Types of Cryptography | Blockchain

  Рет қаралды 96,149

Telusko

Telusko

Күн бұрын

In this video we will discuss:
Symmetric Key Cryptography
Asymmetric Key Cryptography
Encryption
Decryption
#blockchain
#cryptography
#symmetric key cryptography
#asymmetric key cryptography
Editing Monitors :
amzn.to/2RfKWgL
amzn.to/2Q665JW
amzn.to/2OUP21a.
Check out our website: www.telusko.com
Follow Telusko on Twitter: / navinreddy20
Follow on Facebook:
Telusko : / teluskolearn. .
Navin Reddy : / navintelusko
Follow Navin Reddy on Instagram: / navinreddy20
Subscribe to our other channel:
Navin Reddy : www.youtube.co....
Telusko Hindi :
www.youtube.co....
Donation:
PayPal Id : navinreddy20
Patreon : navinreddy20
www.telusko.com...

Пікірлер: 103
@shouvikpradhan1094
@shouvikpradhan1094 6 жыл бұрын
Thanks Naveen sir , I have attain some seminar , and also see some other stuff but the concept of public key and private key was not cleared to me, thanks sir this time I have clear concept about this only bcoz of u
@akshbansal7715
@akshbansal7715 6 жыл бұрын
nice to see u posting vids so frequently!!! keep it up
@mayankbatra4752
@mayankbatra4752 5 жыл бұрын
Thanks alot for the explanation. But I have a question, you have mentioned that A will use the public key of B. This means that B has shared its public key to everyone so that anyone can encrypt a message and send that message to B. This means every node on the network will have B's key. In a similar manner, C's and A's public key will be shared. This again refers to the problem which you described in symmetric key cryptography that we need to maintain an overhead of so many keys. Please explain sir?
@thuannguyenuc1279
@thuannguyenuc1279 Жыл бұрын
The asymmetric will reduce the number of keys that needs to be used in the system. 'Cause in symmetric cryptography, when A and C want to encrypt a message and send it to B, they will need to use two different keys and of course, B will need two different keys to decrypt the two messages send from A and C. But when you use asymmetric cryptography, A and C only need the same key to encrypt their message (that is B's public key) and then B will only need a key to decrypt (that is B's private key) two different messages sent from A and C. Hope this will help someone in future 😄
@Murugavel-ee123
@Murugavel-ee123 Жыл бұрын
@@thuannguyenuc1279 yes!! Correct
@yusufmohammeddelvi3882
@yusufmohammeddelvi3882 4 жыл бұрын
I watched so many videos on this topic but I did got it. you explained it so easily in 4 mins Thank you somuch.
@atharva2004
@atharva2004 Жыл бұрын
symmetric key cryptography: same key is used to encrypt and decrypt. asymmetric key cryptography: everyone has 2 keys,public key and private key. message is encrypted using public key and decrypted using private key(or vice versa). everyone's private key and public key is different. but public key is known to everyone, and private key isn't .
@crazyshala4571
@crazyshala4571 6 жыл бұрын
Sir make video on what level of maths are required in machine learning and data science and where from can learn it .......
@arunrajkumard7231
@arunrajkumard7231 6 жыл бұрын
your video making technique is so awesome... and the content delivery so good... explanation is clear...
@yugandharsurya
@yugandharsurya 5 жыл бұрын
these videos are too good to understand the concept of blockchain
@jackfrost8969
@jackfrost8969 7 ай бұрын
wow, excellent explanation
@AB-1023
@AB-1023 3 жыл бұрын
What keeps a hacker from intercepting the message and the key in symmetric? Thank you great video
@marysony7018
@marysony7018 4 жыл бұрын
thank you sir,but i have a question..u said that in asymmetric key cryptography, we may encrypt using private key and decrypt using public key right? but decryption using public key is not secured right ...i mean public key of B is known to C also...so how will that be secured???you didn't give example for[encryption using private key and decryption using public key] but you gave example only for[encryption using public key and decryption using private key]...so can you kindly explain me the second case where encryption by private key and decryption by public key
@muhammadyasin9387
@muhammadyasin9387 3 жыл бұрын
the pair of keys are generated by RSA algorithm in such a way that the private and public keys are mathematically linked. when you know the public key of B you can send it to B but as you send the massage encrypting with a public key, to decrypt the cipher file you must need a private key. AS the public and private keys are linked together only B's private key can decrypt the cipher file. for an example : suppose you know your friends address now you want to send a latter on his/her mailbox which is standing outside of your friends house(the mailbox). and the mail box is locked by a key which belongs to your friend. now here the address of your friend is known to all this address is the public key and the lock of this box will open only by the key which your friend have already. The lock of your friends mailbox will not open by other's private key.
@dheerajmaske1194
@dheerajmaske1194 2 жыл бұрын
@@muhammadyasin9387 Read the Question again
@shaikafreen5337
@shaikafreen5337 2 ай бұрын
The way ur explaining is very crystal clear sir...
@faisalmomin3110
@faisalmomin3110 6 жыл бұрын
Sir any book you suggest about cryptography to us
@Jeevan_prakash
@Jeevan_prakash 4 жыл бұрын
Thanks for the video I have learnt new things through this video
@nadimetlavishwet1355
@nadimetlavishwet1355 Жыл бұрын
Hii sir,I love when you start as welcome back aliens,Why you start like that ?? Any reason behind that ?? 😁😁
@rishi680
@rishi680 4 жыл бұрын
It help for *Gate preparation*
@sherajr
@sherajr 4 жыл бұрын
Question: If A sends message to B by encrypting it with a private key and B can decrypt it with a public key. Can't anyone decrypt it, because B's key is public and can be seen by everyone?
@AkashKumar-op7cu
@AkashKumar-op7cu 2 жыл бұрын
I have also same question
@sherajr
@sherajr 2 жыл бұрын
@@AkashKumar-op7cu after looking over my question, I think the answer is that you don't encrypt with a private key, you encrypt with the public key and decrypt with the private key.
@AdityaKumar-cc7uw
@AdityaKumar-cc7uw 4 жыл бұрын
You are awesome sir 😋😋😋
@pavithrasree4303
@pavithrasree4303 6 жыл бұрын
Ur way of explanation is awesome sir...please make videos on data structures sir
@ashwanikr9561
@ashwanikr9561 6 жыл бұрын
Thanks Sir for your video which always be helpful to us....
@AbhishekSingh-tz3uv
@AbhishekSingh-tz3uv 3 жыл бұрын
Wonderful explaination!
@girishparameswaran6699
@girishparameswaran6699 5 жыл бұрын
In the example of Assymetric Cryptography A node encrypts the message with B public key and B node decrypts with B private key. Can you please explain why we encrypting with receivers public key not using the own public Key i.e A public key.
@rajsahu3136
@rajsahu3136 4 жыл бұрын
Beautiful Explanations, Loved it
@farbodalinaghian5791
@farbodalinaghian5791 4 жыл бұрын
So every node has to keep a packet full of other node's Public Key?? What's the advantage over Symmetric Key?
@dahlialoris1815
@dahlialoris1815 4 жыл бұрын
Utopia the most secure and secure system in the world!
@abiramiparanjothi4747
@abiramiparanjothi4747 4 жыл бұрын
Can u plz provide cyber security videos
@vishalvala4408
@vishalvala4408 6 жыл бұрын
Thank you sir for the series Keep it up
@sindhubasavanna1927
@sindhubasavanna1927 5 жыл бұрын
Thanks for the fantastic video sir!!!!!!!!!!!!!!!!
@saurav123singh
@saurav123singh 4 жыл бұрын
I have a doubt in asymmetric key concept :- How will B know that the msg was sent by A only it could have been sent by C also. How does B get to know who sent him the msg ?
@saurav123singh
@saurav123singh 4 жыл бұрын
Got it i just saw your next video thanks.
@bilalsayeed2396
@bilalsayeed2396 3 жыл бұрын
Amazing
@sachin_suthar
@sachin_suthar 4 жыл бұрын
Thanks for the informative video. Keep it up..
@JK92007
@JK92007 6 жыл бұрын
Very nice sir.....👌👌yr always awesome.....
@rakeshgoswami1784
@rakeshgoswami1784 5 жыл бұрын
but sir in asymmetric key cryptography how the B will know which key is used to encrypt message?
@koti2547
@koti2547 5 жыл бұрын
Super
@nidhisharma-el8lj
@nidhisharma-el8lj 5 жыл бұрын
Nicely explained
@mdjahidulislam9205
@mdjahidulislam9205 5 жыл бұрын
Thanks
@KremsonKhan
@KremsonKhan 4 жыл бұрын
nice video the concept or logic is so simple once u understand it lol
@rambabunakanamoni8927
@rambabunakanamoni8927 6 жыл бұрын
Sir which is best to get a job java or JavaScript.why I am asking this because in previous videos you said that now with JavaScript we can develop everything.i am new to programming.so please tell me which programming language I have to learn.make a video on this
@chethanprabhu4475
@chethanprabhu4475 6 жыл бұрын
As a beginner go for java..once u get a job as java developer..then study JavaScript. You can try 2nd job as JavaScript developer. Im telling this because as a fresher java jobs are way more than JavaScript :)
@leonardoobay500
@leonardoobay500 6 жыл бұрын
Do you have any more crypto videos?
@mahendrapanchal301
@mahendrapanchal301 6 жыл бұрын
Awesome.. 👌👌
@parihar373
@parihar373 5 жыл бұрын
What happens? if A encrypt cipher text with his private key and sends to B. How will B decrypt the Text. which key B will use
@Telusko
@Telusko 5 жыл бұрын
A's public key
@gouravinsan1339
@gouravinsan1339 6 жыл бұрын
Gr8 sir
@mineshjariwala209
@mineshjariwala209 6 жыл бұрын
Got it
@rakshitks7850
@rakshitks7850 6 жыл бұрын
Not clear how is he(B) able to decrypt using his private key since the message is encrypted using public key of B and private key of A....? B is able to unlock the layer 1 of the message using public key he has ....but how can he decrypt the message locked using private key of A?
@prajeeshprp941
@prajeeshprp941 6 жыл бұрын
'A' doesn't use its public key at all to send a file to B A uses B's public key alone to encrypt and then B uses B's private key to decrypt. Only B knows it's private key , and therefore no others can decrypt
@rakshitks7850
@rakshitks7850 6 жыл бұрын
@@prajeeshprp941 the man in the middle will be able to decrypt it because everyone has B s public key and only one lock..... Could you explain now? I am half satisfied with your answer Thanks in advance
@prajeeshprp941
@prajeeshprp941 6 жыл бұрын
@@rakshitks7850 If public key of a receiver is used to encrypt , private key of the reciever is needed to decrypt . so A sends the msg with B's public key , that msg can only be decrypted using B's private key . private keys are not public so only B will be able to decrypt. man in middle has B's public key but not B's private key .
@saikrishnareddy3485
@saikrishnareddy3485 6 жыл бұрын
Watch again....A never uses it's private key for encryption...it uses B's public key and B uses it's private key for decryption...
@MunnaKumar-gf2vr
@MunnaKumar-gf2vr 6 жыл бұрын
Sir but how the two computer get the keys
@MunnaKumar-gf2vr
@MunnaKumar-gf2vr 5 жыл бұрын
Ok one node can get the public key of other node but how it can get that key
@DrShafiaSayed
@DrShafiaSayed 11 ай бұрын
Itna achha koi kaise padha sakta hai?😮
@sivakrishnanj9544
@sivakrishnanj9544 5 жыл бұрын
Key ??
@crazyshala4571
@crazyshala4571 6 жыл бұрын
Sir make video on what level of maths are required in machine learning and data science and where from can learn it .......
@mysticlunala8020
@mysticlunala8020 3 жыл бұрын
What're you doing right now?
@GenerativeAI-AI
@GenerativeAI-AI 2 жыл бұрын
Search in KZbin " unfold data science"...you will get real data science concept here
@kranthikumar1501
@kranthikumar1501 6 жыл бұрын
awesome video
@pranjalgupta9427
@pranjalgupta9427 4 жыл бұрын
Nice explaination
@saddamahmad2310
@saddamahmad2310 6 жыл бұрын
thank you very much sir for this video
@vidyakrishnan1757
@vidyakrishnan1757 2 жыл бұрын
Wowzer ! Your videos are amazing ! I love that you leave us on a cliff at the end .... like in a netflix show so i definitely watch the next, I am binge watching this playlist right now !
@careerside4005
@careerside4005 4 жыл бұрын
Sir, You are awesome..
@padmasrivastava3782
@padmasrivastava3782 4 жыл бұрын
Sir if A uses public keys then A should have 100 public keys i.e Public key of B, public key of C and so on . In short A should have 100 public keys to share data with 100 people ??
@siddharthnandava
@siddharthnandava 4 жыл бұрын
sir, in today's world we know that machine learning is the fastest-growing technology and everyone wants to learn it. so please if you make a series on how to get started in machine learning and how to be an expert in machine learning it will be very great for us. so I request you to make a series on it. once again thanks for delivering useful content
@shivamnavthar5851
@shivamnavthar5851 3 жыл бұрын
How will one encrypt with private key and decrypt with public key?
@pratikgupta7373
@pratikgupta7373 6 жыл бұрын
Content and video quality is awesome
@kranthikumar1501
@kranthikumar1501 6 жыл бұрын
Waiting for more on blockchain
@siddharthnandava
@siddharthnandava 4 жыл бұрын
hello sir, you are too good. thanks for creating amazing content for us.
@anshupanda2149
@anshupanda2149 6 жыл бұрын
Sir is Python series over ??
@Mahesh-gq7fm
@Mahesh-gq7fm 4 жыл бұрын
Very superb tutorial. great
@kartikpandey2685
@kartikpandey2685 5 жыл бұрын
U ARE AWESOME
@sandeepbadimili9742
@sandeepbadimili9742 6 жыл бұрын
Video editing too good? What's the software ?
@NavinReddyJava
@NavinReddyJava 5 жыл бұрын
Camtasia
@rakeshsanthapuri9933
@rakeshsanthapuri9933 5 жыл бұрын
Omg
@nktt9351
@nktt9351 6 жыл бұрын
Sir but again one needs to know public key of everyone which means that you need to store a bunch of keys one for every user
@nktt9351
@nktt9351 6 жыл бұрын
@@Telusko Thank you sir.
@karanagrawal1726
@karanagrawal1726 5 жыл бұрын
Sir how private encryption and public decryption will be secure?
@madhanvb7222
@madhanvb7222 6 жыл бұрын
Naveen ready if possible do video series on full stack devloper !
@charlesralph9743
@charlesralph9743 4 жыл бұрын
Please is it types of encryption or I am confused since I know types of cryptography are Block Cihers and Stream Ciphers.
@uoftosgroup2595
@uoftosgroup2595 5 жыл бұрын
So in Asymmetric Cryptography, we have double number of keys. The public key for the other nodes is also present and not to mention the private keys. In that way, how is it better than symmetric cryptography.
@Bengal_Tiger33
@Bengal_Tiger33 6 жыл бұрын
I can't understand, how a message will be decrypted a encrypted signal, when both keys are different
@anushan1668
@anushan1668 6 жыл бұрын
Hi can u tell me how to create custom temperature data in python
@chittarilokesh5838
@chittarilokesh5838 5 жыл бұрын
Very happy and i am glad to see you on blockchain and making clarity videos with wonderful explanation. Thank you so much sir for this videos........
@shankarmagarde8171
@shankarmagarde8171 3 жыл бұрын
Thank you soo much sir... You are really greate.... Me aap ke videos dekhta hu.... Aap visvas nhi krogye ek video 4-5 baar dekta hu 🤭😂😂 or mane aap ki video dekh clg me mari presentation di..... Andy presentation is the best in whole clg.... 🤩🤩👍 Sir... Thank you so much....
@akshaydevh
@akshaydevh 6 жыл бұрын
awsome Explanation, and please do a video on key pair generation
@amitcshah
@amitcshah 4 жыл бұрын
I request you one video on seed key. how does it work in blockchain?
@srinivasreddyk3457
@srinivasreddyk3457 4 жыл бұрын
Excellent Navin
@lindatsabedze3122
@lindatsabedze3122 5 жыл бұрын
what if A want to send a message to B and C at the same time?
@harsiddhisinghdev4650
@harsiddhisinghdev4650 6 жыл бұрын
clear concept..
@arindam_i_am
@arindam_i_am 5 жыл бұрын
Awesome sir !!!
@meena7246
@meena7246 6 жыл бұрын
It was clear
@rajeevsinghrajput6752
@rajeevsinghrajput6752 6 жыл бұрын
thanks sir
Digital Signature | Blockchain
3:37
Telusko
Рет қаралды 100 М.
Cryptography | Blockchain
5:39
Telusko
Рет қаралды 127 М.
Do you choose Inside Out 2 or The Amazing World of Gumball? 🤔
00:19
Every parent is like this ❤️💚💚💜💙
00:10
Like Asiya
Рет қаралды 12 МЛН
7 Cryptography Concepts EVERY Developer Should Know
11:55
Fireship
Рет қаралды 1,3 МЛН
Why Blockchain? | Prerequisites
7:34
Telusko
Рет қаралды 203 М.
CPU vs GPU vs TPU vs DPU vs QPU
8:25
Fireship
Рет қаралды 1,8 МЛН
Cryptography and Digital Signature
11:32
Telusko
Рет қаралды 9 М.
What is a Protocol? (Deepdive)
18:14
LiveOverflow
Рет қаралды 172 М.
Think Fast, Talk Smart: Communication Techniques
58:20
Stanford Graduate School of Business
Рет қаралды 40 МЛН
What is Blockchain?
9:49
Telusko
Рет қаралды 58 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 121 М.