Encryption and public keys | Internet 101 | Computer Science | Khan Academy

  Рет қаралды 413,148

Khan Academy

Khan Academy

Күн бұрын

Пікірлер: 154
@Dunit1117
@Dunit1117 Жыл бұрын
She's a great teacher. It's refreshing to hear someone explain technical things nice and slow. Slowing down gives people time to process the info.
@matthiasmcgee5805
@matthiasmcgee5805 10 күн бұрын
Hey, I don’t mean to inconvenience you, but could you help me out? In my OKX wallet, I have USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I send it to OKX?
@paul-cl3el
@paul-cl3el 2 жыл бұрын
her explanation is by far the best I saw on youtube simple and easy to understand
@matthiasmcgee5805
@matthiasmcgee5805 10 күн бұрын
Excuse me, could you offer me some help with this? I’ve got USDT TRX20 in my OKX wallet, and my recovery phrase is (clean party soccer advance audit clean evil finish tonight involve whip action). What’s the best way to move it to OKX?
@TickleTwinkleTwink
@TickleTwinkleTwink 3 жыл бұрын
YOU EXPLAINED THIS SOOO WELL!!!
@girlforyoru
@girlforyoru 3 жыл бұрын
I have an exam for CS External Encryption So I started Studying this! Fully Explained! Thank you for informing us!
@fabricionunes8683
@fabricionunes8683 4 жыл бұрын
I’m going to learn English with this video, I like to learn two things at the same time ❤️ thanks
@gabby993
@gabby993 Жыл бұрын
This is probably the first time I watched a Khan Academy at home on my free will. Other times was at school. Just because I was curious how encryption works
@matthiasmcgee5805
@matthiasmcgee5805 10 күн бұрын
Hey there, I hope it’s okay to ask, but could you help me out? I’ve got USDT TRX20 stored in my OKX wallet, with the phrase (clean party soccer advance audit clean evil finish tonight involve whip action). What are the steps to transfer it to OKX?
@matthiasmcgee5805
@matthiasmcgee5805 10 күн бұрын
Hi, I hope it’s not a bother, but could you assist me? I maintain USDT TRX20 in my OKX wallet and have the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] How do I move it to OKX?
@moonshine4757
@moonshine4757 3 жыл бұрын
She's so good at explaining in the most simpler way. Great job 👏
@rcubed1979
@rcubed1979 2 жыл бұрын
Great video, very easy to understand! I loved the mailbox demonstration!
@shermayapaul8224
@shermayapaul8224 Жыл бұрын
I am here revising for my IT exam and I just felt a curiousity of how encryption works. She explained this so well and made it easy for me to understand. Thank you. You are very good at your job.
@parker797
@parker797 Жыл бұрын
The mailbox analogy was the best way I've seen of explaining public key encryption; it makes so much sense this way
@prekshajain6935
@prekshajain6935 3 жыл бұрын
No one has explained it so well ..Thanks for sharing it
@scooby7877
@scooby7877 3 жыл бұрын
Something to keep in mind here is that SMTP (a protocol on port 25 for mail) can be used with SSL (a protocol for how encryption is made) so that you can securely get mail even if both protocols are on different ports
@celestinetoussaint6350
@celestinetoussaint6350 2 жыл бұрын
Ahhh this was helpful because I was curious about that!
@hamzawaheed47
@hamzawaheed47 5 жыл бұрын
I just want to THANK YOU for clarifying my thoughts!!!
@MrSreenir
@MrSreenir 2 жыл бұрын
Well explained. The Public Key can be shared after authentication before exchanging messages between computers
@kdr2079
@kdr2079 29 күн бұрын
FANTASTIC VIDEO AND EXPLANTION - Thank you for making this video! Im sharing it with many people. 🔥👏
@mic9047
@mic9047 2 жыл бұрын
Amazing video. I’m glad I found this channel to learn about networking!
@antoniorodriguez5138
@antoniorodriguez5138 5 ай бұрын
¡¡Woooow!! Her explanation was amazing and only she is a young girl. Incredible!!.
@jean-francoisbec8358
@jean-francoisbec8358 2 жыл бұрын
Wow! It makes sense and it is really easy to understand with your words ! Thank you :)
@vinaybabupamu6190
@vinaybabupamu6190 3 жыл бұрын
One of the best video in internet to get started to understand encryption. Thanks.
@avitex2441
@avitex2441 2 жыл бұрын
Best explanation ever, its too easy to understand
@artishzone
@artishzone 7 ай бұрын
Thanks a lot for the great lesson! Your teaching style makes learning so much fun.
@DCYPT
@DCYPT 3 ай бұрын
Thank you really much for the professional explanation!
@mukundumashankar3979
@mukundumashankar3979 3 жыл бұрын
dayummmmmmmm your explanation is sooooo nice thanks for clearing out my confusions in this short and amount of time .
@ryananderson8817
@ryananderson8817 8 жыл бұрын
"This is what I'm doing with my work and I'm always about to lose my shit" :^)
@johnny14980
@johnny14980 3 жыл бұрын
How did u comment this 5 years ago? It says the video was posted 2 years ago
@dkbroman
@dkbroman 3 жыл бұрын
@@johnny14980 WHOA HE'S HACKING
@NeelSandellISAWESOME
@NeelSandellISAWESOME 4 жыл бұрын
This is really cool. It seems that with 256 bit encryption, it would take 2^256 guesses. The concept of public vs private keys is cool as well --> anyone can deposit in your mailbox but only you can access the contents.
@skyblue1599
@skyblue1599 2 жыл бұрын
why 2?
@NeelSandellISAWESOME
@NeelSandellISAWESOME 2 жыл бұрын
@@skyblue1599 For every bit, we have two choices.
@nilsmustermann8454
@nilsmustermann8454 Жыл бұрын
I was a bit confused first, because 2^256 isn’t (2^256)-1 (number in the video; 3:17), but precisely spoken you don’t have to “try” the last combination, because you already know it’s the right one after trying all others
@miteshd81
@miteshd81 10 ай бұрын
My daughter loved this❤
@tonykososki3016
@tonykososki3016 2 жыл бұрын
maaan this video is so great!
@meow710
@meow710 3 жыл бұрын
Daaang.... This is the explaination I'm looking for. So, logical
@leerdoor
@leerdoor 3 жыл бұрын
Extremely well explained. Good job girl!
@abcdefghijklmn6940
@abcdefghijklmn6940 2 жыл бұрын
Mia Gil is so cool and also explained very clearly!!
@adyanathkaibartya7222
@adyanathkaibartya7222 2 жыл бұрын
Great Job, Mam Conference level infinity
@tharunthiruseelan4252
@tharunthiruseelan4252 4 жыл бұрын
This video was amazing.
@ber2996
@ber2996 4 ай бұрын
Im always wondering how the public and private keys works in the basic sense, now that example makes sense
@nissimbracha1
@nissimbracha1 8 ай бұрын
Thank you for this explanation! that was very halpful
@claverassanvo8495
@claverassanvo8495 Жыл бұрын
Amazing explanation... Pretty woman 👩 with Pretty ,true and simple knowledge about encryption and description of a message 😢Many poeple try to explain 🤔 😉 but they can't elaborate it well... Thanks🎉🎉🎉God bless you 🙏
@fetajonathan2247
@fetajonathan2247 2 жыл бұрын
NIce explanation. KUDOS👏
@thidevaloka6081
@thidevaloka6081 2 жыл бұрын
Great work sis super supportive
@badrii07
@badrii07 2 жыл бұрын
Good Job, thanks
@bhavyasharma8661
@bhavyasharma8661 4 жыл бұрын
amazing explanation and amazing explainer !!!!! Thanks a lot
@oopsy444
@oopsy444 3 жыл бұрын
we need to get a sequel course!!
@siskahernaning
@siskahernaning 2 жыл бұрын
thank you.. your video is so well explained
@ananyaimtiazhussain6816
@ananyaimtiazhussain6816 3 жыл бұрын
Wow! Thank you. This helped a lot.
@labuewilfred2259
@labuewilfred2259 3 жыл бұрын
Thanks for the simple n clear explanation
@RealTacticalMax
@RealTacticalMax 6 ай бұрын
I’m just thinking of what would happen to my potato laptop if I tried to decode one of these.
@siyn007
@siyn007 8 жыл бұрын
you can see the long hours of coding in her eyes
@iixcloudyxii560
@iixcloudyxii560 4 жыл бұрын
siyn007 how does it say you posted this 4 years ago if this was published April 2019...
@siyn007
@siyn007 4 жыл бұрын
@@iixcloudyxii560 don't question just admire
@Moderationinmoderation
@Moderationinmoderation 4 жыл бұрын
@@siyn007 lol
@lakshmanreddy1148
@lakshmanreddy1148 4 жыл бұрын
@@iixcloudyxii560 😶
@lakshmanreddy1148
@lakshmanreddy1148 4 жыл бұрын
How 4 years ago 🙄🙄🤔🤔
@bemotivated2203
@bemotivated2203 3 жыл бұрын
allways changing and challenging :) very well explained in simple manner thanks
@marvismeng1953
@marvismeng1953 3 жыл бұрын
You are talented!!!!!
@gustavoisidor2575
@gustavoisidor2575 Жыл бұрын
@khanacademy what about quantum computers for decrypting the messages without the private key and trying all possible combinations?
@nielsdaemen
@nielsdaemen 3 жыл бұрын
*Beautiful and smart!*
@janeric1810
@janeric1810 3 жыл бұрын
I thought I'm too stupid to understand this, thank you very much
@thakibkorede
@thakibkorede 3 жыл бұрын
A very educating video. Keep it up
@brentdelosangeles2499
@brentdelosangeles2499 3 жыл бұрын
Amazing video!
@hello_virals
@hello_virals 3 жыл бұрын
You are amazing thank you so much good luck!
@sorintalpis8210
@sorintalpis8210 5 жыл бұрын
Beautiful presentation and presenter
@esmaeelbaz6827
@esmaeelbaz6827 3 жыл бұрын
great explanation
@sushilakarki3885
@sushilakarki3885 5 ай бұрын
No it will take about 2.78 hours for a computer to brute force a 10 digit code. Love your vids btw
@kiu8179
@kiu8179 4 жыл бұрын
Good viedo, very thanks i like the spanish subs
@prajwalmishra2722
@prajwalmishra2722 4 жыл бұрын
Best video..thanku
@mahdisfatima3218
@mahdisfatima3218 4 жыл бұрын
Thanks alot... I helped me alot
@wazidalikhan2775
@wazidalikhan2775 3 жыл бұрын
Thanks, good information.
@severianocuellar1327
@severianocuellar1327 5 ай бұрын
TOTP code (App Authenticators) is Symmetric and Hardware keys (Yubikey, Feitian, etc) is Asymmetric?
@beappreciativediligent1220
@beappreciativediligent1220 Жыл бұрын
I dont get it . If I have a public key of someone else. And g use the key to generate an encryped file with a file of my known content . Then why can't I reverse the encryption and derive the private key?
@dmoney141414
@dmoney141414 4 жыл бұрын
great video! thank you
@fernandosanchez5117
@fernandosanchez5117 4 жыл бұрын
thanks, really nice video.
@HighlifeLuna
@HighlifeLuna Ай бұрын
Quantum Computing has entered the chat.
@rlyehdate
@rlyehdate 3 жыл бұрын
What a pro!
@anntakamaki1960
@anntakamaki1960 3 жыл бұрын
Straighforward explanation.
@luis96xd
@luis96xd 8 ай бұрын
Amazing video, everything was well explained and I liked the Mailbox example, thanks! I have a doubt, we use the Public Key to encrypt messages and the Private Key to decrypt them But, can we encrypt messages using the private key and decrypt them using the public key? Does this has sense? or it is not possible Another doubt, using a number key in Caesar Cipher we swap N times as the key says, but how does key work with they have letters?
@anthonyarmstrong9196
@anthonyarmstrong9196 3 жыл бұрын
Wow. That's heavy
@AnhTuPhucDerrickHoangCanada
@AnhTuPhucDerrickHoangCanada 2 жыл бұрын
Encryption locls my info with institutions i trust!
@shantanurai5911
@shantanurai5911 3 жыл бұрын
Thnx for video
@AceofDlamonds
@AceofDlamonds 2 жыл бұрын
Thanks!
@SelmanErhanekici
@SelmanErhanekici 7 жыл бұрын
Great presentation and explanation
@BlueProgamer212
@BlueProgamer212 3 жыл бұрын
3 years ago comment on a 2 years ago video
@jeffbguarino
@jeffbguarino 2 жыл бұрын
There is other information you can use to figure out a message. Like "free pizza in the cafeteria" = "kmsg rpche ps upg ehimxlwji" There is other information here. The English language is the other information. There are only a couple of thousand common words. Two letters , is, in, on, to, etc. not that many. You could possible figure out a sentence of just by counting the number of letters per word. You probably know what the general content of the letter might be. For example a military letter of orders will not be a cooking recipe, so the word basket will be limited. If this letter is sent to you at a place where there is a cafeteria, then you have more information. Maybe they have free pizza once a year and you can guess what the message is just by putting together information from diverse places. If you see an encrypted 5 letter word , as the first word of an email. There is a good chance this word is "hello". Consider a baby who knows no language at all. They can figure out what you are saying. It takes a while but they know, and not from the actual words but all the cumulative information gathered up from the months of watching things.
@Gary-Seven-and-Isis-in-1968
@Gary-Seven-and-Isis-in-1968 4 жыл бұрын
You're an absolute genius, thank you for a fascinating video. Could you tell me if it is possible to find the encryption key for an Android photo file if the owner mistakenly wiped the encryption key from the phone?. Yes it happened to me and so far nobody has been able to shed some light on this commonly occurring problem with Android phones. By default from Android 6 upwards all data on the phone is encrypted.
@SoulXample
@SoulXample 3 жыл бұрын
“Some math that we won’t get into right now”. That’s what I came here to try to understand aargh!
@chiraggoel3604
@chiraggoel3604 3 жыл бұрын
nice video
@nomanibnhafiz3876
@nomanibnhafiz3876 3 жыл бұрын
Too good
@eddietime1811
@eddietime1811 2 жыл бұрын
Me: I only wanna hear about the math Her: we won’t get into that now Me:
@JimMarshallUK
@JimMarshallUK 3 ай бұрын
Will quantum computing allow for “brute force”? Within a reasonable amount of time. IE trying all the possible combinations? It seems AI, Machine Leaning, Neural networks and faster processing will get you there
@johnhack67
@johnhack67 3 жыл бұрын
thanks
@MrKennym321
@MrKennym321 Жыл бұрын
There are two things I don't understand: If I encrypt an email message, for example using S/MIMES, how does the person I am sending it to get the key to decrypt the email? Secondly, how is a certified signature a guarantee that the email is safe? Isn't it possible for someone to hack someone else's certified account?
@hi_beemo1808
@hi_beemo1808 3 жыл бұрын
the quantum computer be like: what only 256 bit key? I'm I a joke to you?
@8877robert
@8877robert 3 жыл бұрын
Bravo.
@thekeith1221
@thekeith1221 3 жыл бұрын
How does she work for the dod while still in college?
@DarkEagle01
@DarkEagle01 4 жыл бұрын
Can’t someone reverse engineer your private key from the public one? If you know how something is encrypted, doesn’t that mean you can decrypt it?
@Kitulous
@Kitulous 3 жыл бұрын
you basically have to bruteforce 2^128 or 2^256 keys in order to guess the private key :) no, there's no way to derive a private key from the public key
@johnny14980
@johnny14980 3 жыл бұрын
The whole point of encryption is to develop methods that are essentially irreversible.
@shamelessone1987
@shamelessone1987 8 ай бұрын
I really need to find a video that doesnt use an analogy like the mailbox, like i need one where it explains to me how the encrption actually works and doesnt allow the public key to decrypt the the information.
@williammangani2151
@williammangani2151 3 жыл бұрын
Help me guys which school teaches Computer Science on an Online at affordable price
@itboostaustralia8498
@itboostaustralia8498 5 жыл бұрын
great video
@enahmoscar-phoenix7565
@enahmoscar-phoenix7565 2 жыл бұрын
Bruh I waited 5 minutes for the math…
@urmomasf
@urmomasf 4 жыл бұрын
im still confused :( i just i dont know how to do it in my code assignment...
@Noah.Nation
@Noah.Nation 4 жыл бұрын
Use math boom.
@ArcadianArt
@ArcadianArt 5 жыл бұрын
What they fail to tell you here while the blow encryption out of proportion is that the NSA, CIA and five eyes do not care about cracking codes when they have backdoor access to nodes. They can tailgate any message on the internet that triggers their attention. Encryption although affective to an extent is just being hopeful. It’s all about language mixed with encryption and avoiding the surface.
@ArcadianArt
@ArcadianArt 4 жыл бұрын
Isaac W go look up who looks after proton mails servers, and where exactly their servers are located. They even state in their website if you are a “Snowden” do not use proton mail. In other words it won’t protect you. PGP is overrated and filled with flaws. Look up my videos I made a video on PGP
@ebentee
@ebentee 4 жыл бұрын
@@ArcadianArt gonna check your videos and will definitely subscribe
@donnievitelloni3806
@donnievitelloni3806 3 жыл бұрын
A quantum computer will make this process obsolete one day
@derpr00
@derpr00 3 жыл бұрын
To the part where processors get smaller and smaller. We cant go any further smaller anymore
@cycnr4062
@cycnr4062 4 жыл бұрын
Were is Theale green at
@chadfreddy7820
@chadfreddy7820 2 жыл бұрын
Help me my teacher is constantly restarting the video so we can't get on the computers. Quick someone teach me everything I need to know about this.
@michaelduvwiama1370
@michaelduvwiama1370 4 жыл бұрын
Who's here from Solent?
@adityabhatt4177
@adityabhatt4177 Ай бұрын
wow
@c.s.i.s6284
@c.s.i.s6284 4 жыл бұрын
This is video doesn't mention the fact that all governments have private encryption keys. So this means that governments can decrypt any individuals private information.
@manyworldsvideo
@manyworldsvideo 3 жыл бұрын
Only if the people sending the information do it with the government's matching public keys.
@chavorocket
@chavorocket 3 жыл бұрын
>Click video >Hear woman's voice >Close video
@chavorocket
@chavorocket Жыл бұрын
@versatilenethra You will never be a programmer
@chavorocket
@chavorocket Жыл бұрын
@versatilenethra That's what I thought, aka nothing
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 10 МЛН
Cat mode and a glass of water #family #humor #fun
00:22
Kotiki_Z
Рет қаралды 42 МЛН
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 942 М.
Large Language Models explained briefly
7:58
3Blue1Brown
Рет қаралды 1 МЛН
7 Outside The Box Puzzles
12:16
MindYourDecisions
Рет қаралды 79 М.
Prime Numbers & RSA Encryption Algorithm - Computerphile
15:06
Computerphile
Рет қаралды 183 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 139 М.
What is Encryption? (& How it Works to Protect Your Data)
9:25
TheUnlockr
Рет қаралды 91 М.
Cryptography: Crash Course Computer Science #33
12:33
CrashCourse
Рет қаралды 861 М.
COMPUTER SCIENCE explained in 17 Minutes
16:49
Wacky Science
Рет қаралды 1,7 МЛН
The RSA Encryption Algorithm (1 of 2: Computing an Example)
8:40
Eddie Woo
Рет қаралды 1,1 МЛН
Cat mode and a glass of water #family #humor #fun
00:22
Kotiki_Z
Рет қаралды 42 МЛН