1 00:00:00,330 --> 00:00:07,200 All right, this is the last lecture of this wonderful section of cryptography, so let us conclude 2 00:00:07,200 --> 00:00:13,290 this section by starting with certificate authority now, who is a certificate authority? 3 00:00:13,650 --> 00:00:20,120 Certificate Authority is an organization which is use a digital certificate to its user. 4 00:00:20,460 --> 00:00:29,280 So it's the topmost organization in any digital security which has the ability to authenticate a user 5 00:00:29,490 --> 00:00:33,240 based on certain verification of credentials. 6 00:00:33,960 --> 00:00:39,040 So Certificate Authority is one who assumes the identity of a person. 7 00:00:39,360 --> 00:00:46,200 So basically they take some sort of verification and then they issue the digital certificate to the 8 00:00:46,200 --> 00:00:53,190 person stating that, OK, I have identified the person to consider. 9 00:00:53,520 --> 00:01:00,600 We have our friend Bob over here and this is the Certificate Authority right over here. 10 00:01:03,070 --> 00:01:09,340 So Bob wants to get verified from this certificate authority, so in order to get verified and get a 11 00:01:09,340 --> 00:01:16,240 digital certificate from him, he sends his public key to the certificate attardi he will never send 12 00:01:16,240 --> 00:01:22,270 his private key because his private key is his own belonging and he should never share it to anyone, 13 00:01:22,270 --> 00:01:25,360 even even if it's the certificate authority. 14 00:01:25,980 --> 00:01:29,830 Bob sends this public to certificate authority. 15 00:01:30,610 --> 00:01:38,380 National Certificate Authority asks Bob for some verification type things, and once they have verified 16 00:01:38,380 --> 00:01:42,160 Bob, they issue the digital certificate to Bob. 17 00:01:43,060 --> 00:01:50,620 So now Bob has the digital certificate from this authority and therefore Bob can use this digital certificate 18 00:01:50,830 --> 00:01:53,180 for signing different documents. 19 00:01:53,560 --> 00:02:01,930 And so if someone wants to check the legitimacy, so if Bob has to send some documents to Alice, Alice 20 00:02:01,930 --> 00:02:07,380 can simply see if the digital certificate is valid and if it is valid. 21 00:02:07,390 --> 00:02:15,220 She has no option but to trust because after all this digital certificate has been issued by a legitimate 22 00:02:15,220 --> 00:02:18,730 certificate authority, there are many authorities. 23 00:02:18,730 --> 00:02:25,180 There is a hierarchy of authority and will try to include some practical based on digital signatures 24 00:02:25,180 --> 00:02:25,760 as well. 25 00:02:26,110 --> 00:02:29,260 So if you want to know more, stay tuned. 26 00:02:29,560 --> 00:02:31,380 Keep on checking the content. 27 00:02:31,390 --> 00:02:35,100 Every month there will be some sort of new additions as well. 28 00:02:35,560 --> 00:02:40,810 So apart from this, I really enjoyed you teaching this wonderful section. 29 00:02:41,170 --> 00:02:47,140 So I don't know if there are any more lectures in front because my team is constantly working to deliver 30 00:02:47,140 --> 00:02:47,920 new content. 31 00:02:48,220 --> 00:02:53,920 So I'll not say this is the last lecture of the scores, but again, all the very best if it is the 32 00:02:53,920 --> 00:02:57,030 last lecture, all the very best for your future. 33 00:02:57,040 --> 00:03:04,090 And if you have any doubts regarding if you have any doubts regarding eukaryotes, you can always ask 34 00:03:04,090 --> 00:03:08,560 through the Q&A section, I'm free to support you. 35 00:03:08,590 --> 00:03:09,100 All right. 36 00:03:09,310 --> 00:03:10,590 So all the best. 37 00:03:10,600 --> 00:03:13,790 Keep moving forward and keep learning. 38 00:03:13,810 --> 00:03:16,870 It's been a great pleasure teaching you cybersecurity.