Understanding Secret Keys: A Simple Explanation

Опубликовано: 14 Март 2025
на канале: Practical Networking
7,928
438

In this video, we formally define a term used throughout cryptography: Keys & Secret Keys. Nearly every operation in Cryptography makes use of these keys, so it makes sense to spend a few minutes discussing them.

// CHAPTERS //

0:00 - What are Secret Keys?
0:36 - Key Sizes and Bits
1:59 - All keys are susceptible to brute force
2:34 - Why do we use Secret Keys in Cryptography?
3:41 - Symmetric Keys and Asymmetric Keys

// FULL SERIES - Cryptography Essentials //

This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate.

The full series is available here:
📋    • Cryptography Essentials  
(or use this shortcut: pracnet.net/ce)

00 Series Introduction
01 Hashing
02 Keys / Secret Keys
03 Symmetric Cryptography
04 Encryption
05 MAC / HMAC
06 Pseudo Random Function
07 Asymmetric Cryptography
08 Asymmetric Encryption (RSA)
09 Signatures
10 RSA Signatures
11 DSA Signatures
12 Key Exchanges
13 RSA Key Exchanges
14 DH Key Exchanges
15 Elliptic Curve Cryptography

// SUPPORT PRACTICAL NETWORKING //

If this content benefited you, here are TOTALLY FREE ways to show your appreciation:

👍 Like to help this video reach more viewers
💬 Comment to boost the channel's visibility
🔔 Subscribe to help me attract sponsors (this is the number they care about)