1 00:00:01,590 --> 00:00:08,940 We are making a great progress towards asymmetric encryption and photography, we have already discussed 2 00:00:08,940 --> 00:00:13,320 about what is cryptography and what is symmetric encryption. 3 00:00:13,650 --> 00:00:19,920 Now, let us move on to the next part of cryptography, which is asymmetric encryption, as the name 4 00:00:19,920 --> 00:00:20,400 suggests. 5 00:00:20,400 --> 00:00:27,790 It's not symmetric, which means there are two keys which are used to encrypt and decrypt the message. 6 00:00:27,810 --> 00:00:33,900 So one key is used to lock your house and different key is used to unlock your house. 7 00:00:34,770 --> 00:00:43,320 So these two keys in asymmetric encryption, Adonis, public and private key, which means that you 8 00:00:43,320 --> 00:00:48,420 can unlock the door, you can lock with public key and you can unlock with private key. 9 00:00:48,750 --> 00:00:53,430 So they are, you know, apair or you can unlock with private key. 10 00:00:53,430 --> 00:00:54,840 Unlock with public key. 11 00:00:55,650 --> 00:00:59,690 So the first option here is you have to encrypt with the public key. 12 00:00:59,700 --> 00:01:05,550 So if that is in a document you want to send over, you have to encrypt it publicly and then you can 13 00:01:05,550 --> 00:01:14,670 decrypt it private key or you can encrypt with the private key and then decrypt with the public to know 14 00:01:15,210 --> 00:01:17,930 which one is more secure over here. 15 00:01:17,940 --> 00:01:24,570 And it's like if Alice wants to send something, both the keys should be of Alice. 16 00:01:24,930 --> 00:01:30,500 You can't encrypted publicly of Bob and then decrypt with private key of Alice. 17 00:01:30,510 --> 00:01:31,860 That doesn't work. 18 00:01:32,190 --> 00:01:35,730 The algorithm is not designed in that way. 19 00:01:36,210 --> 00:01:41,850 Or you cannot encrypt with Bob's private key and then decrypt with Alice's public key. 20 00:01:42,540 --> 00:01:48,390 So what you can do here is you can if you want to send me data, if you want to send me a document, 21 00:01:48,870 --> 00:01:55,710 you can either encrypt with my public key here and then I will decrypt it with my private key. 22 00:01:56,100 --> 00:02:02,000 Or you can encrypt with my private key and then I will decrypt my public key. 23 00:02:02,760 --> 00:02:06,600 So which one is more secure now before that? 24 00:02:06,690 --> 00:02:14,010 Public key is of public knowledge, which means that is a repository and public key is available to 25 00:02:14,010 --> 00:02:17,410 everyone and anyone can access your public key. 26 00:02:18,150 --> 00:02:23,520 For example, if you're using WhatsApp, when you are trying to converse, you can see in your settings 27 00:02:23,520 --> 00:02:30,090 that there's an option, which is this jacket is end to end encrypted, which means that the public 28 00:02:30,090 --> 00:02:36,690 key of you and your friend is stored in the WhatsApp database and the internal application can access 29 00:02:36,690 --> 00:02:40,980 any public but private key is stored to you. 30 00:02:41,820 --> 00:02:47,710 So in a couple of times, I will give you time to think which one is more secure over here. 31 00:02:48,690 --> 00:02:54,390 So these are the examples of asymmetric encryption, the reversed Shamy Adilman. 32 00:02:54,390 --> 00:02:56,760 These three people were outstanding minds. 33 00:02:56,760 --> 00:03:01,620 They developed this algorithm, which is used as asymmetric encryption. 34 00:03:02,250 --> 00:03:10,320 Then as I explained in the last lecture that Diffie Helmund Exchange uses these terms for elliptic curve 35 00:03:10,320 --> 00:03:11,190 cryptography. 36 00:03:11,190 --> 00:03:13,230 It's a very modern cryptography. 37 00:03:13,230 --> 00:03:16,050 It's hugely vague and advanced. 38 00:03:16,560 --> 00:03:21,120 And then we have El-Gamal cryptography along that. 39 00:03:21,690 --> 00:03:25,350 We have the digital signature algorithm nowadays. 40 00:03:25,350 --> 00:03:28,260 You must have heard about this word very often. 41 00:03:28,260 --> 00:03:30,330 This word right here, digital signature. 42 00:03:30,330 --> 00:03:32,820 Every one of us is using digital signature. 43 00:03:33,270 --> 00:03:35,680 So this algorithm is also very common. 44 00:03:35,910 --> 00:03:36,510 Yes. 45 00:03:36,510 --> 00:03:39,630 We are going to talk about this in the coming lecture's. 46 00:03:40,910 --> 00:03:49,820 And as we know, symmetric encryption was known as private encryption or security encryption, but asymmetric 47 00:03:49,820 --> 00:03:52,430 encryption is known as public encryption. 48 00:03:52,520 --> 00:03:55,280 Why it is called public encryption. 49 00:03:55,310 --> 00:03:59,120 Well, this is a hint for you for this problem here. 50 00:03:59,120 --> 00:04:01,370 Why this is called as a public encryption. 51 00:04:01,830 --> 00:04:04,760 We will see in some couple of lectures. 52 00:04:05,870 --> 00:04:11,690 The drawback is that since there is involvement of two different keys and different prime numbers and 53 00:04:11,690 --> 00:04:17,060 generators, asymmetric encryption takes more time than symmetric encryption. 54 00:04:17,420 --> 00:04:23,470 Obviously, you if you have two different keys to unlock and lock the same thing, it will take time. 55 00:04:23,480 --> 00:04:23,830 Right. 56 00:04:24,260 --> 00:04:27,020 But if you have one key, you can do it very quickly. 57 00:04:27,530 --> 00:04:34,430 So asymmetric encryption takes a lot of time as compared to symmetric encryption. 58 00:04:35,660 --> 00:04:40,400 So these are the examples of asymmetric encryption RSA. 59 00:04:40,410 --> 00:04:47,300 It has a key generation that go to them and it has a signature generation and then verification algorithm 60 00:04:48,080 --> 00:04:48,830 in the same way. 61 00:04:48,830 --> 00:04:50,660 Defilement is this formula. 62 00:04:50,690 --> 00:04:57,980 So this formula is very important and is equal to Jedi's to key maad be what are the elements, what 63 00:04:57,980 --> 00:05:00,230 is and what is what is key. 64 00:05:00,320 --> 00:05:07,220 What is B we will be exploring when we have a different lecture on the defilement key exchange algorithm 65 00:05:08,000 --> 00:05:08,870 for time being. 66 00:05:09,200 --> 00:05:13,130 What you need to remember is there are two different keys, just like me. 67 00:05:13,130 --> 00:05:15,840 It is just make some important points. 68 00:05:16,340 --> 00:05:16,940 All right. 69 00:05:17,450 --> 00:05:21,050 So what do you have to remember is you have to take that. 70 00:05:21,050 --> 00:05:28,870 There are two different keys, public and private key decide which one is more beneficial. 71 00:05:29,450 --> 00:05:34,340 You have to remember Oddisee, Diffie, Heldman, BSE. 72 00:05:34,580 --> 00:05:37,260 And the drawback, it is very important. 73 00:05:37,550 --> 00:05:40,310 So these five to six points are very important. 74 00:05:40,310 --> 00:05:47,390 If you want to correct any question when it comes to asymmetric encryption, in the next lecture, we 75 00:05:47,390 --> 00:05:52,040 will be talking about working of asymmetric encryption. 76 00:05:52,820 --> 00:05:53,330 All right. 77 00:05:53,570 --> 00:05:55,870 I will see you in the next lecture.