**which type of cryptography creates a value that is primarily used for comparison purposes?** This is a topic that many people are looking for. **bluevelvetrestaurant.com** is a channel providing useful information about learning, life, digital marketing and online courses …. it will help you have an overview and solid multi-faceted knowledge . Today, ** bluevelvetrestaurant.com ** would like to introduce to you **Types of Cryptography Blockchain**. Following along are instructions in the video below:

“29. Left activities on blockchain in this video. We ll talk about types of cryptography. Cryptography.

So basically that two types. The first one is symmetric key cryptography. The second is all symmetric key cryptography. Now as names such as the first one should be having symmetric key and second.

One will have two different keys right. So let s start. The first one so. Let s say assume we have a and b.

Now a want to send a message to b. What a will do a will simply encrypt the message using a key. So let s say that key is k1. So using a key k1.

A will encrypt a message that message will go to be the in fact even b. Cannot read that message because it is encrypted format so b has to decrypt..

It now which key b will be using of course. The same key right. We just gave one so a and b. Both will have the same key.

Which is k1 that s a different question. How will they share this key with each other of course not a network right at the end. We want them to have the same key. Which is k1.

So now let s say we have one more we have a and c. So of course. We have be there so if a want to send a message to see now what above key a should use should a use k1 of course not right because b. Has k1.

So if a want to send a message to c or we should not be interpreted by anyone else. It will use a different key now and let s say we will leave that as k2 so between a and b. We have k1 between a and c. We have k2 let s say b and c won t attract what key they will use will they use k1 of course not will they use k2 of course not they will need a different key which is k3 whatever says as the number of user increases.

We have to increase the number of keys and it will be difficult to manage one example in my pocket. I have to carry hundred keys because if i want to interact with hundred people i have to manage all the keys..

We don t want that so that s one of the topic of symmetric let s move towards our symmetric asymmetry cryptograph. They also known as public key cryptography. So basically we use two different keys here. One is private key and one is public key.

So what is this public key and private key as name suggests. Everyone will have two keys. Let s say i want to send a message to bp send a message to c s so on this network. We have multiple nodes each node will have two keys.

The private key and a public key. So a will have its own private can public key b. Will have his own ramekin public key c. Will have its own private can public key.

If you want to encrypt and decrypt. The message you have to use both the case not one so to encrypt a message you can use public key. But to decrypt the message you have to use private key. If you are using a private key to encrypt the message.

Then you have to use a public key to decrypt a message. So you have to use both the key..

The same time you can t simply say i will inc. It with public can decode public key that s not possible so we have to use both so. If you are encrypting with private you came with public here. If you re encrypting with public every ticket with private.

How do you achieve security here. So let s say if a want to send a message to b. As we know the public key of b is known to everyone public right so of course. A will also know the public key of b.

So. What able do a will encrypt the message with b s public key and then that message goes to b of course. Everyone else on the network can see that message the encrypted message. But no one can decrypt it you know why because that message will be decrypted.

Only with b s private key and who has b s private key of course. Only be the private right so you will know your private key and everyone else will know your public key. So that s how we do it so how do i achieve security enter. The message with public key and to give the message with private key let s do it again.

So. Let s say c..

Want to send a message to d. So. Which public key. Si will use so si will use a public key of d.

So c. Will encrypt the message with this public key and d will decrypt the message with its own private key. So that s how this cryptography works. But now.

The question is what is that key is is it a number is it the text that we ll discuss in a separate video. We talked about exactly turkey so that s it from this video that we are talked about types of cryptography. The injunction will be using the public key cryptography. We use that so yeah.

That s it on this video. I hope you enjoyed that in coming section. ” ..

.

Thank you for watching all the articles on the topic **Types of Cryptography Blockchain**. All shares of bluevelvetrestaurant.com are very good. We hope you are satisfied with the article. For any questions, please leave a comment below. Hopefully you guys support our website even more.

description:

tags: