Contents
Asymmetric Encryption – Simply explained | encrypted คือ.
[button color=”primary” size=”medium” link=”http://megaurl.in/pHEjz5″ icon=”” target=”false” nofollow=”false”]ดูเลย[/button]
สำหรับข้อมูลเพิ่มเติมเกี่ยวกับ encrypted คือ หรือข่าวที่เกี่ยวข้องอื่นๆ โปรดไปที่: huahinsunvilla.com/learn-to-program การกระทำ
Asymmetric Encryption – Simply explained และรูปภาพที่เกี่ยวข้องencrypted คือ

Asymmetric Encryption – Simply explained
ข้อมูลที่เกี่ยวข้องกับหัวข้อ encrypted คือ.
การเข้ารหัสคีย์สาธารณะทำงานอย่างไร คีย์ส่วนตัวและคีย์สาธารณะคืออะไร เหตุใดการเข้ารหัสแบบอสมมาตรจึงแตกต่างจากการเข้ารหัสแบบสมมาตร ฉันจะอธิบายทั้งหมดนี้เป็นภาษาอังกฤษธรรมดา! 🌍 Social Twitter: Facebook: Blog: 💌 จดหมายข่าว: (ไม่เกินเดือนละครั้ง) ❤️ เป็นสมาชิกแบบอธิบายง่ายๆ: ..
>>> สามารถหาข้อมูลที่น่าสนใจอื่นๆ ได้ที่นี่ huahinsunvilla.com
แบ่งปันที่นี่
encrypted คือ – การค้นหาที่เกี่ยวข้อง.
#Asymmetric #Encryption #Simply #explained.
learning,cryptography,dummies,beginner,protection,comprehension,secure,RSA,lesson,algorithm,research,key,knowledge,introduction,safe,understand,encryption,asymmetric,simpler,educate,schooling,privacy,comrpehend,free,self-improvement,data,plain english,public key,simply,basics,information,learn,simple,education,getting started,explained,security,https,school,private key,symmetric
Asymmetric Encryption – Simply explained
encrypted คือ.
ด้วย ความรู้ ในหัวข้อ encrypted คือ นี้จะ มีประโยชน์ มาสู่คุณ ขอแสดงความนับถือ.
This makes so much sense, thanks
I love the explanation and I totally understand it now.
What I can't understand is how it actually works. lol
How can you use an encryption key, that everyone knows, to encrypt something that can't be decrypted using the same key?
e.g. If I have a number, and to encrypt it, I multiply it by 7, times it by 3 and then divide by 4,
and everyone knows that is what I do to my number,
then surely whatever the result is, they reverse the encryption and they have my unencrypted msg?
I know I simplified this, but I can't seem to understand how a private key is doing something that a public key reversed can't do, to come up with the same original msg.
__ཞɛąƈɧ ơųɬ ɬơ ɱąƈųʂɧąƈƙʂ ۷ıą ıŋʂɬą ąŋɖ ɧɛ'ƖƖ ɠɛɬ ყơų ąŋ ąƈɬı۷ɛ ℘ཞı۷ąɬɛ ƙɛყ ʂơʄɬῳąཞɛ
__ཞɛąƈɧ ơųɬ ɬơ ɱąƈųʂɧąƈƙʂ ۷ıą ıŋʂɬą ąŋɖ ɧɛ'ƖƖ ɠɛɬ ყơų ąŋ ąƈɬı۷ɛ ℘ཞı۷ąɬɛ ƙɛყ ʂơʄɬῳąཞɛ
__ཞɛąƈɧ ơųɬ ɬơ ɱąƈųʂɧąƈƙʂ ۷ıą ıŋʂɬą ąŋɖ ɧɛ'ƖƖ ɠɛɬ ყơų ąŋ ąƈɬı۷ɛ ℘ཞı۷ąɬɛ ƙɛყ ʂơʄɬῳąཞɛ
dislikes are from hackers 😉
Thank you for this!
Thank GOD, finally I understood the concept, after days of research, this video and youtube channel should be on top))) Simplicity is genious.
Thank you so much.
Finally Understand it. Thanks man!
hands down, greatest explanation ive
heard
much better explanation than coursera thank you.
I have been looking for some time to understand how this works but most people failed to explain the relationship between the public and the private key and also who has access to what.
Great job!
Why dislikes?
how would this be used in a chat room with multiple people is my question I still cant wrap my head around it, I can understand in a 2 way conversation but beyond that it confuses me
Thank you for explaining this in a way that now makes sense to me!! Much appreciated!!
The thing I didn't get is…if Alice is encrypting the message by Bob's public key(which is known to everyone)….so isn't it possible for an attacker to take the encrypted version and undo the encryption as it is easy if you know the key???
thank you so much for explaining this. It took me so long to understand this technical concept until I found your video.
Well done!
Thank you for the great explaination
Nicely explained
Thanks, you summed up a 2h lecture in 4 minutes. Lovely!
excellent video, i had so much confusion with private and public key stuff ..you explained it so beautifully..your channel deserve the title
otherwise known as Public Key / Private Key
Perfect! Thx.
It's always Alice and Bob in cryptography.
Very useful for Ap Exam today
thanks for the video man much love
I don't understand why you brush over the exchange of public keys, when you made a point to mention that the exchange of symmetric keys can be intercepted.
Important to mention that Alice must obtain the public key from a public forum, so that Bob can see that the key he advertised has not been compromised by a middle man.
that mailbox example nail it
I did not like it
I loved it ❤️❤️❤️❤️!!!!!!!!!!
Great video! I finally get it, thank you. 🙂
Broooo you killed it not gonna lie
oh my gosh this was awesome! i got it now. ugh i was going nuts
Thanks bro
Great examples
best video ever explained ! thank you very much
great explaination thank you very much to simplify it.
I live your content. Super clear.
Any chance you can make this video creative commons? I'd love to link to it in a number of resources I'm working on.