1 00:00:06,730 --> 00:00:09,170 - Let's go over what are ciphers and keys 2 00:00:09,170 --> 00:00:11,180 in public key cryptography. 3 00:00:11,180 --> 00:00:15,020 And basically a cipher is a set of rules 4 00:00:15,020 --> 00:00:18,008 which can actually be called an algorithm, right? 5 00:00:18,008 --> 00:00:20,240 They're also called algorithms. 6 00:00:20,240 --> 00:00:24,330 And basically there are rules on how to perform encryption, 7 00:00:24,330 --> 00:00:27,870 or decryption of packets, or decryption of emails, 8 00:00:27,870 --> 00:00:31,680 or, you know encryption or decryption of files as well. 9 00:00:31,680 --> 00:00:35,420 Now, there are hundreds of encryptions of algorithms 10 00:00:35,420 --> 00:00:36,850 that actually available out there, right? 11 00:00:36,850 --> 00:00:39,277 And there are likely many more that are proprietary 12 00:00:39,277 --> 00:00:42,880 and used for special purposes, such as, you know, 13 00:00:42,880 --> 00:00:44,950 government and national security. 14 00:00:44,950 --> 00:00:48,740 But some of the common methods that's actually ciphers use 15 00:00:48,740 --> 00:00:51,853 as a whole is the method of substitution. 16 00:00:51,853 --> 00:00:55,570 Another method called polyalphabetic, 17 00:00:55,570 --> 00:00:58,051 and transposition as well, right? 18 00:00:58,051 --> 00:01:00,250 Now, there are also keys, 19 00:01:00,250 --> 00:01:02,120 and a key is a piece of information, 20 00:01:02,120 --> 00:01:04,270 or parameter, that actually specifies 21 00:01:04,270 --> 00:01:07,370 the output of a cryptographic algorithm. 22 00:01:07,370 --> 00:01:09,790 So you actually have a concept of a public 23 00:01:09,790 --> 00:01:12,500 and private key just as we actually mentioned 24 00:01:12,500 --> 00:01:14,040 in the previous lesson. 25 00:01:14,040 --> 00:01:15,950 However, let's actually go over how 26 00:01:15,950 --> 00:01:17,970 that works in practice, right? 27 00:01:17,970 --> 00:01:21,700 So in this screen, I actually have two entities, 28 00:01:21,700 --> 00:01:23,170 or two users. 29 00:01:23,170 --> 00:01:26,250 One is called Ben and the other one is Pete, right? 30 00:01:26,250 --> 00:01:28,830 Typically in examples of cryptography, 31 00:01:28,830 --> 00:01:31,361 you will hear, you know, the word, 32 00:01:31,361 --> 00:01:33,610 or the name, Bob and Alice, right? 33 00:01:33,610 --> 00:01:35,070 So I wanted to be a little bit more creative 34 00:01:35,070 --> 00:01:38,800 and just change names and this is Ben and Pete. 35 00:01:38,800 --> 00:01:40,020 And then you actually may have 36 00:01:40,020 --> 00:01:42,380 an attacker in between, right? 37 00:01:42,380 --> 00:01:44,300 Let's just call that Eve. 38 00:01:44,300 --> 00:01:45,880 And Eve, and you will learn, 39 00:01:45,880 --> 00:01:47,800 you know, what eavesdrop attacks are. 40 00:01:47,800 --> 00:01:50,190 Eve will actually try to eavesdrop 41 00:01:50,190 --> 00:01:54,960 the conversation between Ben and between Pete, right? 42 00:01:54,960 --> 00:01:56,240 There are many different ways 43 00:01:56,240 --> 00:01:59,790 on what you can encrypt traffic between these two entities. 44 00:01:59,790 --> 00:02:02,680 One is by actually using VPN, right? 45 00:02:02,680 --> 00:02:05,373 Things like site-to-site VPN. 46 00:02:06,240 --> 00:02:08,350 You may actually have two different routers, 47 00:02:08,350 --> 00:02:10,700 actually configure for IPv6, 48 00:02:10,700 --> 00:02:12,195 but in this case, it's actually looking 49 00:02:12,195 --> 00:02:17,195 at how Ben can actually send an encrypted email, right? 50 00:02:17,380 --> 00:02:21,770 Specifically using a protocol, or implementation, 51 00:02:21,770 --> 00:02:23,740 called Pretty Good Privacy, 52 00:02:23,740 --> 00:02:28,050 just as we mentioned before, so PGP. 53 00:02:28,050 --> 00:02:31,343 Now Ben will actually have a private, 54 00:02:34,670 --> 00:02:36,353 and a public key. 55 00:02:38,740 --> 00:02:42,060 And also Pete will actually have a private and a public key. 56 00:02:42,060 --> 00:02:46,310 And Ben and Pete will actually change, 57 00:02:46,310 --> 00:02:50,700 or share, their public keys to each other. 58 00:02:50,700 --> 00:02:54,040 That means that for Ben to be able to actually encrypt 59 00:02:54,040 --> 00:02:59,040 an email to Pete, he will actually use his public key 60 00:03:01,734 --> 00:03:03,800 to encrypt that email. 61 00:03:03,800 --> 00:03:07,310 And then Pete will actually use his private key 62 00:03:10,810 --> 00:03:13,430 to decrypt that email, right? 63 00:03:13,430 --> 00:03:14,940 So that's actually the main purpose 64 00:03:14,940 --> 00:03:16,850 of the public and private keys. 65 00:03:16,850 --> 00:03:18,636 Again, you actually keep your private key 66 00:03:18,636 --> 00:03:20,730 all the time with you. 67 00:03:20,730 --> 00:03:22,616 If that key is actually compromised, 68 00:03:22,616 --> 00:03:27,350 you actually have to regenerate your key pair once again 69 00:03:27,350 --> 00:03:29,540 and revoke your keys. 70 00:03:29,540 --> 00:03:31,970 So that's the process of revocations 71 00:03:31,970 --> 00:03:33,870 and you will learn about revocation 72 00:03:33,870 --> 00:03:37,310 once we actually cover digital certificates later 73 00:03:37,310 --> 00:03:38,273 in this course.