1 00:00:08,110 --> 00:00:11,960 Let us continue with the cryptography section in this video. 2 00:00:12,400 --> 00:00:19,510 I am going to cover similar to key cryptography or asymmetric encryption, and I will give you a real 3 00:00:19,510 --> 00:00:26,950 live example with Alice and Bob Symmetric, key cryptography or asymmetric encryption, the type of 4 00:00:26,950 --> 00:00:32,890 encryption scheme in which the same key is used both to encrypt and decrypt the messages. 5 00:00:33,610 --> 00:00:39,340 Such a method of encoding information has been largely used in the past decades to facilitate secret 6 00:00:39,340 --> 00:00:42,070 communication between governments and militaries. 7 00:00:42,790 --> 00:00:48,310 Nowadays, similar algorithms are widely applied in various types of computer systems. 8 00:00:48,550 --> 00:00:50,260 Glennon's data security. 9 00:00:50,950 --> 00:00:57,190 Now I would like to explain you symmetric encryption with a real life example of Alice and Bob. 10 00:00:58,110 --> 00:01:05,070 Consider at least one to send a private image to Bob, and the only easy way to communicate is via postal 11 00:01:05,070 --> 00:01:05,330 M.. 12 00:01:06,270 --> 00:01:11,640 Unfortunately, Alice is pretty much sure that the postman is reading the mail she sends. 13 00:01:12,390 --> 00:01:13,740 This makes Alice said. 14 00:01:14,190 --> 00:01:20,910 So she decides to find a way to send a message to Bob without anyone else being able to read them. 15 00:01:21,630 --> 00:01:26,390 Alice decides to put the message inside a lock box, then mail the box to Bob. 16 00:01:26,910 --> 00:01:30,330 She buys a lock box and two identical keys to open it. 17 00:01:30,870 --> 00:01:37,350 But then she realizes she can send the key to open the box to Bob via mail, as the mailman might open 18 00:01:37,350 --> 00:01:39,150 the package and take a copy of the key. 19 00:01:39,780 --> 00:01:44,910 And still, Alice arranges to meet Bob at nearby, but to give him one of the keys. 20 00:01:45,360 --> 00:01:48,540 It's inconvenient, but she only has to do it once. 21 00:01:49,020 --> 00:01:51,510 After meeting Bob, Alice gets home. 22 00:01:51,930 --> 00:01:55,170 He uses her key local message into the lock box. 23 00:01:55,900 --> 00:01:58,290 Then she sends the lock box to Bob. 24 00:01:59,010 --> 00:02:02,890 The mailman could look at the outset or even throw the box away. 25 00:02:03,060 --> 00:02:09,270 So Bob doesn't read the message, but there is no way he can read the message as he has no way of opening 26 00:02:09,270 --> 00:02:09,930 the lock box. 27 00:02:10,750 --> 00:02:16,450 Now, Bob can use his identical key to unlock the lock box and read the message. 28 00:02:16,950 --> 00:02:17,910 This works well. 29 00:02:18,300 --> 00:02:23,690 And now that Alice and Bob have identical keys, Bob can use the same method to security. 30 00:02:23,740 --> 00:02:26,360 Blair meeting at the bar to exchange keys. 31 00:02:26,370 --> 00:02:27,480 It's inconvenient, though. 32 00:02:27,930 --> 00:02:32,330 It gets more inconvenient when Alice and Bob on opposite sides of an ocean. 33 00:02:32,940 --> 00:02:37,800 So far, this asymmetric encryption is used, which we will see in upcoming videos. 34 00:02:38,310 --> 00:02:41,790 In the next lecture, we will see at once symmetric encryption.