Symmetrical vs asymmetrical Encryption Pros and Cons by Example

2024 ж. 22 Мам.
41 639 Рет қаралды

Encryption is the process of scrambling data to protect personal files, secure communication, hide identities and much more.
In this video we will learn about the different type of encryptions we will talk about symmetric encryption, asymmetrical encryption, where they are used for and the pros and cons of each one.
Chapters
0:00 Intro
1:50 Symmetric Encryption
9:40 Asymmetric Encryption
14:40 Symmetric Encryption Pros and Cons
17:05 Asymmetric Encryption Pros and Cons
20:20 Summary
1. Symmetric encryption
2. Asymmetrical encrypt
3. Pros and cons of Symmetric vs Asymmetric
Symmetric encryption
Might as well just call it classic encryption I would argue and i think this is the first encryption known to us. I have something I dont want anyone to see I use a lock key to lock it. Only I can open it unless I have a lock.
The same key you use to encrypt is the same key to Decrypt.
Examples
Examples of popular symmetric-key algorithms include
AES
Twofish
Serpent
DES
Twofish, Serpent, AES (Rijndael), Blowfish
CAST5, Kuznyechik, RC4, DES, 3DES, Skipjack, Safer+/++ (Bluetooth), and IDEA
Asymmetrical encryptions
We had symmetric encryptions for a long time, then internet came and networking and we needed to encrypt messages going back and forth. We said cool lets use AES. Then we said wait a second.. the other computer doesn't really have my key so we need to encrypt it..
Also called Public key encryption
1977
Rivest-Shamir-Adleman (RSA)
* Diffie-Hellman key exchange protocol
* DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
* ElGamal
* Various elliptic curve techniques
* Various password-authenticated key agreement techniques
* Paillier cryptosystem
* RSA encryption algorithm (PKCS#1)
* Cramer-Shoup cryptosystem
* YAK authenticated key agreement protocol
So TLS for example first transfer the symmetric key using asymmetrical encryption then communicate all the way using sym encryption
Symmetric encryption
pros
faster
Can be used to encrypt large data scales
cons
Very hard to transport the key 🔑
ASymmetric encryption
Pros
Keys can be shared across a network
Perfect for encryption small data such as ssh
cons
Slow
Rsa slower then aes
Cannot be used to
(1,2)
Number to power 1 mod 2
Summary
Sym. Encryption is used to encrypt large files, same key to encrypt is the same key to deycrpt they are very fast and efficient but keys need to exist on both machines to communicate.
Asym encryption can one key encrypt another key decrypts public key is
Stay Awesome!
Hussein

Пікірлер
  • This channel is my new addiction, every night before going to sleep

    @asfar1984@asfar19843 жыл бұрын
    • Same goes for me.

      @muhaimintaib@muhaimintaib3 жыл бұрын
    • Same here

      @shashikantpawar7069@shashikantpawar70692 жыл бұрын
    • Same here bro!

      @anindyasundarmanna6683@anindyasundarmanna66832 жыл бұрын
  • I love how you're always able to infuse some humor in your videos, it makes them always enjoyable no matter how long they are

    @joshuaifara2736@joshuaifara27363 жыл бұрын
    • less sleepy :D

      @rishabhnitc@rishabhnitc2 жыл бұрын
  • I am so grateful for your videos. You explain complex topics in such a lucid way!

    @ashishjha9262@ashishjha92623 жыл бұрын
  • I am almost binge watching your channel :)

    @vivekbond123@vivekbond1234 жыл бұрын
    • Haha Enjoy the content ☺️ welcome and suggest any new software engineering content you would like to watch. Cheers

      @hnasr@hnasr4 жыл бұрын
    • Me too haha

      @samuelvishesh@samuelvishesh4 жыл бұрын
    • ME too its better than netflix

      @usamatahseenulhaque9125@usamatahseenulhaque91253 жыл бұрын
    • Same here

      @rodrickedwards2759@rodrickedwards27593 жыл бұрын
    • Same here.

      @newtonsarr1234@newtonsarr12343 жыл бұрын
  • Your videos are great, man! I laugh and learn at the same time. Thanks a lot! 🙏🏻

    @paulo.menezes@paulo.menezes3 жыл бұрын
  • These are the only two person in encryption Alice and Bob.. LMAO.. XD XD Nice explanation,great humour..

    @sreevishal2223@sreevishal22234 жыл бұрын
    • Thanks Sree 🙏🙏

      @hnasr@hnasr4 жыл бұрын
    • LOL don't forget our one and only eavesdropper, Eve

      @richardmaduka4747@richardmaduka47473 жыл бұрын
  • thank you hussein for your great conent, you have a great teaching skills. نفع الله بك

    @mohamedayoup2761@mohamedayoup2761 Жыл бұрын
  • I appreciate the animation and the effort involved; immensely

    @karatechop89@karatechop89 Жыл бұрын
  • "It took me 30 fraeking minutes to figure this animation out" LOLOLOLOLOL

    @Mr.Nzo2030@Mr.Nzo20303 жыл бұрын
  • I loved those power point animations. Great Video!

    @zeus134jojojo@zeus134jojojo3 жыл бұрын
  • Crystal clear from a beginner's point of view!

    @yashdesai8372@yashdesai83724 жыл бұрын
  • Excellent job! AWSOM the way why both symmetric and asymmetric encryption exist!...I actually LOLed (@ 7 min:44 second) when the blue guy comes in intersecting the content decryption KEY....the best comedy in the history of explaining encryption as a communication and content security

    @tibebetech4867@tibebetech48675 ай бұрын
  • You are the best at explaining! Hilarious and compelling!

    @pingu8394@pingu83944 жыл бұрын
  • Man I enjoyed the way u urself laugh and describe. Not everyone has this talent trsut me. Good job. Subscribed

    @bijanzohouri98@bijanzohouri983 жыл бұрын
  • I love watching this guy, even if I knew AES, RSA and TLS, I still enjoy him

    @MahmoudKhudairi@MahmoudKhudairi2 ай бұрын
  • You know, you are perfect and I love the way you explain it

    @ahmadkhaireldden6682@ahmadkhaireldden66823 жыл бұрын
  • Nice video. I like how you make everything so interesting and how you add soul to networking components, you make them something like fictional movie characters.

    @harpindermatharu8320@harpindermatharu83204 жыл бұрын
    • Thank you appreciate it 🙏 This is my style in teaching I believe tech videos don’t have to be boring. So I try to balance fun and learning without being distracting. Sometimes I succeed sometimes I fail 😅

      @hnasr@hnasr4 жыл бұрын
  • You made it all really intuitive. Thanks

    @Finn-jp6pn@Finn-jp6pn3 жыл бұрын
  • Thank you so much Hussain. I've watched lots of your videos and learned a lot. ماشاالله

    @javadahmadzadeh7129@javadahmadzadeh71292 жыл бұрын
  • Wow, what a great video. Indeed the graphics are very good and makes us to understand very easily. And the way explain describes how passionate you are, to teach the technology.

    @sravanakumar9326@sravanakumar9326 Жыл бұрын
  • 7:43 That moment deserves a like on its own!

    @pedrosanchezf@pedrosanchezf2 жыл бұрын
  • This guy is so brilliant, wow 👏👏👏. A great educator infact

    @kerryonyeogo4174@kerryonyeogo41747 ай бұрын
  • I would like this video twice I love that you linked to an Eddie Woo video, my favorite math teacher!

    @avi12@avi123 жыл бұрын
  • I am taking a Sec+ class right now and this video really helped me, and made studying more fun. Never lose your sense of humor! Great videos.

    @TheKawasaki250@TheKawasaki2503 жыл бұрын
    • Thanks 😊 all the best in the Secuirty + class

      @hnasr@hnasr3 жыл бұрын
  • Bro i love your humor! Thx. for this tutorial.

    @MrLLGO@MrLLGO3 жыл бұрын
  • You are just awesome.. never ever ever ever ever found such a crystal clear explanation... Thanks a lot :)

    @bhushanmulmule7885@bhushanmulmule78853 жыл бұрын
    • Glad it helped

      @hnasr@hnasr3 жыл бұрын
    • @@hnasr still watching... Just finished sync async! Today have to finish this beginner playlist man.. it's incredible.. haha

      @bhushanmulmule7885@bhushanmulmule78853 жыл бұрын
  • Best explanation ever, Master!

    @amsterdenko9854@amsterdenko98542 жыл бұрын
  • Thank youu so much. Very nicely explained. Thanks for the animation 😜

    @mileyloveable1@mileyloveable1 Жыл бұрын
  • this is really a good video and I learned something new.

    @basuv76@basuv762 жыл бұрын
  • another great video tutorial.. i really appreciated your hard work.... thank you...

    @mangihuthasudungan2778@mangihuthasudungan27785 жыл бұрын
    • Mangihut Hasudungan thank you for watching 😊

      @hnasr@hnasr5 жыл бұрын
  • Great explanations!

    @KTechy-@KTechy-8 ай бұрын
  • Wish this channel existed when I was in school.

    @siddheshlatkar9839@siddheshlatkar9839 Жыл бұрын
  • Awesome as always :) Looking forward for video about tls)

    @vlad981@vlad9815 жыл бұрын
    • THANKS ! TLS Video is now up :) kzhead.info/sun/dNB-ZbxphZ5-mp8/bejne.html

      @hnasr@hnasr4 жыл бұрын
  • Thanks so much for this video tutorial.

    @romantsyupryk3009@romantsyupryk30093 жыл бұрын
  • Awesome. Btw the animations are great! :D

    @hansmelo32@hansmelo324 жыл бұрын
    • Thanks Hans!! 😊

      @hnasr@hnasr4 жыл бұрын
  • very simple, thank you

    @trava4156@trava41564 жыл бұрын
  • great content!i just love it

    @benmoyal6107@benmoyal61076 ай бұрын
  • LOL... the animation is so cooool... great explanation

    @soolch@soolch4 жыл бұрын
  • magical explanation

    @aryankumar87771@aryankumar87771 Жыл бұрын
  • loved the animation!!

    @stifferdoroskevich1809@stifferdoroskevich1809 Жыл бұрын
  • Thanks for the great content. It's a best one for freshers!

    @sankettambare7474@sankettambare74743 жыл бұрын
    • Glad it helps ❤️❤️

      @hnasr@hnasr3 жыл бұрын
  • Bruh that was funny as hell 🤣 Keep up the good work 👍

    @Bruh-jw2ze@Bruh-jw2ze3 жыл бұрын
    • Glad you enjoyed :D

      @hnasr@hnasr3 жыл бұрын
  • Is my understanding correct? In Asymmetric encryption, for a communication betn A&B, both A & B have its own pvt and public keys say PUB_A/PVT_A and PUB_B and PVT_B. So if A sends message to B, the message will be encrypted with B’s Public key sothat B can decrypt with its PVT_B. And vice versa( when B sends to A , it will be encrypted with A’s public key PUB_A)

    @raghuvallikkat3384@raghuvallikkat33843 жыл бұрын
  • lmao "Aladdin is a thief" I knew that magic carpet wasn't his! but great video and explanation, need to pass the Security+ exam

    @bumfuzzle717@bumfuzzle717 Жыл бұрын
  • Props to the animation!

    @DanFlakes@DanFlakes2 жыл бұрын
  • Salam alykom brother, great video :)

    @Khaled-ux6bv@Khaled-ux6bv Жыл бұрын
  • I read somewhere that Diffie-Hellman cannot be used for asymmetric exchange but here he mentioned that as one of the examples of Asymmetric implementations. Can someone explain?

    @surajmittal7572@surajmittal7572 Жыл бұрын
  • Notes: - Symmetic encryption : same key can be used to encrypt and decrypt. All good when you're on one system. But when networking comes into picture, how would you tell other person about this key? If you tell without any encryption then middle-man can sniff this key. - Asymmetric encryption : requires public key and private key. public key is what you open to public, so anyone can use that to encrypt when they send messages to you. private key is used to decrypt those messages by your system. Given the mathematical computation it does with primes, it's quite slow, so never gets used for large data. What happens in real world? For example in HTTPS -- we use Asymmetric encryption for initiation of communication. So the initial "key" (for symmetric encryption) is shared via asymmetric encryption route. Once that gets transferred, further communication happens via symmetric encryption.

    @bhavulgauri7832@bhavulgauri78323 жыл бұрын
  • Thanks man

    @molekuax8646@molekuax86462 жыл бұрын
  • dude you're the best 😘😘😘😘

    @ayoubatba9507@ayoubatba9507 Жыл бұрын
  • Quality 🔥 🔥🔥🔥

    @shashikantpawar7069@shashikantpawar70692 жыл бұрын
  • Amazing.

    @robbywood440@robbywood440 Жыл бұрын
  • when i want to learn a topic/tech i just add Hussein at the end of the query hoping you already talked about it lol.

    @kez99@kez993 жыл бұрын
  • good job hahaha presentation made it so much easlier

    @xuzhihong3036@xuzhihong30364 жыл бұрын
    • 😍😍

      @hnasr@hnasr4 жыл бұрын
  • Thank you so much for valuable content. You said, In Asymmetric key cryptography, we can use public key to do encryption only. But, I found we can use public key to do both encryption and decryption. Could you please clarify here. Thank you so much once again.

    @ramchandrams6139@ramchandrams61393 жыл бұрын
    • the other use case is for digital signature. Where you can encrypt with private key and decrypt with public key. You cant use the same public key to encrypt and decrypt otherwise its useless

      @hnasr@hnasr3 жыл бұрын
  • Hello, I have a nano x which is encrypted and has coins loaded. Is there a away to decrypt this nano x using any kind of software. I have lost contact with the person who sent me nano x which has encrypted crypto coins. Your help will be appreciated. Many thanks.

    @mojibrahman2893@mojibrahman28933 жыл бұрын
  • Awesome

    @tahirdevlog2047@tahirdevlog20473 жыл бұрын
  • every video is a gold mine

    @rainchai851@rainchai8514 жыл бұрын
    • Thanks RAIN! 😊 made me blush

      @hnasr@hnasr4 жыл бұрын
  • well done...

    @dommikador6524@dommikador65243 жыл бұрын
  • Love animation

    @kurianbenoy2@kurianbenoy23 жыл бұрын
  • "THIS GUY'S AN IDIOT" lmao I love your explanations and animations. Thank you so so much :D

    @LauraMartinez-tj9zd@LauraMartinez-tj9zd3 жыл бұрын
    • I appreciate you Laura thanks🙏😅😂

      @hnasr@hnasr3 жыл бұрын
  • Great video as always, I'm new in all of this, there is a question... what is the relation between this video (symetric, asymetric encryption, RSA, AES, etc) and TLS and it versions, can explain please, and tnx for all you do.

    @nelsonbravo7971@nelsonbravo79713 жыл бұрын
    • TLS uses encryption , check out my TLS video kzhead.info/sun/aZiglbSXg3OQaI0/bejne.html

      @hnasr@hnasr3 жыл бұрын
  • kindly sir give me answer to this question based on scenario... Consider an army of a country is fighting a war against terrorism in its country. For this, its troops are in critical operations in the remote areas of the country. In order to share the updated information of the situations, there is need of an efficient communication mechanism among the troops. The army is therefore planning to launch an efficient communication application which will facilitate its soldiers to share the instant text as well as the voice messages among them. The application will run on the special purpose mobile devices that will transmit the messages among its users (soldiers) using the Intranet of army. However, to avoid from any possible eavesdropping and leakage of important information, the army wants to implement a proper encryption mechanism in the application to transfer the messages to their intended recipient(s) in encrypted and secured manners. After carefully reading the above given scenario and assuming yourself as a network security manager, you are required to suggest the most suitable Encryption technique from the following along with two solid reasons: 1.Symmetric Encryption 2.Asymmetric Encryption

    @samschofficial2539@samschofficial25393 жыл бұрын
  • Hussein first i would like to thank for this great content.I hava a question.If we send something from server to client ,how the client stores the private key to encrypt.?i understood the way how client sends the requests to the server using public and private key so the server can decrypt the data using stored private key.but how the inverse of this happens?

    @pamudithajayasundara1259@pamudithajayasundara12592 жыл бұрын
    • So the server will use the clients public key to encrypt the data so the client can use its private key to decrypt. This means the client should have the server public key and the server should have the client’s public key. Normally however this is better done using symmetric encryption and client and server exchange the shared key with key exchange algorithm such as diffi hellman

      @hnasr@hnasr2 жыл бұрын
  • Hi, Beautiful video.. can you share this knowledge with dummy HTTP routes using node.js Thanks

    @life_ofcoder@life_ofcoder3 жыл бұрын
  • Thanks for the video , It was ver helpful ..... r u from India ?

    @karankhemani3175@karankhemani31754 жыл бұрын
    • Hello Karan! Thanks for your comment. No I am from Bahrain 🇧🇭

      @hnasr@hnasr4 жыл бұрын
  • Love the accent sir❤️

    @umeshb8210@umeshb82103 жыл бұрын
    • ❤️

      @hnasr@hnasr3 жыл бұрын
  • Nice explanation Hussein. Can you please help me to understand trust store and key store in the same context?

    @santoshpanigrahy@santoshpanigrahy3 жыл бұрын
    • I think I explained it on my JWT video .. youtube "JWT Hussein"

      @hnasr@hnasr3 жыл бұрын
    • @@hnasr Oh. That's nice. Will see that then. Thank you :)

      @santoshpanigrahy@santoshpanigrahy3 жыл бұрын
  • I like that animation LOL. 😂

    @NWigi@NWigi3 жыл бұрын
  • One question do we have something similar for algorithms that will be great ....

    @ranjangupta5544@ranjangupta55442 жыл бұрын
    • Didn’t quite get the question?

      @hnasr@hnasr2 жыл бұрын
  • I've just press the like button for the animation, thank you xDDDDDDDDDDDD

    @luisrosalescarrera5406@luisrosalescarrera54063 жыл бұрын
    • 🎊🎊

      @hnasr@hnasr3 жыл бұрын
  • this guy is awesome, I can't stop laughing... :D

    @PurushotamRai@PurushotamRai2 жыл бұрын
  • You sound like Sal Khan! :) Even the speaking style! Great animation! I totally appreciate that along with the content .. Edit: BTW, that guys name is "EVE", the Eavesdropper!

    @BharCode09@BharCode094 жыл бұрын
    • Thank you so much for your comment. Some ppl say I look like him Sal Khan too, or maybe thats Kunal Kapoor

      @hnasr@hnasr4 жыл бұрын
    • @@hnasr If you're an Arab, then it's no wonder :D Great content on your channel. Easy to brush up for basics.. Thanks a ton!

      @BharCode09@BharCode094 жыл бұрын
  • But Alices public key is still shared over the wire, any middleman can still grab it and decrypt Alice's messages? Also the middleman can pretend to be Bob

    @JamesSmith-cm7sg@JamesSmith-cm7sg3 жыл бұрын
  • I never thought id ever hear from a real life michael scott

    @jacksongillet369@jacksongillet3693 жыл бұрын
    • I am not superstitious, Im a little stitious

      @hnasr@hnasr3 жыл бұрын
  • Please add it to TLS playlist

    @vim55k@vim55k3 жыл бұрын
    • Done!

      @hnasr@hnasr3 жыл бұрын
  • Like just for the animations😂

    @gigiTD@gigiTD2 жыл бұрын
  • Asymmetric encryption on its own doesn't solve the problem of sharing keys because you still vulnerable to man in the middle attack which can be solved with certificates

    @sudqi@sudqi3 жыл бұрын
  • Easy peasy Japanesey :')

    @amirmohg1319@amirmohg1319 Жыл бұрын
  • Haha there we go 🤣🤣

    @xfrostbite8328@xfrostbite83283 жыл бұрын
  • Your explanation is good but you are a complete racist. It is very rude of you to say that the thief is Arab and his name is Aladdin.

    @feyzakaymakc7385@feyzakaymakc7385 Жыл бұрын
  • You are sayin lets choice arabic name and you are choosing aladdin and then u are saying this name is appropriate for thief. Ashamed of your racism!

    @emreergul1601@emreergul16014 жыл бұрын
    • emre ergül Aladdin is a thief in the Disney movie and fyi i am Arab.

      @hnasr@hnasr4 жыл бұрын
KZhead