1 00:00:00,480 --> 00:00:02,160 ‫All right, how about we jump in here, guys? 2 00:00:02,460 --> 00:00:08,240 ‫So the first thing we're going to talk about is encryption or just for simplicity, symmetric encryption. 3 00:00:08,400 --> 00:00:08,770 ‫Right? 4 00:00:09,000 --> 00:00:09,980 ‫I have a text. 5 00:00:10,020 --> 00:00:11,250 ‫This is a beautiful text. 6 00:00:11,250 --> 00:00:12,150 ‫I have my data. 7 00:00:12,150 --> 00:00:12,990 ‫I have my image. 8 00:00:12,990 --> 00:00:15,750 ‫I have my block PDF file. 9 00:00:15,750 --> 00:00:19,530 ‫I have my HGP get requests and I want to encrypt it. 10 00:00:19,530 --> 00:00:19,880 ‫Right. 11 00:00:20,070 --> 00:00:27,920 ‫You have this input and using a key that is a specific called symmetric key. 12 00:00:28,290 --> 00:00:31,440 ‫You use it to encrypt basically everything on this text. 13 00:00:31,440 --> 00:00:31,770 ‫Right. 14 00:00:32,400 --> 00:00:39,810 ‫And then you'll end up with garbage data and to decrypt it, you use the same exact key and you get 15 00:00:39,810 --> 00:00:40,530 ‫back your text. 16 00:00:40,770 --> 00:00:43,050 ‫Very simple idea. 17 00:00:43,050 --> 00:00:48,540 ‫And that's called symmetric encryption because the same key encryption and the same key decrypts. 18 00:00:48,990 --> 00:00:55,260 ‫Yeah, we have another type of control, which is asymmetric encryption in order to communicate in a 19 00:00:55,830 --> 00:01:03,450 ‫in a in a networking architecture where I want to encrypt stuff between two parties, but we don't have 20 00:01:03,450 --> 00:01:04,460 ‫to discuss it in this video. 21 00:01:05,160 --> 00:01:06,600 ‫That's the idea of encryption. 22 00:01:06,900 --> 00:01:14,010 ‫And ever since we use encryption on pretty much every single place we can, we encrypt our passwords 23 00:01:14,010 --> 00:01:14,670 ‫in the database. 24 00:01:14,940 --> 00:01:19,110 ‫We encrypt the communication between a client and server. 25 00:01:19,230 --> 00:01:20,310 ‫She doubles everything. 26 00:01:20,700 --> 00:01:23,430 ‫And if you want to learn more, check out the playlist. 27 00:01:23,430 --> 00:01:26,040 ‫We talked about tearless transport, layer security. 28 00:01:26,250 --> 00:01:29,850 ‫Why it is important to encrypt, to encrypt everything where we can.