48 Comments

  1. GeassEnabler
    October 7, 2019 @ 1:34 am

    Okay but if you never have any initial contact how does the other person get your public key?

    Reply

  2. Aditya Bhat
    October 7, 2019 @ 1:34 am

    Thank you.. the concept was really well explained 🙂

    Reply

  3. Praise The Masculine Flames
    October 7, 2019 @ 1:34 am

    So many videos skip over the critically important part about*exchanging* public keys and using that to encrypt

    Reply

  4. Ryan Samuel
    October 7, 2019 @ 1:34 am

    Thanks a lot this helped me

    Reply

  5. Jeffrey Lebowski
    October 7, 2019 @ 1:34 am

    This "explaination" leaves out THE crucial detail, of why it is not possible to decrypt the message with the public key, that was used to encrypt it… So its kind of useless tbh.

    Reply

  6. luigui manuel balarezo buleje
    October 7, 2019 @ 1:34 am

    Buena explicación!.

    Reply

  7. Hanzala Jamash
    October 7, 2019 @ 1:34 am

    Thank you very well explained

    Reply

  8. abel ashenafi
    October 7, 2019 @ 1:34 am

    Video truly worth watching. Thanks for the vivid explanation

    Reply

  9. Alyssa Young
    October 7, 2019 @ 1:34 am

    thanks for helping me understand this concept!

    Reply

  10. Thith Thin
    October 7, 2019 @ 1:34 am

    It's so nice. I like it. Ohh! can I get your white paper about this one? Because I would like to do more research about it.

    Reply

  11. Robbie Anderson
    October 7, 2019 @ 1:34 am

    Legend.

    Reply

  12. Joshva Nathan
    October 7, 2019 @ 1:34 am

    Perfect explain !! Thank you for your effort

    Reply

  13. Josep Maria Vila
    October 7, 2019 @ 1:34 am

    But you should mention Alice signature is important in order to Bob knowing that the message actually comes from Alice. The way you explain it Bob can't be certain that Alice sent the message, it could have been anybody.

    Reply

  14. Prajwal Bhoite
    October 7, 2019 @ 1:34 am

    Nice 1

    Reply

  15. Sudhanshu Pal
    October 7, 2019 @ 1:34 am

    Thanks a lot Sir clearly understood the whole concept !!!

    Reply

  16. Fatima Elharouch
    October 7, 2019 @ 1:34 am

    Very clear Thank you so much

    Reply

  17. kuyaC
    October 7, 2019 @ 1:34 am

    First explanation that I understand! Until now I didn't know that you would use the public key of the other person, and not your own, to encrypt, now everything seems so easy, thank you!

    Reply

  18. NAL Lilley
    October 7, 2019 @ 1:34 am

    Beautifully explained. UK Computer Science teacher.

    Reply

  19. Shivaji Chalise
    October 7, 2019 @ 1:34 am

    Perfect! Thanks brother.

    Reply

  20. George Andrews
    October 7, 2019 @ 1:34 am

    Not using a "key" altogether is even better. Any key of either computer is subject to hacking. The software that generates the keys are hackable as well. That's why I use enigmato thank you very much :o)

    Reply

  21. A P
    October 7, 2019 @ 1:34 am

    Awesome explanation. Please cover more.

    Reply

  22. Chamara Jeewantha
    October 7, 2019 @ 1:34 am

    Thank you for shearing your knowledge

    Reply

  23. Леонид Туркевич
    October 7, 2019 @ 1:34 am

    This is all cool, of course, but what about the MITM attack?
    I mean the following case:
    The stage when Bob and Alice exchange public keys, the hacker intervenes and picks up their keys; generates two pairs of public and private keys; then he replaces the public keys of Bob and Alice with his own public keys, too, he keeps in his memory.
    Thus, he has full control over their correspondence! Moreover, he can change the messages by signing them with real public keys and Bob and Alice will not even guess about it.
    How can I protect my system from this?

    Reply

  24. Jordan Darlington
    October 7, 2019 @ 1:34 am

    epic

    Reply

  25. S Arunkumar
    October 7, 2019 @ 1:34 am

    very Simply Explained – Savjee

    Reply

  26. Jagadish Talluri
    October 7, 2019 @ 1:34 am

    Simple and best explanation. Period.

    Reply

  27. Xbro Xbro
    October 7, 2019 @ 1:34 am

    can u decrypt the data that you encrypted with the public key, by reversing the encryption progress.

    Reply

  28. Durga R
    October 7, 2019 @ 1:34 am

    thank you so much sir.. best one out there for this concept with better understanding:)))

    Reply

  29. Jash Bangdiwala
    October 7, 2019 @ 1:34 am

    Finally understood what this means, great example about the postbox !

    Reply

  30. Nuzhat Tabassum
    October 7, 2019 @ 1:34 am

    thank you that was life changing

    Reply

  31. a a
    October 7, 2019 @ 1:34 am

    I came here for Alice and Bob.

    Reply

  32. Rasyid Al Faruqi
    October 7, 2019 @ 1:34 am

    how does a certificate authority has a role in asymmetric encryption?

    Reply

  33. Scorpion
    October 7, 2019 @ 1:34 am

    well make some videos about how to crack encryption keys

    Reply

  34. Private
    October 7, 2019 @ 1:34 am

    Shut up and take my private key!

    Reply

  35. Godly Child
    October 7, 2019 @ 1:34 am

    Fantastically explained! Thank you.

    Reply

  36. isaac omondi
    October 7, 2019 @ 1:34 am

    Simple yet very clear. Good job

    Reply

  37. Suhi Rao
    October 7, 2019 @ 1:34 am

    Thankyou 😀

    Reply

  38. wolfnight
    October 7, 2019 @ 1:34 am

    thank God… i finally understood…

    Reply

  39. BestGamesJustin
    October 7, 2019 @ 1:34 am

    good job, din t think it was so simple

    Reply

  40. karima makhlouf
    October 7, 2019 @ 1:34 am

    Really like the straightforward explanation !!

    Reply

  41. Anirudh Pathak
    October 7, 2019 @ 1:34 am

    The best and clearest description of public-private key cryptography I have seen so far!

    Reply

  42. Yiming Zhen
    October 7, 2019 @ 1:34 am

    Very clear thanks

    Reply

  43. Prosper gold
    October 7, 2019 @ 1:34 am

    clear

    Reply

  44. Sandro Montanaro
    October 7, 2019 @ 1:34 am

    thank you. finally someone who can explain

    Reply

  45. Voice IT
    October 7, 2019 @ 1:34 am

    the mailbox analogy is great, never understood the private key function

    Reply

  46. darkbrian '
    October 7, 2019 @ 1:34 am

    Alice got some nudes

    Reply

  47. Joe Haynes
    October 7, 2019 @ 1:34 am

    Watched three videos on symmetrical Encryption , only this one made sense to me , good video

    Reply

  48. VRH VENKATESH
    October 7, 2019 @ 1:34 am

    Great Explanation !!!!

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *