Symmetrical vs asymmetrical Encryption Pros and Cons by Example - Çift Dilli Altyazılar

Encryption is the process of scrambling data to protect personal files, secure communication, hide identities, and much, much, much more.
In this video, we will learn about the different types of encryptions.
We will talk about symmetric encryption,
asymmetric encryption, where are they used, what are they used, they used for the pros and cons of each one.
This is coming up.
If you're new to my channel, welcome.
My name is Hussein and this in this channel,
we discuss all sorts of software engineering by example so if you want to become a better software
engineering consider subscribing and hit that like button.
Well that's it let's just jump into the video guys so here's what we want to discuss in this
video and I want to I wanted to make a video
you about original about TLS to be honest but in order to talk about that
technology we really need to I didn't have any videos to talk about encryption to
begin with so here it goes right so this is what we're gonna talk about in
this video we're gonna talk about symmetric encryption let's enable this
beautiful pointer so we're gonna talk about symmetric encryption gonna then
talk about asymmetric encryption and and I'd like to think that this is
just called encryption that's the first thing that people came then this was invented for a reason.
Again, guys, in software engineering, we don't just make up something out of the blue, right?
There is always a for making up technology as a problem.
And we consult the geniuses to come up with algorithms to solve our problems.
right?
Symmetric, then we're going to discuss symmetric encryption, the pros and cons because everything in life had pros and cons.
asymmetric encryption their frozen codes which the advantage and disadvantage and then we're gonna up with a summary guys let's jump into it.
Encryption or symmetric encryption or might as well just call it classic encryption right so
encryption I will I have a file I have some novel that I've wrote right I have
a book I have some files let's set it on my computer I have a PDF,
I'm serving the web, and I don't want anybody to open these things.
I want to encrypt them so nobody can access those stuff.
Inter-encryption.
So this is exactly like real life guys.
So think of it like a safe box classically, right?
You have a safe box, you put your stuff in it, you use a key, you lock your safe, right?
With the key and then you're secured, right?
Go ahead and go secured.
And then what are you gonna do,
even with that actual key, physical, or just a pin code, if you go to a hotel or something, right?
So to open the safe, you're gonna supply the same key.
1, 2, 3, 4, very secure.
You your safe or just use the key.
Same with the door, right?
So the classical centuries, right?
So here's the same thing exactly.
Use same key, use the same code to encrypt and decrypt, that's the word to reverse the encryption.
So I have my novel here and I want to encrypt it, so I'm going to use a key, right?
This key is yellow.
I'm going to use it, encrypt my key, I get a bunch of garbage.
So if someone got hold of this, he opened my computer and sold this garbage and it doesn't mean anything.
Like they can't, they can do whatever they want with it, right?
Right, so I want to read it and edit my novel to, I don't know, add another chapter.
I decrypt it.
How do I decrypt it?
He's like the same key, right?
And thing of this key is like a, could be a phrase or a number, and then you use that to actually encrypt that.
And how it works is actually behind the scope of this video, right?
So essentially what it does like to take a bit and for each one.
right?
We go and mess with that.
We some arithmetic operation with every single byte to produce a corresponding thing.
All right, so that's the basic thing.
You encrypt it, you decrypt it, you get back your text.
Simple stuff, right?
Here are some examples of the symmetric encryptions, right?
And this is the most popular one.
This is very used now, nowadays EAS, advanced encryption standard.
And This is the original name of the Encryption Algorithm when the committee that is responsible for encryption told the people in 2000,
early 2000, says, hey guys, come up with a very secure encryption algorithm because this thing, DES, so DES, that's the original.
was brute forced and broken, right?
So the committee says, okay, come up with an encryption that can be very strong and cannot be broken, right?
Nobody can brute force it.
So these were the three, there are many others, but is the winner of that contest, if you will.
Yes, and that was, I think this is the second place and this is the third place.
I'm not 100% sure though, but these were very good encryption algorithm and pretty much these are still used in the wild.
This is the most popular though, right?
So this is some examples.
All right, networking into the picture.
late 70s,
early 80s, we need to do like internet came and then it says okay hey guys I really need to send messages to other computers.
Now everything is on my phone, I don't really need to encrypt stuff on my machine.
I really need to also encrypt messages to send it to other people, right?
So it's cool.
Use the same encryption algorithm that we came up with, guys.
What's wrong with you?
All right, so let's just use it.
All right, so the difference here is just not, everything is not in one machine anymore.
And you are, are not the only participant in this, right?
That's the difference, and this is the key.
So what happens is, okay, I need to communicate this guy.
Alice need to communicate with Bob for some reason.
These are the two, only two persons, and encryptions these days.
need to send a message to Bob or actually Bob needs to send a message to Alice, but Alice has this key.
She invented the key.
She knows the thing, right?
So what she does is says,
okay, Bob won't send a message, hello, but in order to do that he needs to To encrypt it he needs the key.
Guess The is with Alice.
She said, okay Alice.
Alright, let me send the key over.
There you go!
Here's the key.
It goes the key.
You got it?
Okay, go to it.
So they have both the same key, right?
So now this guy takes the key, encrypt it, and then takes back the encrypted text and Alice decrypts it using the same key.
And voila, Alice got that message.
Sounds Why do we need another encryption algorithm then?
That seems to work, right?
That's great.
But there's a problem, guys.
There's also a problem, right?
And you're probably figured it out.
And the problem is...
the first piece sending that key look at that look at that whoa do you guys
like the animation what are you hope you appreciate the animation here because
it took me 30 freaking minutes to figure it out you know I'm not a master in power points okay So, look at this.
Right?
I know if you can repeat it.
Look at that.
Woo!
That's fancy.
That is skills right there, guys.
So, here's what happened, right?
So, I know I guess this guy's an idiot.
Okay, so, I'm gonna send the key.
And since the key itself is a bunch of phrase or text or numbers, it's not encrypted by itself, right?
So if you send it over, people can sniff it and we have talked about how networking actually can be sniffed, right?
If it's unsecured, like unsecured Wi-Fi or unsecute communication.
these networks, these packets are just there, right?
Everyone can look at them and then try to snip them, right?
I'm going to reference the video that we did about this.
It's talking about the OSI model in general.
How really dangerous to connect to a public Wi-Fi, okay?
And talk bit.
But regardless, this guy got the key.
Guess Any message that these two send to each other, this guy, what is it?
What is the name again?
I don't know.
Bob Charlie, I think, because ABC, yeah.
Alice Bob Charlie.
Okay, so Charlie here, Okay, we really need an Arab name.
I'm gonna call him Aladdin.
Okay, all right, so I like Aladdin is a thief, so that's very appropriate.
So Aladdin here stole the key,
and he can't just pretty much steal every single message,
even if it's encrypted, because he got the same key, he can just decrypt that stuff, right?
Pretty coolish stuff.
Inter asymmetric encryption says, okay, guys, we really need to fix this, right?
So what happens is we find a problem, we ask the geniuses, guys, mathematicians?
come up with a solution so we want to encrypt with a key but decrypt with
another key and it's the solution was there there are three guys that came up with the solution right?
And it's purely using prime numbers.
It is way over my head.
I'm gonna reference a video that someone did a very good job explaining about that is
just essentially I know that it's using pure prime numbers.
It's just like raising it to the power and doing a mod.
It's that simple but the actual implementation how to get to these numbers are or just mind-blowing, okay?
But the idea is Well,
I have text to encrypt, use a key, this is my text, I want to use a key to encrypt that.
And key, I put a color here, red, indicating it's called a public.
It's okay if it's leaked if it's okay if everybody got this because guess what you cannot decrypt with this key
You can only encrypt so you're gonna encrypt me you get a bunch of garbage
Right and guess what you cannot use the right key the public key to decrypt this at all you can
So what do you do is you need that the second pair that actually completes the puzzle, right?
And that thing is the blue key or the private key and then you use it you apply it you get the text back
simple easy peasy Japan easy, right?
So These I'm gonna talk about this key a little bit.
So the red key the blue key or the public key or the private key is actually a bunch of
They are pair of primary keys number primary numbers, right?
So this is a Primary two primary members,
and this is pro two prior numbers to encrypt you go through every single byte and you raise it to the power of the first one
and you mod it with the second or the second number and then you do you do
this again for the everyone so you can see like there are powers and these
numbers are huge guys these primary numbers are not seven or eleven or favorite just in the billions, okay, the prime numbers in the billions.
So can you imagine the processing that the poor computer that needs to do, just to encrypt or even decrypt the message?
So decrypt is exactly the same,
just raise it to the,
to the, you take the text, you raise it to the power of that and you mod it to the second one, okay?
Yeah, this is just 40 FYI.
All right, how are we doing the twerking now?
Sweet, that seems simple.
What are we gonna do is?
generate a public and private key.
Everyone has their own public and private key.
Instead, if you have one key, you now have two.
Now we have public and private.
You're going to do that.
And then what you're going to do is send the public key to whoever wants whomever or whoever.
I it's whomever.
All right, correct me if I'm wrong.
So this guy gets it.
You send this to whomever.
Great.
They get the key and now they can send you text.
You're gonna send you hello They encrypt it you send you back and I guess what you decrypt it with that private key.
Let's repeat the animation Look at that isn't that fancy guys.
I by them.
I'm using Google's Google Drive, Google PowerPoint.
It's not called Google.
I think it's called Google draw or something.
So yeah, problem solved.
Let's always use this for communication.
But remember guys, what I said, this thing is absolutely expensive.
right?
Because of the sheer amount of computation you need to do.
I it was designed just for smaller stuff.
They us, like those guys, those three guys, we're gonna come to them now.
And they told us, hey, you can use it, but FYI, you really encrypt a movie with public key, right?
Rivist, I'm going to push it to the names, I'm sorry, Rivist, Shamir, and Adelman, okay?
These are the three geniuses who came up with this incredible algorithm, okay?
This is one example, RSA, that's the RSA algorithm.
It's used, it's used in SSA, it's used in a lot of, it's used in TLS, which we're going to make another video about.
Diffie-Hellman is another girl, and is an implementation of Diffie-Hellman, I think, I'll Gemel.
So, hey, okay.
And Let's talk pros and cons guys.
So what is good about the symmetric coefficient?
We kind of touched on this, right?
Symmetric coefficient is extremely efficient and fast, right?
But have the key and you don't really need to think about how to decrypt it because decryption is usually very reversible operation.
It's a very simple reversible operation usually, right?
There are a lot of, obviously there is still a going on, but it's still fast.
I'm going to say faster than asymmetric encryption to be safe, right?
It fast though.
It is,
because it's fast,
it's very efficient for large files or large data,
okay, if you're going to send a JSON file, better off, use symmetric encryption, right, software engineers,
you want to think about that,
right, would, would That's why we make these videos, because you need to think, we all need to think as a software engineer, while building applications, what is the ramification of our decisions of anything.
Encryption is one of them.
If you haven't even used encryption,
like hashing,
we didn't talk about hashing,
but encryption, if you want to use symmetric encryption, if you're encrypting a large file versus a small file, you to choose between that.
Okay, so symmetric encryptions, like ds, like AES, these are great for large files.
There comes the, what's the problem?
We don't know about that, hard to transport shared key.
It's very hard to share that shared key, share that shared key.
Yes, so it's very difficult to transport that shared key.
It's very hard to transport that shared key to the other party in order to start the communication, right?
Because the moment you share it, people can actually see it and just sniff everything.
That in itself, we're going to talk about that in a minute.
That doesn't prevent us from using symmetric encryption in networking at all.
In the contrary, we're going to talk about that.
And encryption, pros, what's good, public can be shared.
I can't send it around.
It's okay if some people stole it.
It's already there.
It's public.
People can use it to encrypt.
As long as the private key is not shared, right?
If the private key remains with you, that's okay.
And you don't really need to send the private key.
People don't need to see your private key.
Just you need to send them the public key in order for them to encrypt stuff to send it to you.
And if you want to to people,
you need to take their public key, encrypted and send it to them, they will going to use their private key to decrypt.
Designed for small data.
That's what it was designed for.
These RSA, I forgot their names already.
Those three guys told us,
hey guys, you can use But FYI is going to be slow because we're doing power and mod on large prime numbers.
It's not only numbers, they're prime numbers, right?
They're huge, okay?
I it's like 2048 bet numbers.
So they're so huge.
cons, we talked about that, it's very slow, right?
Because doing all these arithmetic operations is extremely slow, but it's totally about for small data, right?
We okay,
we can encrypt and wait for,
I don't know,
500 milliseconds for,
for, for, to encrypt a bunch of commands, right, in case of SSH, right, we're sending commands,
a small command, so okay, we can tolerate some slowness, but it doesn't really work when you're encrypting a huge one-meg JSON.
And as we said, it's inefficient for large data.
Okay, and here's where we do, guys, essentially with networking.
What do is we use asymmetric encryption to initiate the communication between the two.
So in order of transferring messages using asymmetric encryption, we transfer the symmetric encryption key using asymmetric encryption.
And that's how TLS works.
The thing you,
HTTPS, if you wanna communicate, the first thing it does,
the server sends you a certificate,
which is essentially the public key, right and then you tell the server hey I'm gonna encrypt something I'm gonna the private key.
I'm going to send you the essentially the shared key of the symmetric encryption algorithm.
And they start communicating after that.
Once the two party have the shared key, the symmetric encryption algorithm, they start communicating using symmetric because it's much more efficient and fast.
Does that make sense guys?
That's how actually it works.
So we use both symmetric and symmetric, right?
So this is called also.
of your crop top crop top graphie, right?
So summary, what did we talk about guys?
We about symmetric encryption, right?
We talked about how this is one key, use it to encrypt and the same key to decrypt, right?
Asymmetric, we talked about there is two pairs, it's actually two pairs of pairs, right, of primary keys, but essentially it's a public key and private
key.
And you encrypt with the public, you decrypt with the private, and very simple, it's like almost like a one way thing, right?
You with the public, you cannot decrypt with the public, and by as versa.
Symmetric encryption pros and cons, we talk about this, the very fast, very it's a quick compute on the data in line directly, right?
The cons is the problem with transferring the key, but we solve that we're using asianism.
right which is the process like I can really send the public key and I don't
really care about that right it's it's okay if someone stole the public key
because it doesn't make any sense right it doesn't really matter if someone stole
that key and then yeah we saw this so it's very efficient for small data like
SSH right you can SSH using and this is actually using our say,
and the cones that you cannot really use it for large data because it's extremely slow,
it is extremely slow because of all the primary power and the mod that is going on and the processing
that there can be a need to do in order to add.
symmetry, public, private key, asymmetry.
Alright hope you enjoyed this video.
If you enjoyed this video, give it a like and I'm gonna see you in the next one.
You guys...

Daha Fazla Özelliği Açın

Trancy uzantısını yükleyerek, AI altyazılar, AI kelime tanımları, AI dilbilgisi analizi, AI konuşma vb. dahil olmak üzere daha fazla özelliği açabilirsiniz.

feature cover

Büyük Video Platformlarıyla Uyumlu

Trancy, YouTube, Netflix, Udemy, Disney+, TED, edX, Kehan, Coursera gibi platformlar için çift dilli altyazı desteği sağlamakla kalmaz, aynı zamanda düzenli web sayfaları için AI kelime/cümle çevirisi, tam metin etkileşimli çeviri ve diğer özellikler sunar. Gerçek bir çok yönlü dil öğrenme asistanıdır.

Tüm Platform Tarayıcıları

Trancy, iOS Safari tarayıcı uzantısı dahil olmak üzere tüm platform tarayıcılarını destekler.

Çoklu Görüntüleme Modları

Tiyatro, okuma, karışık ve diğer görüntüleme modlarını destekleyerek kapsamlı bir çift dilli deneyim sunar.

Çoklu Uygulama Modları

Cümle dikte, sözlü değerlendirme, çoktan seçmeli, dikte ve diğer uygulama modlarını destekler.

AI Video Özeti

Videoları özetlemek ve hızlı bir şekilde temel içeriği kavramak için OpenAI kullanın.

AI Altyazılar

Sadece 3-5 dakikada doğru ve hızlı YouTube AI altyazıları oluşturun.

AI Kelime Tanımları

Altyazılardaki kelimelere dokunarak, AI destekli tanımlarıyla kelime anlamlarını öğrenin.

AI Dilbilgisi Analizi

Cümle dilbilgisini analiz ederek cümle anlamlarını hızlıca anlayın ve zor dilbilgisi konularını öğrenin.

Daha Fazla Web Özelliği

Çift dilli video altyazılarının yanı sıra, Trancy ayrıca web sayfaları için kelime çevirisi ve tam metin çevirisi sağlar.

Başlamak için hazır

Trancy'yi bugün deneyin ve benzersiz özelliklerini kendiniz deneyimleyin.

İndir