In this video we will discuss:
    Symmetric Key Cryptography
    Asymmetric Key Cryptography
    Encryption
    Decryption

    #blockchain
    #cryptography
    #symmetric key cryptography
    #asymmetric key cryptography

    Editing Monitors :
    https://amzn.to/2RfKWgL
    https://amzn.to/2Q665JW
    https://amzn.to/2OUP21a.

    Check out our website: http://www.telusko.com

    Follow Telusko on Twitter: https://twitter.com/navinreddy20

    Follow on Facebook:
    Telusko : https://www.facebook.com/teluskolearn…
    Navin Reddy : https://www.facebook.com/navintelusko

    Follow Navin Reddy on Instagram: https://www.instagram.com/navinreddy20

    Subscribe to our other channel:
    Navin Reddy : https://www.youtube.com/channel/UCxmk…
    Telusko Hindi :
    https://www.youtube.com/channel/UCitz…

    Donation:
    PayPal Id : navinreddy20
    Patreon : navinreddy20
    http://www.telusko.com/contactus

    7:29 left activities on blockchain in this video we’ll talk about types of cryptography so basically that two types the first one is symmetric key cryptography the second one is all symmetric key cryptography now as names such as the first one should be having symmetric key and second one will have

    Two different keys right so let’s start the first one so let’s say assume we have a and B now a want to send a message to B what a will do a will simply encrypt the message using a key so let’s say that key is k1 so using a

    Key k1 a will encrypt a message that message will go to be the in fact even B cannot read that message because it is encrypted format so B has to decrypt it now which key B will be using of course the same key right we just gave one so a

    And B both will have the same key which is k1 that’s a different question how will they share this key with each other of course not a network right at the end we want them to have the same key which is k1 so now let’s say we have

    One more we have a and C so of course we have be there so if a want to send a message to see now what above key a should use should a use k1 of course not right because b has k1 so if a want to

    Send a message to C or we should not be interpreted by anyone else it will use a different key now and let’s say we will leave that as k2 so between a and B we have k1 between a and C we have k2 let’s say B and C won’t attract what key they

    Will use will they use k1 of course not will they use k2 of course not they will need a different key which is k3 whatever says as the number of user increases we have to increase the number of keys and it will be difficult to manage one example in my pocket I have

    To carry hundred keys because if I want to interact with hundred people I have to manage all the keys we don’t want that so that’s one of the topic of symmetric let’s move towards our symmetric asymmetry cryptograph they also known as public key cryptography so basically we use two

    Different keys here one is private key and one is public key so what is this public key and private key as name suggests everyone will have two keys let’s say I want to send a message to BP send a message to C’s so on this network we have multiple nodes each node will

    Have two keys the private key and a public key so a will have its own private can public key B will have his own ramekin public key C will have its own private can public key if you want to encrypt and decrypt the message you

    Have to use both the case not one so to encrypt a message you can use public key but to decrypt the message you have to use private key if you are using a private key to encrypt the message then you have to use a public key to decrypt

    A message so you have to use both the key the same time you can’t simply say I will Inc it with public can decode public key that’s not possible so we have to use both so if you are encrypting with private you came with public here if you’re encrypting with

    Public every ticket with private how do you achieve security here so let’s say if a want to send a message to B as we know the public key of B is known to everyone public right so of course a will also know the public key of B so

    What able do a will encrypt the message with B’s public key and then that message goes to B of course everyone else on the network can see that message the encrypted message but no one can decrypt it you know why because that message will be decrypted only with B’s

    Private key and who has B’s private key of course only be the private right so you will know your private key and everyone else will know your public key so that’s how we do it so how do I achieve security enter the message with public key and to give the message with

    Private key let’s do it again so let’s say C want to send a message to D so which public key si will use so si will use a public key of D so C will encrypt the message with this public key and D will decrypt the message with its

    Own private key so that’s how this cryptography works but now the question is what is that key is is it a number is it the text that we’ll discuss in a separate video we talked about exactly turkey so that’s it from this video that we are talked about types of

    Cryptography the injunction will be using the public key cryptography we use that so yeah that’s it on this video I hope you enjoyed that in coming section and this is that we are not done yet bye

    45 Comments

    1. In the example of Assymetric Cryptography A node encrypts the message with B public key and B node decrypts with B private key.

      Can you please explain why we encrypting with receivers public key not using the own public Key i.e A public key.

    2. So in Asymmetric Cryptography, we have double number of keys. The public key for the other nodes is also present and not to mention the private keys. In that way, how is it better than symmetric cryptography.

    3. sir, in today's world we know that machine learning is the fastest-growing technology and everyone wants to learn it. so please if you make a series on how to get started in machine learning and how to be an expert in machine learning it will be very great for us. so I request you to make a series on it.
      once again thanks for delivering useful content

    4. I have a doubt in asymmetric key concept :-
      How will B know that the msg was sent by A only it could have been sent by C also.
      How does B get to know who sent him the msg ?

    5. Sir if A uses public keys then A should have 100 public keys i.e
      Public key of B, public key of C and so on . In short A should have 100 public keys to share data with 100 people ??

    6. thank you sir,but i have a question..u said that in asymmetric key cryptography, we may encrypt using private key and decrypt using public key right? but decryption using public key is not secured right …i mean public key of B is known to C also…so how will that be secured???you didn't give example for[encryption using private key and decryption using public key] but you gave example only for[encryption using public key and decryption using private key]…so can you kindly explain me the second case where encryption by private key and decryption by public key

    7. Question:
      If A sends message to B by encrypting it with a private key and B can decrypt it with a public key. Can't anyone decrypt it, because B's key is public and can be seen by everyone?

    8. Thank you soo much sir… You are really greate….

      Me aap ke videos dekhta hu…. Aap visvas nhi krogye ek video 4-5 baar dekta hu 🤭😂😂 or mane aap ki video dekh clg me mari presentation di….. Andy presentation is the best in whole clg…. 🤩🤩👍 Sir… Thank you so much….

    9. Wowzer ! Your videos are amazing ! I love that you leave us on a cliff at the end …. like in a netflix show so i definitely watch the next, I am binge watching this playlist right now !

    10. symmetric key cryptography: same key is used to encrypt and decrypt.
      asymmetric key cryptography: everyone has 2 keys,public key and private key. message is encrypted using public key and decrypted using private key(or vice versa). everyone's private key and public key is different. but public key is known to everyone, and private key isn't .

    11. sir can you please explain — Introduction to Blockchain, Key vocabulary while discussing Blockchain, Distinction between databases and Blockchain

      Explaining distributed ledger Blockchain ecosystem. Transformation in trading units Cryptography and Cryptocurrency,

      Anonymity and Pseudonymity in Cryptocurrencies, Digital Signatures, Hash Codes, Distributed networks.

      Bitcoin and its history. Selling Bitcoins, Bitcoin transactions, How Bitcoin transactions work, What happens in case of

      invalid transactions, Parameters that invalidate the transactions, Scripting language in Bitcoin, Applications of Bitcoin

      script Nodes and network of Bitcoin, Various roles you can play in Bitcoin ecosystem.

      Introduction, Purpose of mining, Algorithm used in mining, Mining hardware, How does Bitcoin mining work? Bitcoin

      mining pools How cloud mining of Bitcoin works? Mining incentives, Security and centralizations.

      Introduction, Ethereum, Ether, use of Ethereum, The Ethereum ecosystem, DApps and DAOs, How Ethereum mining

      works? Learning Solidity: Contract classes, functions, and conditionals, Inheritance & abstract contracts, Libraries, Types

      & optimization of Ether, Global variables, Debugging, Future of Ethereum.

      Introduction to Hyperledger, Hyperledger Architecture, Consensus, Consensus & its interaction with architectural layers,

      Application programming interface, Application model, Network topology, Exploring Hyperledger frameworks.
      please explain these topics..

    Leave A Reply
    Share via