Library

Video Player is loading.
 
Current Time 0:00
Duration 8:21
Loaded: 0%
 
This algorithm will generate a public and private key that are mathematically linked
x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    Encryption is the process of taking a message and scrambling it's contents so that only

  • 00:05

    certain people can look at your message.

  • 00:08

    There are two types of encryption: symmetric and asymmetric encryption.

  • 00:13

    Let's first take a look at symmetric encryption to understand why asymmetric encryption was

  • 00:18

    created.

  • 00:19

    To do that, let me introduce you to Alice and Bob.

  • 00:23

    Alice has a sensitive document that she wants to share with Bob.

  • 00:27

    She uses an encryption program to protect her document with a password or passphrase

  • 00:33

    that she chooses.

  • 00:35

    She then sends the encrypted document to Bob.

  • 00:38

    However, Bob cannot open this message because he doesn't know the passphrase that Alice

  • 00:43

    used to encrypt the document.

  • 00:45

    In other words: he doesn't have the key to open the lock.

  • 00:50

    Now comes a real problem: how does Alice share this passphrase securely with Bob?

  • 00:57

    Sending it through email is risky because others might find the passphrase and use it

  • 01:02

    to decrypt any messages between Alice and Bob.

  • 01:06

    This is exactly the kind of problem that asymmetric encryption intends to solve.

  • 01:11

    It's compareable to a mailbox on the street.

  • 01:14

    The mailbox is exposed to anyone who knows its location.

  • 01:19

    We can say that the location of the mailbox is completely public.

  • 01:24

    Anyone who knows the address can go to the mailbox and drop in a letter.

  • 01:28

    However, only the owner of the mailbox has a key to open it up and read the messages.

  • 01:36

    Let's go back to technical details.

  • 01:38

    When using asymmetric encryption, both Alice and Bob have to generate a keypair on their

  • 01:44

    computers.

  • 01:45

    A popular and secure way for doing this is by using the RSA algorithm.

  • 01:51

    This algorithm will generate a public and private key that are mathematically linked

  • 01:56

    to each other.

  • 01:58

    Public keys can be used to encrypt data and only the matching private key can be used

  • 02:04

    to decrypt it.

  • 02:06

    Even though the keys are linked together they cannot be derrived from each other.

  • 02:11

    In other words: if you know someone's public key, you cannot derrive his private key.

  • 02:16

    If we retake our mailbox example then the mailbox's address would be the public key

  • 02:22

    something that everyone is allowed to know.

  • 02:25

    The owner of the mailbox is the only one who has the private key and that is needed to

  • 02:30

    open up the mailbox.

  • 02:32

    Let's now take a look at how Alice and Bob can use asymmetric encryption to communicate

  • 02:38

    securely with each other.

  • 02:41

    They start by exchanging their public keys.

  • 02:43

    Bob gives his public key to Alice and Alice gives her public key to Bob.

  • 02:49

    Now Alice can send her sensitive document again.

  • 02:53

    She takes the document and encrypts it with Bob's public key.

  • 02:58

    She then sends the file to Bob, who uses his private key to unlock the document and read

  • 03:03

    it.

  • 03:05

    Because they use asymmetric encryption, only Bob is able to decrypt the message.

  • 03:10

    Not even Alice can decrypt it because she doesn't have Bob's private key.

  • 03:15

    The strength and security of the asymmetric encryption now relies on Alice and Bob to

  • 03:20

    keep their private keys well protected.

  • 03:24

    If an attacker steals Alice's private key, it can be used to decrypt all messages that

  • 03:29

    are intended for Alice.

  • 03:31

    However, the attacker cannot decrypt messages that where sent by Alice because that requires

  • 03:38

    Bob's private key.

  • 03:40

    Asymmetric encryption is used in a lot of places where security really matters.

  • 03:45

    You might not be aware of it, but everytime you visit a secure website via HTTPS, you're

  • 03:51

    actually using asymmetric encryption.

  • 03:54

    It's also being used to securily send emails with the PGP protocol.

  • 03:59

    And one last example: Bitcoin also uses asymmetric encryption to make sure that only the owner

  • 04:06

    of a money wallet can withdraw or transfer money from it.

  • 04:10

    So now you know how asymmetric encryption works and what the differences are between

  • 04:15

    asymmetric and symetric encryption.

  • 04:19

    If you liked this video, consider supporting me by sharing it and subscribing to my YouTube

  • 04:23

    channel and as always: thank you very much for watching!

All

The example sentences of RETAKE in videos (15 in total of 42)

i personal pronoun 'm verb, non-3rd person singular present gonna proper noun, singular retake noun, singular or mass the determiner question noun, singular or mass of preposition or subordinating conjunction my possessive pronoun colleague noun, singular or mass from preposition or subordinating conjunction cbc proper noun, singular and coordinating conjunction i personal pronoun 'll modal just adverb go verb, base form in preposition or subordinating conjunction
if preposition or subordinating conjunction we personal pronoun retake verb, non-3rd person singular present our possessive pronoun mailbox noun, singular or mass example noun, singular or mass then adverb the determiner mailbox noun, singular or mass 's possessive ending address noun, singular or mass would modal be verb, base form the determiner public adjective key adjective
in preposition or subordinating conjunction the determiner month noun, singular or mass that preposition or subordinating conjunction followed verb, past participle , azerbaijan proper noun, singular moved verb, past tense swiftly adverb to to retake verb, base form most adverb, superlative territory noun, singular or mass to to the determiner south adverb
on preposition or subordinating conjunction the determiner question noun, singular or mass of preposition or subordinating conjunction whether preposition or subordinating conjunction azerbaijan proper noun, singular has verb, 3rd person singular present the determiner right noun, singular or mass to to retake verb, base form these determiner territories noun, plural using verb, gerund or present participle force noun, singular or mass ,
there existential there were verb, past tense several adjective major adjective croat proper noun, singular offensives noun, plural to to try verb, base form to to retake verb, base form territory noun, singular or mass held verb, past participle by preposition or subordinating conjunction the determiner serbs proper noun, singular .
they personal pronoun wanted verb, past tense britain proper noun, singular not adverb to to attempt verb, base form to to retake verb, base form the determiner islands noun, plural , they personal pronoun wanted verb, past tense the determiner united verb, past participle states proper noun, singular
retake noun, singular or mass the determiner jurong proper noun, singular line noun, singular or mass , but coordinating conjunction the determiner preparations noun, plural for preposition or subordinating conjunction it personal pronoun were verb, past tense quickly adverb overtaken noun, singular or mass by preposition or subordinating conjunction japanese proper noun, singular advances noun, plural .
proclaiming verb, gerund or present participle his possessive pronoun divine adjective quest noun, singular or mass of preposition or subordinating conjunction how wh-adverb he personal pronoun would modal lead verb, base form an determiner army noun, singular or mass to to jerusalem proper noun, singular , retake noun, singular or mass her possessive pronoun
and coordinating conjunction to to keep verb, base form your possessive pronoun certification noun, singular or mass , you personal pronoun will modal need verb, base form to to retake verb, base form the determiner exam noun, singular or mass before preposition or subordinating conjunction it personal pronoun expires verb, 3rd person singular present .
they personal pronoun hoped verb, past tense , that preposition or subordinating conjunction the determiner soviets proper noun, singular would modal join verb, base form them personal pronoun to to retake verb, base form the determiner city noun, singular or mass from preposition or subordinating conjunction the determiner nazis proper noun, singular .
meanwhile adverb , back adverb in preposition or subordinating conjunction croatia proper noun, singular , the determiner croatian proper noun, singular government noun, singular or mass had verb, past tense been verb, past participle preparing verb, gerund or present participle for preposition or subordinating conjunction several adjective years noun, plural to to retake verb, base form
the determiner fee noun, singular or mass for preposition or subordinating conjunction a determiner retake noun, singular or mass is verb, 3rd person singular present generally adverb around preposition or subordinating conjunction $ proper noun, singular 15 cardinal number , and coordinating conjunction you personal pronoun can modal retake verb, base form it personal pronoun as preposition or subordinating conjunction many adjective times noun, plural as preposition or subordinating conjunction you personal pronoun would modal like verb, base form .
companions noun, plural , guiding verb, gerund or present participle them personal pronoun back adverb to to their possessive pronoun home noun, singular or mass of preposition or subordinating conjunction erebor proper noun, singular to to retake verb, base form the determiner mountain noun, singular or mass and coordinating conjunction slay noun, singular or mass
brothers noun, plural who wh-pronoun take verb, non-3rd person singular present their possessive pronoun time noun, singular or mass getting verb, gerund or present participle down adverb and coordinating conjunction the determiner snowballs noun, plural retake verb, non-3rd person singular present the determiner lead verb, base form they personal pronoun 're verb, non-3rd person singular present followed verb, past participle
not adverb give verb, base form you personal pronoun any determiner results noun, plural and coordinating conjunction then adverb they personal pronoun make verb, non-3rd person singular present you personal pronoun retake verb, non-3rd person singular present the determiner photos noun, plural again adverb give verb, non-3rd person singular present

Use "retake" in a sentence | "retake" example sentences

How to use "retake" in a sentence?

  • I dream of a time when the people will retake their airways and use them to achieve a voice to rediscover democracy, and to see the divine potential of man.
    -Gerry Spence-
  • Stage is much more intimidating than going before the cameras, because you can really screw up, and can't do a retake.
    -Daniel Radcliffe-
  • We must reclaim and retake feminism from our fellow idiotic women.
    -Ayaan Hirsi Ali-

Definition and meaning of RETAKE

What does "retake mean?"

noun
thing that is retaken.
verb
To photograph or film something again.