v12044gd0000d45bvhvog65kjf0jh190
Apr 23, 2026 19:41
· 0:55
· English
· Whisper Turbo
· 1 speakers
이 트랜스크립트는 다음에 만료됩니다. 9 며칠이요
영구 저장소 업그레이드 →
보이는 것만
0:00
S…
Speaker 1 (v12044gd0000d45bvhvog65kjf0jh190)
you're trying to break into cyber security one of the most important concepts you need to know is encryption there are two types of encryption symmetric encryption and asymmetric encryption and the first one symmetric encryption works like this oh one person has a secret key to encrypt the message they send that message over to the other person who uses the exact same secret key to decrypt the message this type of encryption is way faster than asymmetric encryption but the issue is if one person leaks their secret key then anyone can read the message the second type of encryption is asymmetric encryption and this one's a lot slower than the first one because both people are not using the same key anymore this one gets a little more complicated
0:29
S…
Speaker 1 (v12044gd0000d45bvhvog65kjf0jh190)
because both people have a public key and a private key. For the public key, everyone can see it, and the private key is the one they cannot show anyone. So if person A wants to send a message to person B, person A is going to use person B's public key to encrypt the message, so that only person B's private key can decrypt the message. So even though asymmetric encryption is a lot slower than symmetric encryption, it's a lot more secure. Hope this happened, be sure to follow for more.
This transcript was generated by AI (automatic speech recognition). May contain errors — verify against the original audio for critical use. AI policy
요약
요약 을 클릭하여 이 녹음의 AI 요약을 생성합니다.
요약...
이 녹음에 대해 AI에게 물어보기
이 녹음에 대해 질문하십시오 — AI는 관련 섹션을 찾아 답변합니다.