How does public key cryptography work Gary explains

How does public key cryptography work  Gary explains

How keys are distributed is vital to any encryption system. Find out how to do it with the DiffieHellman key exchange and using public-key cryptography. Find out more: https://goo.gl/qI6jxZ

Download the AndroidAuthority App: https://play.google.com/store/apps/details?id=com.androidauthority.app

Subscribe to our YouTube channel: http://www.youtube.com/subscription_center?add_user=androidauthority
—————————————————-
Stay connected to Android Authority:
– http://www.androidauthority.com
– http://google.com/+androidauthority
– http://facebook.com/androidauthority/
– http://twitter.com/androidauth/
– http://instagram.com/androidauthority/

Follow the Team:
Josh Vergara: https://plus.google.com/+JoshuaVergara
Joe Hindy: https://plus.google.com/+JosephHindy
Lanh Nguyen: https://plus.google.com/+LanhNguyenFilms
Jayce Broda: https://plus.google.com/+JayceBroda
Gary Sims: https://plus.google.com/+GarySims
Kris Carlon: http://plus.google.com/+KrisCarlon
Nirave Gondhia: http://plus.google.com/+NiraveG
John Velasco: http://plus.google.com/+JohnVelasco
Bailey Stein: http://plus.google.com/+BaileyStein1

source

Share this post

31 thoughts on “How does public key cryptography work Gary explains

  1. Ok what i'm still tripping on (Using Alice and Bob in my example) – I get that Bob's public and private key are mathematically linked.  However if Alice is across the globe how is her public and private linked to Bob.  So as I understand it, Bob will use his public key to encrypt a message and send to Alice which she uses  her private key to decrypt.   OK i'm fine with that. But how is Alices private key linked to Bobs key?     If Bob wants to send another msg, say to Tom – again he uses his public key to encrypt.  Tom uses his private to decrypt – how is Tom's key linked?  I'm missing something super basic here.  Any help appreciated

  2. Amazing explanation!. s the document with the detailed explanation still available somewhere? the link in the description unfortunately doesn't work (anymore).

  3. what are some common use cases for this kind of cryptography? Is Diffie-Hellman the most widely used by all encryption applications?

  4. Business Opportunity in Ruvol

    I have invented a Board Game [still unpublished and not yet out in the market] that I believe is guaranteed to be as challenging and exciting as CHESS. I called it “RUVOL.”

    It is my hope that one day Ruvol may surpass chess as the “Number One Board Game in the World.”

    The weakness of chess is it always starts in fixed positions that the opening moves become “memorizable.” In fact, not a few have so mastered the moves that they can play against their opponents “blindfolded.” It is for this very reason that the great Bobby Fischer introduced his so-called “Fischer Random Chess,” where the starting position of the pieces is “randomized” to make the memorization of openings impracticable. Fortunately, it is also for this reason that I invented Ruvol where “every game” has been calculated to be a challenging one to play.

    HOW IS RUVOL PLAYED and HOW YOU CAN MONETIZE IT?

    I detailed everything in my YouTube video. Here is the link: https://www.youtube.com/watch?v=jcqth0m3-R0

    BIG MONEY POTENTIAL IN RUVOL!

    It is worthwhile to note that the people who play chess will be the same people who will play Ruvol. In my Google search, I learned there are around 800 million chess players in the world. Even just a small percentage of these 800 million is good enough to earn big money from Ruvol either as an ONLINE GAME BUSINESS or as a PHYSICAL PRODUCT DISTRIBUTOR.

    You may contact me at: rodolfovitangcol@gmail.com.

    Thanks and God bless!

    RODOLFO MARTIN VITANGCOL

    The Ruvol Inventor

  5. Brilliant explanation. 👍👍👍

  6. When he said: "Here comes the magic". It truly was a magic, cause I didn't have clue how he did it!? 🙂

    Great Video and the content! It took me 2 attempts to unterstand everything, and when someone asked to explain how Public and private key concept work I was stuck.
    My answer was: "check it on YouTube, then we can talk about it"
    Thanks for the video!!!!!!!!!!!

  7. All thanks to LUNAPRY05 on lnsta who unlock my non spendable btc to spendable with an ACTIVE PRIVATE KEY… he’s a pr0

  8. All thanks to LUNAPRY05 on lnsta who unlock my non spendable btc to spendable with an ACTIVE PRIVATE KEY… he’s a pr0

  9. All thanks to LUNAPRY05 on lnsta who unlock my non spendable btc to spendable with an ACTIVE PRIVATE KEY… he’s a pr0

  10. All thanks to LUNAPRY05 on lnsta who unlock my non spendable btc to spendable with an ACTIVE PRIVATE KEY… he’s a pr0

  11. Best explanation on this subject ever. I keep coming back for another look, change the numbers for ones I chose, do the math and find it always works. Trouble is, I still don't know for sure how! 😜 Thanks Garry.

Comments are closed.