What is Cryptography? | Introduction to Cryptography | Cryptography for Beginners | Edureka

edureka!
19 Jul 201817:56

Summary

TLDRThis video script by Aria from Eddie Rocca delves into the world of cryptography, a crucial tool for secure communication. It outlines the basics of cryptography, explains its importance in protecting data, and covers various cryptographic classifications including symmetric and asymmetric key cryptography. The script provides a practical demonstration of the RSA algorithm, showcasing how it secures data on platforms like YouTube. It also explores encryption techniques such as transposition and substitution ciphers, stream and block ciphers, and the significance of digital certificates in cybersecurity.

Takeaways

  • πŸ”’ Cryptography is essential for securing data and protecting against unauthorized access, identity theft, and tampering.
  • πŸ“š The video session will cover the basics of cryptography, classifications, and a demonstration of the RSA algorithm.
  • πŸ—£ The example of Andy and Sam illustrates the need for secure communication over public channels like the internet.
  • πŸ”‘ Cryptography involves converting messages into numeric forms, encrypting them with a key, and then decrypting them with a corresponding key.
  • πŸ”„ The process of encryption and decryption is vital to ensure that messages remain private and intact during transmission.
  • πŸ”’πŸ”“ Cryptography is divided into symmetric key cryptography, which uses the same key for encryption and decryption, and asymmetric key cryptography, which uses a pair of keys.
  • πŸ”„πŸ”„ Symmetric key cryptography includes classical methods like transposition and substitution ciphers, and modern methods like stream and block ciphers.
  • πŸ”‘πŸ”‘ Asymmetric cryptography, or public key cryptography, uses a public key for encryption and a private key for decryption, enhancing security.
  • πŸ” The RSA algorithm, used widely on the internet, is an example of asymmetric cryptography that relies on the difficulty of factoring large prime numbers.
  • 🌐 The security of modern cryptography systems, like RSA, depends on keeping the private key secret while the public key can be openly distributed.
  • πŸ“ˆ The strength of public key cryptography systems is based on the computational difficulty of deriving the private key from the public key, ensuring robust security.

Q & A

  • What is the primary purpose of cryptography?

    -The primary purpose of cryptography is to securely protect data and communication from unauthorized access, ensuring the privacy and integrity of information such as corporate secrets, classified information, and personal data.

  • What is the scenario presented in the video to explain cryptography?

    -The scenario involves a person named Andy who wants to send a private message to his friend Sam over the internet. The goal is to secure the message against eavesdroppers and potential tampering by a third party named Eve.

  • How is the message converted into a numeric form in cryptography?

    -The message is first converted into a numeric form, which is then combined with an encryption key using an encryption algorithm to produce a ciphertext that can be securely transmitted.

  • What is a ciphertext?

    -A ciphertext is the result of encrypting a message using an encryption key and an encryption algorithm, transforming the original message into a form that is unreadable without the decryption key.

  • How does cryptography help secure the connection between Andy and Sam?

    -Cryptography helps secure the connection by allowing Andy to convert his readable message into an unreadable form (ciphertext) using a key. This ensures that even if someone intercepts the message, they cannot decipher it without the proper decryption key.

  • What are the two broad classifications of cryptography mentioned in the script?

    -The two broad classifications of cryptography are symmetric key cryptography and asymmetric key cryptography, also known as public key cryptography.

  • What is symmetric key cryptography?

    -Symmetric key cryptography is a type of cryptography where the same cryptographic key is used for both encryption and decryption of the message. This requires the key to be shared between the communicating parties.

  • What is the difference between a transposition cipher and a substitution cipher?

    -A transposition cipher rearranges the positions of the plaintext characters according to a system, while a substitution cipher replaces each plaintext character with another character based on a fixed system or rule.

  • What is a block cipher and how does it differ from a stream cipher?

    -A block cipher is an encryption method that applies a symmetric key to encrypt a fixed-size block of text at once, rather than encrypting one bit at a time as in stream ciphers.

  • What is asymmetric cryptography and how does it differ from symmetric cryptography?

    -Asymmetric cryptography, also known as public key cryptography, uses a pair of keys consisting of a public key (which can be widely distributed) and a private key (which is known only to the owner). This allows for both encryption and authentication, where only the paired private key can decrypt messages encrypted with the public key.

  • What is the significance of the RSA algorithm mentioned in the script?

    -The RSA algorithm is a widely used public key encryption system that is based on the computational difficulty of factoring large prime numbers. It is commonly used for secure data transmission over the internet and is an example of asymmetric cryptography.

Outlines

00:00

πŸ”’ Introduction to Cryptography

The video script begins by emphasizing the importance of cryptography for securing data against unauthorized access. It introduces the speaker, Aria from Eddie Rocca, and outlines the topics to be covered, including the definition of cryptography, its classifications, and a demonstration of the RSA algorithm. The script uses a scenario involving a person named Andy who wants to securely send a message to his friend Sam, highlighting the need for secure communication against potential eavesdroppers or tampering by a character named Eve. Cryptography is defined as the practice of securing communication and data in the presence of adversaries, involving the conversion of messages into numeric forms, encryption with a key, and decryption by the intended recipient using a corresponding key.

05:00

πŸ”‘ Exploring Symmetric and Asymmetric Cryptography

This paragraph delves into the two main types of cryptography: symmetric key cryptography and asymmetric key cryptography. Symmetric key cryptography uses the same key for encryption and decryption, representing a shared secret between parties. The paragraph explains classical and modern symmetric cryptography, including transposition and substitution ciphers, as well as stream and block ciphers. It also introduces the Data Encryption Standard (DES) as a popular symmetric key system. Asymmetric cryptography, also known as public key cryptography, uses a pair of keys, one public and one private, for encryption and authentication. The strength of this system lies in the difficulty of deriving the private key from the public key, allowing the public key to be distributed without compromising security.

10:02

πŸ”„ Understanding Cryptography Techniques

The script continues by explaining various cryptographic techniques in detail. It describes transposition ciphers that rearrange the positions of plaintext characters according to a systematic scheme, creating a ciphertext that is a permutation of the original message. Substitution ciphers are also discussed, where each letter of the alphabet is replaced with another letter or symbol according to a fixed system. The paragraph further explains stream ciphers, which encrypt data bit by bit, and block ciphers, which encrypt data in larger chunks. The security and reliability of block ciphers, such as the Advanced Encryption Standard (AES), are highlighted, emphasizing their use in modern cryptography.

15:03

🌐 Practical Demonstration of Public Key Encryption

The final paragraph of the script provides a practical demonstration of public key encryption, specifically using the RSA algorithm. It guides viewers on how to view digital certificates on YouTube as an example of public key cryptography in action. The script then walks through the process of generating a public and private key pair, encrypting a message using the public key, and decrypting it with the private key. The RSA algorithm is introduced, explaining the process of key generation, encryption, and decryption. The video concludes by inviting viewers to learn more about RSA and other cryptographic systems, encouraging them to engage with the content through likes, comments, and subscriptions.

Mindmap

Keywords

πŸ’‘Cryptography

Cryptography is the practice and study of techniques for securing communication and data in the presence of adversaries. It is central to the video's theme, as it discusses the importance of cryptography in protecting sensitive information from unauthorized access. The script uses the term to introduce various cryptographic methods and algorithms, such as RSA, which are essential for securing online communications.

πŸ’‘Encryption Key

An encryption key is a crucial element in cryptography used to convert plaintext into ciphertext, making the message unreadable to anyone without the key. In the script, the encryption key is used in conjunction with an encryption algorithm to secure messages sent over the internet, ensuring that only the intended recipient can decrypt and read the original message.

πŸ’‘Ciphertext

Ciphertext refers to the output of an encryption algorithm, which is an unreadable form of the original message. The script explains that once a message is converted into ciphertext using an encryption key, it can be safely transmitted over a network, as only the person with the corresponding decryption key can convert it back into plaintext.

πŸ’‘Decryption Key

A decryption key is used to reverse the encryption process, transforming ciphertext back into its original plaintext form. The script emphasizes the importance of the decryption key in ensuring the security of the message by allowing the intended recipient to access the original content after it has been encrypted and transmitted.

πŸ’‘Symmetric Key Cryptography

Symmetric key cryptography is a type of cryptography where the same key is used for both encryption and decryption. The script mentions this concept while discussing the classifications of cryptography, highlighting that symmetric key algorithms require a shared secret between parties, which can be a drawback compared to asymmetric cryptography.

πŸ’‘Asymmetric Key Cryptography

Asymmetric key cryptography, also known as public key cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. The script explains that this method allows for secure communication over public channels, as the public key can be widely distributed without compromising security, while the private key remains secret.

πŸ’‘Transposition Cipher

A transposition cipher is a method of encryption that rearranges the positions of plaintext characters according to a system, creating a permutation of the original text. The script provides an example of a transposition cipher, demonstrating how it can be used to reorder a message 'meet me after the party' into ciphertext using a specific key.

πŸ’‘Substitution Cipher

A substitution cipher involves replacing each letter or group of letters in the plaintext with another letter or symbol according to a fixed system. The script describes a simple substitution cipher using the keyword 'zebra' to shift the alphabet and create a cipher alphabet, which is then used to encrypt the message 'flee at once we are discovered'.

πŸ’‘Stream Cipher

A stream cipher is a method of encryption where a cryptographic key and algorithm are applied to each binary digit in a data stream one bit at a time. The script mentions stream ciphers as an alternative to block ciphers, noting that they are less commonly used in modern cryptography due to their potential vulnerabilities.

πŸ’‘Block Cipher

A block cipher is an encryption method that applies a symmetric key to encrypt a fixed-size block of text at once, rather than one bit at a time as in stream ciphers. The script explains that block ciphers like AES are widely used in modern cryptography, providing a secure way to encrypt data in larger chunks.

πŸ’‘RSA

RSA is a popular public key cryptosystem used widely on the internet for secure data transmission. The script discusses RSA in detail, explaining its unique algorithm for key pair generation and encryption/decryption processes. It also mentions that RSA is used by YouTube for securing its digital certificates, illustrating its practical application in real-world scenarios.

Highlights

Cryptography is essential for securing data against unauthorized access, protecting corporate secrets, classified information, and personal data from identity theft.

The session will cover the basics of cryptography, classifications, and a demonstration of the RSA algorithm.

Cryptography secures communication by converting messages into numeric form and applying an encryption key.

The concept of a secure communication channel between Andy and Sam is introduced to illustrate the use of cryptography.

Ciphertext is produced by encrypting the numeric form of a message with an encryption key, ensuring secure transmission.

The importance of keeping encryption and decryption keys secret is emphasized for the security of modern cryptography systems.

Symmetric key cryptography uses the same key for encryption and decryption, representing a shared secret between parties.

Transposition ciphers rearrange the positions of plaintext characters according to a systematic scheme.

Substitution ciphers replace letters or groups of letters with others according to a fixed system or key.

Stream ciphers encrypt data bit by bit using a cryptographic key and algorithm, contrasting with block ciphers.

Block ciphers like AES encrypt fixed-size blocks of text with a key of a predetermined length.

Asymmetric or public key cryptography uses a pair of keys, one public for encryption and one private for decryption.

The security of public key cryptography relies on the computational difficulty of deriving the private key from the public key.

RSA is a widely used encryption algorithm demonstrated through YouTube's digital certificates.

The RSA algorithm involves key pair generation and encryption/decryption processes using large prime numbers.

The strength of RSA encryption is due to the difficulty of factorizing large prime numbers.

The video provides a practical demonstration of public key encryption using an online demo.

The session concludes with an in-depth look at RSA, highlighting its significance and widespread use on the Internet.

Transcripts

play00:01

[Music]

play00:06

cryptography is essentially important

play00:09

because it allows you to securely

play00:10

protect data that you don't want anyone

play00:12

else to have access to it is used to

play00:14

protect corporate secrets secure

play00:16

classified information and to protect

play00:18

personal information to guard against

play00:20

things like identity theft hi guys my

play00:22

name is aria from Eddie Rocca and I

play00:24

welcome you all to another session on

play00:26

cyber security and today's video is

play00:28

basically going to be about cryptography

play00:30

now before we actually jump into the

play00:32

session let me give you guys a brief on

play00:34

the topics that we're gonna cover today

play00:35

so first of all we're gonna cover what

play00:37

is cryptography to the help of a very

play00:39

simplistic scenario then we are going to

play00:41

go through the classifications of

play00:42

cryptography and how the different

play00:44

classification of algorithm works in the

play00:46

end I'm going to show you guys a nifty

play00:48

demo on how a popular algorithm called

play00:50

RSA actually works so let's get started

play00:53

now I'm going to take the help of an

play00:56

example or a scenario to actually

play00:58

explain what is cryptography all right

play01:00

so let's say we have a person and let's

play01:02

call him Andy I suppose Andy sends a

play01:05

message to his friend Sam who is on the

play01:07

other side of the world now obviously he

play01:09

wants this message to be private and

play01:11

nobody else should have access to the

play01:13

message now he uses a public forum for

play01:15

example the internet for sending this

play01:17

message the goal is to actually secure

play01:20

this communication and of course we have

play01:22

to be secure against someone now let's

play01:24

say there is a smart guy called Eve who

play01:26

is secretly got access to your

play01:28

communication channel since this guy has

play01:30

access to your communication he can do

play01:32

much more than just eavesdrop for

play01:34

example he can try to change the message

play01:36

in itself now this is just a small

play01:38

example what if Eve actually gets access

play01:41

to your private information well that

play01:43

could actually result in a big

play01:44

catastrophe so how can Andy be sure that

play01:47

nobody in the middle could access the

play01:49

message sent to Sam the goal here is to

play01:51

make communication secure and that's

play01:53

where cryptography comes in so what

play01:55

exactly is cryptography well

play01:57

cryptography is the practice and the

play01:59

study of techniques for securing

play02:01

communication and data in the presence

play02:03

of adversaries so let me take a moment

play02:05

to explain how that actually happens

play02:07

well first of all we have a message this

play02:10

message is firstly converted into a

play02:12

numeric form

play02:13

and then this numeric form is applied

play02:15

with a key called an encryption key and

play02:18

this encryption key is used in an

play02:20

encryption algorithm

play02:21

so once the numeric message and the

play02:23

encryption key has been applied in an

play02:25

encryption algorithm what we get is

play02:27

called a ciphertext now this ciphertext

play02:29

is sent over the network to the other

play02:31

side of the world where the other person

play02:34

whose message is intended for will

play02:36

actually use a decryption key and use

play02:39

the ciphertext as a parameter of a

play02:41

decryption algorithm and then he'll get

play02:43

what we actually sent as a message and

play02:45

if some error had actually occurred he'd

play02:48

get an error so let's see how

play02:50

cryptography can help secure the

play02:51

connection between Andy and Sam so to

play02:54

protect his message Andy first converts

play02:56

his readable message to an unreadable

play02:58

form here he converts a message to some

play03:01

random numbers and after that he uses a

play03:04

key to encrypt his message after

play03:06

applying this key to the numerical form

play03:08

of his message he gets a new value in

play03:09

cryptography we call this ciphertext so

play03:13

now if Andy sends the cipher text or

play03:15

encrypted message over communication

play03:16

channel he won't have to worry about

play03:18

somebody in the middle of discovering

play03:20

the private message even if somebody

play03:22

manages to discover the message he won't

play03:24

be able to decrypt the message without

play03:26

having a proper key to unlock this

play03:27

message so suppose Eve here discovers

play03:30

the message and he somehow manages to

play03:32

tamper with the message and message

play03:34

finally reaches Sam Sam would need a key

play03:36

to decrypt the message to recover the

play03:38

original plaintext so using the key he

play03:41

would convert a ciphertext to numerical

play03:43

value corresponding to the plaintext now

play03:45

after using the key for decryption what

play03:47

will come out is the original plaintext

play03:49

message or an arrow now this error is

play03:52

very important it is the way Sam knows

play03:54

that message sent by Andy is not the

play03:56

same as a message that he received so

play03:58

the error in a sense tells us that Eve

play04:00

has tampered with the message now the

play04:02

important thing to note here is that in

play04:04

modern cryptography the security of the

play04:06

system purely relies on keeping the

play04:08

encryption and decryption key secret

play04:10

based on the type of keys and encryption

play04:12

algorithms cryptography is classified

play04:14

under the following categories now

play04:16

cryptography is broadly classified under

play04:19

two categories namely symmetric key

play04:21

cryptography and asymmetric key

play04:23

cryptography popularly also known as

play04:25

public

play04:26

now symmetric key cryptography is

play04:29

further classified as classical

play04:31

cryptography and modern cryptography

play04:33

further drilling down classical

play04:35

cryptography is divided into two which

play04:38

is transposition cipher and substitution

play04:40

cipher on the other hand modern

play04:42

cryptography is divided into stream

play04:44

cipher and block cipher in the upcoming

play04:47

slides I'll broadly explain all these

play04:49

types of cryptography so let's start

play04:51

with symmetric key cryptography first so

play04:53

symmetric key algorithms are algorithms

play04:56

for cryptography that use the same

play04:58

cryptographic keys for both encryption

play05:00

of plaintext and decryption of

play05:02

ciphertext the keys may be identical but

play05:05

there may be some simple transformation

play05:07

to go between the two keys the keys in

play05:09

practice represent a shared secret

play05:11

between two or more parties that can be

play05:14

used to maintain a private information

play05:16

link this requirement that both parties

play05:18

have access to the secret key there's no

play05:20

the main drawbacks of symmetric key

play05:22

encryption in comparison to publicly

play05:24

encryption also known as a symmetric key

play05:27

encryption now symmetric key

play05:29

cryptography is sometimes also called

play05:31

secret key cryptography and the most

play05:33

popular symmetric key system is the data

play05:36

encryption standards which also stands

play05:37

for DES next up we're going to discuss

play05:41

transposition cipher so in cryptography

play05:44

a transposition cipher is a method of

play05:46

encryption by which the positions held

play05:48

by units of plaintext which are commonly

play05:51

characters or groups of characters are

play05:53

shifted according to a regular system so

play05:55

that the ciphertext constitutes a

play05:57

permutation of the plaintext that is the

play06:00

order of units is changed the plaintext

play06:02

is reordered now mathematically speaking

play06:04

a bijective function is used on the

play06:06

characters position to encrypt and an

play06:08

inverse a function to decrypt so as you

play06:11

can see that there is an example on the

play06:12

slide so on the plaintext side we have a

play06:16

message which says meet me after the

play06:17

party now this has been carefully

play06:19

arranged in the encryption matrix which

play06:22

has been divided into six rows and the

play06:24

columns so next we have a key which is

play06:27

basically four two one six three five

play06:29

and then we rearrange by looking at the

play06:32

plaintext matrix and then we get the

play06:34

cipher text which basically is some

play06:36

unreadable gibberish at this moment so

play06:39

that's how this whole algorithm work

play06:40

on the other hand when the ciphertext is

play06:42

being converted into the plaintext the

play06:44

plaintext matrix is going to be referred

play06:46

and it can be done very easily going on

play06:49

we are going to discuss substitution

play06:51

cipher

play06:51

so substitution of single letters

play06:53

separately simple substitution can be

play06:56

demonstrated by writing out the

play06:57

alphabets in some order to represent the

play07:00

substitution this is termed a

play07:02

substitution alphabet the cipher

play07:04

alphabet may be shifted or reversed

play07:06

creating the Caesar and app stash cipher

play07:09

respectively or scrambled in a more

play07:11

complex fashion in which case it is

play07:13

called a mixed alphabet or deranged

play07:15

alphabet traditionally mixed alphabets

play07:17

may be created by first writing out

play07:19

keyboard removing repeated letters in it

play07:21

then writing all the remaining letters

play07:23

in the alphabet in the usual order now

play07:26

consider this example is shown on the

play07:28

slide using the system we just discussed

play07:30

the keyword zebra's gives us the

play07:31

following alphabets from the plaintext

play07:33

alphabet which is a to C so the

play07:35

ciphertext alphabet is basically zebras

play07:37

then followed by all the alphabets we

play07:40

have missed out in the zebrawood so as

play07:42

you guys can see it's zebras followed by

play07:44

SC D F G H and so on now suppose we were

play07:47

to actually encrypt a message using this

play07:49

code so as you guys can see on the

play07:51

screen I've shown you an example which

play07:53

is a message flee at once we are

play07:55

discovered is being actually encrypted

play07:57

using this code so if you guys can see

play08:00

out here though F letter actually

play08:02

corresponds to s and then the L letter

play08:05

actually corresponds to I out here then

play08:09

we actually get the cipher text which is

play08:12

s I is that you using the code and the

play08:15

process that I just discussed now

play08:17

traditionally the cipher text is written

play08:19

out in blocks of fixed length omitting

play08:21

punctuation x' and spaces this is done

play08:23

to help avoid transmission errors to

play08:26

disguise the word boundaries from the

play08:27

plaintext

play08:28

now these blocks are called groups and

play08:30

sometimes a group count that is the

play08:32

number of groups is given as an

play08:33

additional check now five letter groups

play08:35

are traditional as you guys can see that

play08:37

we have also divided our ciphertext into

play08:40

groups of five and this dates back to

play08:42

when messages were actually used to be

play08:45

transmitted by telegraph now if the

play08:47

length of the message happens not to be

play08:49

divisible by five it may be padded at

play08:51

the end with nulls and these can be any

play08:53

character

play08:54

that can be decrypted too obvious

play08:56

nonsense so the receiver can easily spot

play08:58

them and discard them next on our list

play09:00

is stream cipher so a stream cipher is a

play09:05

method of encrypting text to produce

play09:07

cipher text in which a cryptographic key

play09:09

and algorithm are applied to each binary

play09:12

digit in a data stream one bit at a time

play09:14

this method is not much used in modern

play09:17

cryptography the main alternative method

play09:19

is block cipher in which a key and

play09:21

algorithm are applied to block of data

play09:23

rather than individual bits in a stream

play09:25

okay so now that we've spoken about

play09:27

block cipher let's go and actually

play09:29

explain what block cipher does a block

play09:31

cipher is an encryption method that

play09:33

applies a deterministic algorithm for

play09:35

the symmetric key to encrypt a block of

play09:37

text rather than encrypting one bit at a

play09:39

time as in stream ciphers for example a

play09:42

common block cipher AES encrypts 128-bit

play09:45

blocks with a key of predetermined

play09:46

length that is either 128 192 or 256

play09:50

bits in length now block ciphers are

play09:52

pseudo ranbir mutation families that

play09:54

operate on the fixed size of block of

play09:56

bits these PRPs are function that cannot

play09:59

be differentiated from completely random

play10:01

permutation and thus are considered

play10:03

reliable I've been proven to be

play10:05

unreliable by some source ok so now it's

play10:07

time that we discuss some asymmetric

play10:09

cryptography so asymmetric cryptography

play10:12

also known as public key cryptography is

play10:14

any cryptographic system that uses pair

play10:17

of keys which is a public key which may

play10:19

be this emanated widely and private keys

play10:21

which are known only to the owner this

play10:23

accomplishes two functions

play10:25

authentication where the public key

play10:27

verify is that a holder of the paired

play10:29

private key sent the message and

play10:30

encryption where only the paired private

play10:32

key holder can decrypt the message

play10:34

encrypted with the public key in a

play10:36

public key encryption system any person

play10:38

can encrypt a message using the

play10:40

receivers public key that encrypted

play10:42

message can only be decrypted with the

play10:44

receivers private key so to be practical

play10:46

the generation of public and private key

play10:48

pair must be computationally economical

play10:50

the strength of a public key

play10:52

cryptography system relies on

play10:53

computational efforts required to find

play10:56

the private key from its paired public

play10:57

key so effective security only requires

play11:00

keeping the private key private and the

play11:02

public key can be openly distributed

play11:04

without compromising security okay so

play11:06

now that I've actually shown you

play11:08

hobb cryptography actually works and how

play11:10

the different classifications are

play11:11

actually applied let's go and do

play11:13

something interesting so you guys are

play11:16

actually watching this video on YouTube

play11:18

right now so if you guys actually go and

play11:21

click on the secure part besides the URL

play11:24

you can actually go and view the digital

play11:26

certificates that are actually used out

play11:28

here so click on certificates and you'll

play11:31

see the details in the details tab now

play11:34

as you guys can see the signature

play11:36

algorithm that is used for actually

play11:38

securing YouTube is being sha-256 with

play11:41

RSA and RSA is a very very common

play11:44

encryption algorithm that is used

play11:46

throughout the internet then the

play11:47

signature hash algorithm that is being

play11:49

used is sha-256

play11:51

and the issuer is Google in Internet

play11:53

Authority and you can get a lot of

play11:56

information about sites and all their

play11:58

authority key identifier their

play12:00

certificate policy is the key usage and

play12:02

a lot of thing about security just from

play12:05

this small little button audio also let

play12:08

me show you a little how public key

play12:10

encryption actually works so on the side

play12:13

which is basically called web start CS

play12:15

door UTA dot edu you can actually demo

play12:18

out public key encryption so suppose we

play12:21

had to send a message first we would

play12:23

need to generate keys so as you can see

play12:26

I just click generate keys and it got me

play12:28

two keys which is one is the public key

play12:30

which I will distribute or the network

play12:32

and one the private key which I will

play12:34

actually keep secret to myself now I

play12:37

want to send message saying hi there

play12:40

when is the exam tomorrow so now we are

play12:45

going to encrypt it using the public key

play12:47

because that's exactly what's

play12:49

distributed so now as you can see we

play12:52

have got our ciphertext so this huge

play12:54

thing right out here is ciphertext and

play12:57

it absolutely makes no sense whatsoever

play12:59

now suppose we were to actually then

play13:01

decrypt the message we would use the

play13:03

private key that goes along with our

play13:05

account and we would decode the message

play13:07

and as you guys can see voila we have hi

play13:10

there when is the exam tomorrow so we

play13:12

have actually sent a message on the

play13:14

Internet in a very secure fashion above

play13:16

that there's also RSA that needs some

play13:18

explaining because our promise at two

play13:20

now RSA is a very very commonly used

play13:23

algorithm that is used throughout the

play13:25

internet and you just saw it being used

play13:27

by YouTube so it has to be common

play13:29

so RSA has a very unique way of applying

play13:32

this algorithm there are many actual

play13:34

parameters that you actually need to

play13:36

study okay so now we're actually going

play13:38

to discuss RSA which is a very popular

play13:40

algorithm that is used throughout the

play13:42

internet and you also saw that it's

play13:44

being used by YouTube right now so this

play13:46

crypto system is one of the initial

play13:47

system it remains the most employed

play13:49

crypto system even today and the system

play13:52

was invented by three scholars which is

play13:54

Ron Rivest Adi Shamir and Len Adleman

play13:57

hence the name RSA and we will see the

play14:01

two aspects of the RSA cryptosystem

play14:03

firstly generation of key pair and

play14:05

secondly encryption decryption

play14:06

algorithms so each person or a party who

play14:09

desires to participate in communication

play14:11

using encryption needs to generate a

play14:13

pair of keys namely public key and

play14:15

private key so the process followed in

play14:17

the generation of keys is as follows

play14:19

first we have to actually calculate n

play14:21

now n is actually given by multiplying p

play14:24

and q as you guys can see out here so p

play14:27

and q are supposed to be very large

play14:29

prime numbers so out here P will be 35

play14:32

but for some very strong encryption we

play14:35

are going to choose very large prime

play14:36

numbers then we actually have to

play14:38

calculate Phi now Phi is you can see the

play14:41

formula goes is P minus 1 into Q minus 1

play14:43

and this helps us determine for the

play14:46

encryption algorithm now then we have to

play14:49

actually calculate e now he must be

play14:51

greater than 1 and less than Phi which

play14:53

is P minus 1 into Q minus 1 and there

play14:56

must be no common factors for e and Phi

play14:58

except for one so in other words they

play15:00

must be co-prime to each other now to

play15:03

form the public key the pair of numbers

play15:05

m and e form the RSA public key system

play15:08

this is actually made public and is

play15:10

distributed throughout the network

play15:12

interestingly though

play15:13

n is a part of the public key and the

play15:16

difficulty in factorizing a large prime

play15:18

number ensures that the attacker cannot

play15:20

find in finite time the two Prime's that

play15:22

is P and Q that is used to obtain M this

play15:25

actually ensures the strength of RSA now

play15:28

in the generation of the private key the

play15:31

private key D is calculated from P Q and

play15:34

for a given n and E there is a unique

play15:37

number D now the number D is the inverse

play15:39

of e modulo 5

play15:41

this means that D is the number less

play15:43

than Phi such that when multiplied by e

play15:46

it gives 1 so let's go and actually fill

play15:49

up these numbers so n should be 35 out

play15:53

here and if we generate them we get the

play15:56

value of 5 which is 24 which is

play15:58

basically 4 into 6 and then we should

play16:01

also get e it's now it should be

play16:03

co-prime so we are going to give it 11

play16:05

as 11 is co-prime to both so now for the

play16:10

actual encryption part we have to put in

play16:12

E and n out here so e out here for us is

play16:16

11 and n is 35 and then we're gonna pick

play16:21

a letter to actually cipher which is a

play16:23

and then we are going to encode it as a

play16:26

number so as you guys can see we've

play16:28

encoded as 1 and out here now after

play16:32

we've given the message its numerical

play16:34

form you click on encryption and we get

play16:37

it now to actually decrypt the message

play16:39

we are gonna need D and n now D for us

play16:42

was 5 and n was 35 so 5 and 35 and then

play16:49

we're gonna take encrypted message from

play16:51

above and we're going to decrypt this

play16:53

message so after you decrypt it we have

play16:57

the numerical form of the plaintext and

play16:59

then decode the message is like your

play17:01

decode message and as you guys can see

play17:03

we have decoded a message using RSA so

play17:06

guys that's how RSA works I explain all

play17:09

the factors that we actually use an RSA

play17:12

from n 2 v 2e e 2 D and I hope you

play17:16

understood a part of it if y'all are

play17:18

still more interested you all can

play17:20

actually research a lot on RSA it's a

play17:22

very in-depth cryptography system and

play17:24

also that brings us to the end of this

play17:27

session I hope you guys had fun learning

play17:29

about cryptography and the different

play17:31

methods that are actually used on the

play17:33

Internet that's it for me goodbye

play17:36

I hope you have enjoyed listening to

play17:38

this video please be kind enough to like

play17:40

it and you can comment any of your

play17:42

doubts and queries and we will reply

play17:45

them at the earliest do look out for

play17:47

more videos in our playlist and

play17:49

subscribe to any rekha channel to learn

play17:52

more happy learning

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
CryptographyData SecurityRSA AlgorithmEncryption KeysDigital CertificatesSecure CommunicationCybersecurityInformation ProtectionCryptographic SystemsOnline Privacy