**RSA**, **DH**, and **DSA** are the asymmetric encryption algorithms which the *entire world of modern secure communication* rests upon.
Unfortunately, Asymmetric Encryption is often oversimplified as simply being able to “*encrypt with one key, and decrypt with the other.*” **But that definition is *woefully* incomplete**.
I recently published a video on each providing a more thorough definition, including a walk through of the math for both RSA and DH, and a practical description of DSA. **My goal was to *prove* how these alrogithms work, so that you aren’t just taking my (or anyone else’s) word for it**.
#### [RSA Algorithm](https://www.youtube.com/watch?v=Pq8gNbvfaoM) [15:47]
#### [Diffie-Hellman (DH) Key Exchange](https://www.youtube.com/watch?v=KXq065YrpiU) [6:55]
#### [DSA – Digital Signature Algorithm](https://www.youtube.com/watch?v=iS1nK4G6EtA) [5:46]
Hope these help you.
**Q: What about Elliptic Curve?** ^(*Since I’m sure this question will come up*)
Elliptic Curve simply uses one of the above algorithms. To explain it more thoroughly would require another video, but for now, I’ll simplify it to say EC uses the above three algorithms with different type of values. Instead of using whole numbers (1, 2, 3, … 501, 502, 503, etc…), EC uses coordinates on a curve to represent values.
PS: About a year ago, [someone posted my Diffie-Hellman infographic to this subreddit](https://www.reddit.com/r/cybersecurity/comments/fcedus/i_never_saw_beauty_in_math_until_this_explanation/) (*thanks, /u/pjlmaster !*). It became the [37th top voted post in this subreddit](https://old.reddit.com/r/cybersecurity/top/?t=all&count=25&after=t3_fufk4x#thing_t3_fcedus). The DH videos above is a walk thorough of that infographic. Since that post did so well, I thought this community might also enjoy the videos above. Cheers!