✨ Please consider supporting my channel! ✨ Every bit helps—whether it’s $15, $10, or even $5. You can make a donation via this site: In public key encryption, two different keys are used to encrypt and decrypt is the public key and other is the private key. These two keys are mathematically related. They come as a pairs. The public key encryption is also called asymmetric key encryption because two different keys are used. Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication. In this video, I will use an example to demonstrate how to use public key. Playlist: Basic Cryptography Advanced Cryptography: Please leave comments, questions and please subscribe!











