v12044gd0000d45bvhvog65kjf0jh190
Apr 23, 2026 19:41
· 0:55
· English
· Whisper Turbo
· 1 speakers
Այս տեքստը կավարտվի 9 օրեր
Ավելացնել մշտական պահպանման համար →
Ցույց տալ միայն
0:00
S…
Speaker 1 (v12044gd0000d45bvhvog65kjf0jh190)
you're trying to break into cyber security one of the most important concepts you need to know is encryption there are two types of encryption symmetric encryption and asymmetric encryption and the first one symmetric encryption works like this oh one person has a secret key to encrypt the message they send that message over to the other person who uses the exact same secret key to decrypt the message this type of encryption is way faster than asymmetric encryption but the issue is if one person leaks their secret key then anyone can read the message the second type of encryption is asymmetric encryption and this one's a lot slower than the first one because both people are not using the same key anymore this one gets a little more complicated
0:29
S…
Speaker 1 (v12044gd0000d45bvhvog65kjf0jh190)
because both people have a public key and a private key. For the public key, everyone can see it, and the private key is the one they cannot show anyone. So if person A wants to send a message to person B, person A is going to use person B's public key to encrypt the message, so that only person B's private key can decrypt the message. So even though asymmetric encryption is a lot slower than symmetric encryption, it's a lot more secure. Hope this happened, be sure to follow for more.
This transcript was generated by AI (automatic speech recognition). May contain errors — verify against the original audio for critical use. AI policy
Հոդված
Սեղմեք «Սահմանել» այս տեքստի AI- ի ամփոփում ստանալու համար։
Համադրում...
Հարցրեք AI-ին այս տեքստի մասին
Ձեր հարցը այս տեքստի մասին — AI-ն կգտնի հարմար հատվածներ և կպատասխանի։