key which is k3 whatever says as the number of user increases we have to increase the number of keys and it will be difficult to manage one example in my pocket I have
To carry hundred keys because if I want to interact with hundred people I have to manage all the keys we don’t want that so that’s one of the topic of symmetric let’s move towards our symmetric asymmetry cryptograph they also known as public key cryptography so basically we use two
Different keys here one is private key and one is public key so what is this public key and private key as name suggests everyone will have two keys let’s say I want to send a message to BP send a message to C’s so on this network we have multiple nodes each node will
Have two keys the private key and a public key so a will have its own private can public key B will have his own ramekin public key C will have its own private can public key if you want to encrypt and decrypt the message you
Have to use both the case not one so to encrypt a message you can use public key but to decrypt the message you have to use private key if you are using a private key to encrypt the message then you have to use a public key to decrypt
A message so you have to use both the key the same time you can’t simply say I will Inc it with public can decode public key that’s not possible so we have to use both so if you are encrypting with private you came with public here if you’re encrypting with
Public every ticket with private how do you achieve security here so let’s say if a want to send a message to B as we know the public key of B is known to everyone public right so of course a will also know the public key of B so
What able do a will encrypt the message with B’s public key and then that message goes to B of course everyone else on the network can see that message the encrypted message but no one can decrypt it you know why because that message will be decrypted only with B’s
Private key and who has B’s private key of course only be the private right so you will know your private key and everyone else will know your public key so that’s how we do it so how do I achieve security enter the message with public key and to give the message with
Private key let’s do it again so let’s say C want to send a message to D so which public key si will use so si will use a public key of D so C will encrypt the message with this public key and D will decrypt the message with its
Own private key so that’s how this cryptography works but now the question is what is that key is is it a number is it the text that we’ll discuss in a separate video we talked about exactly turkey so that’s it from this video that we are talked about types of
Cryptography the injunction will be using the public key cryptography we use that so yeah that’s it on this video I hope you enjoyed that in coming section and this is that we are not done yet bye
45 Comments
Thanks
In the example of Assymetric Cryptography A node encrypts the message with B public key and B node decrypts with B private key.
Can you please explain why we encrypting with receivers public key not using the own public Key i.e A public key.
Super
Nicely explained
Very happy and i am glad to see you on blockchain and making clarity videos with wonderful explanation. Thank you so much sir for this videos……..
what if A want to send a message to B and C at the same time?
Sir how private encryption and public decryption will be secure?
these videos are too good to understand the concept of blockchain
So in Asymmetric Cryptography, we have double number of keys. The public key for the other nodes is also present and not to mention the private keys. In that way, how is it better than symmetric cryptography.
What happens? if A encrypt cipher text with his private key and sends to B. How will B decrypt the Text. which key B will use
hello sir, you are too good. thanks for creating amazing content for us.
sir, in today's world we know that machine learning is the fastest-growing technology and everyone wants to learn it. so please if you make a series on how to get started in machine learning and how to be an expert in machine learning it will be very great for us. so I request you to make a series on it.
once again thanks for delivering useful content
Excellent Navin
Sir, You are awesome..
So every node has to keep a packet full of other node's Public Key?? What's the advantage over Symmetric Key?
Utopia the most secure and secure system in the world!
nice video the concept or logic is so simple once u understand it lol
It help for Gate preparation
Thanks for the informative video. Keep it up..
I have a doubt in asymmetric key concept :-
How will B know that the msg was sent by A only it could have been sent by C also.
How does B get to know who sent him the msg ?
Sir if A uses public keys then A should have 100 public keys i.e
Public key of B, public key of C and so on . In short A should have 100 public keys to share data with 100 people ??
Very superb tutorial. great
Nice explaination
You are awesome sir 😋😋😋
Beautiful Explanations, Loved it
50 BTC unlocked in minutes ago by Williams_hacks1 on Instagram thanks for helping me
50 BTC unlocked in minutes ago by Williams_hacks1 on Instagram thanks for helping me
50 BTC unlocked in minutes ago by Williams_hacks1 on Instagram thanks for helping me
I watched so many videos on this topic but I did got it. you explained it so easily in 4 mins
Thank you somuch.
Thanks for the video I have learnt new things through this video
thank you sir,but i have a question..u said that in asymmetric key cryptography, we may encrypt using private key and decrypt using public key right? but decryption using public key is not secured right …i mean public key of B is known to C also…so how will that be secured???you didn't give example for[encryption using private key and decryption using public key] but you gave example only for[encryption using public key and decryption using private key]…so can you kindly explain me the second case where encryption by private key and decryption by public key
Can u plz provide cyber security videos
Please is it types of encryption or I am confused since I know types of cryptography are Block Cihers and Stream Ciphers.
I request you one video on seed key. how does it work in blockchain?
Question:
If A sends message to B by encrypting it with a private key and B can decrypt it with a public key. Can't anyone decrypt it, because B's key is public and can be seen by everyone?
Wonderful explaination!
Amazing
Thank you soo much sir… You are really greate….
Me aap ke videos dekhta hu…. Aap visvas nhi krogye ek video 4-5 baar dekta hu 🤭😂😂 or mane aap ki video dekh clg me mari presentation di….. Andy presentation is the best in whole clg…. 🤩🤩👍 Sir… Thank you so much….
How will one encrypt with private key and decrypt with public key?
What keeps a hacker from intercepting the message and the key in symmetric? Thank you great video
Wowzer ! Your videos are amazing ! I love that you leave us on a cliff at the end …. like in a netflix show so i definitely watch the next, I am binge watching this playlist right now !
Hii sir,I love when you start as welcome back aliens,Why you start like that ?? Any reason behind that ?? 😁😁
symmetric key cryptography: same key is used to encrypt and decrypt.
asymmetric key cryptography: everyone has 2 keys,public key and private key. message is encrypted using public key and decrypted using private key(or vice versa). everyone's private key and public key is different. but public key is known to everyone, and private key isn't .
sir can you please explain — Introduction to Blockchain, Key vocabulary while discussing Blockchain, Distinction between databases and Blockchain
Explaining distributed ledger Blockchain ecosystem. Transformation in trading units Cryptography and Cryptocurrency,
Anonymity and Pseudonymity in Cryptocurrencies, Digital Signatures, Hash Codes, Distributed networks.
Bitcoin and its history. Selling Bitcoins, Bitcoin transactions, How Bitcoin transactions work, What happens in case of
invalid transactions, Parameters that invalidate the transactions, Scripting language in Bitcoin, Applications of Bitcoin
script Nodes and network of Bitcoin, Various roles you can play in Bitcoin ecosystem.
Introduction, Purpose of mining, Algorithm used in mining, Mining hardware, How does Bitcoin mining work? Bitcoin
mining pools How cloud mining of Bitcoin works? Mining incentives, Security and centralizations.
Introduction, Ethereum, Ether, use of Ethereum, The Ethereum ecosystem, DApps and DAOs, How Ethereum mining
works? Learning Solidity: Contract classes, functions, and conditionals, Inheritance & abstract contracts, Libraries, Types
& optimization of Ether, Global variables, Debugging, Future of Ethereum.
Introduction to Hyperledger, Hyperledger Architecture, Consensus, Consensus & its interaction with architectural layers,
Application programming interface, Application model, Network topology, Exploring Hyperledger frameworks.
please explain these topics..
Itna achha koi kaise padha sakta hai?😮