1 00:00:13,180 --> 00:00:20,020 Let us continue with the section of cryptography in this section we will discuss about asymmetric encryption. 2 00:00:20,920 --> 00:00:28,870 Public key cryptography is the most revolutionary concept in last 400 years in public key cryptography 3 00:00:28,990 --> 00:00:32,080 that is asymmetric encryption to reader keys. 4 00:00:32,290 --> 00:00:37,830 Public and private keys are used publicly and be freely distributed. 5 00:00:37,840 --> 00:00:40,630 While it's very private, key remains a secret. 6 00:00:41,140 --> 00:00:44,320 The public key is used for encryption and for decryption. 7 00:00:44,620 --> 00:00:45,790 Private key is used. 8 00:00:46,840 --> 00:00:52,930 The main difference between these methods is the fact that those symmetric systems used to kill rather 9 00:00:52,930 --> 00:00:55,380 than one employed by the Semitic schemes. 10 00:00:56,080 --> 00:01:00,850 One of the keys can be publicly shared, while the other must be kept in private. 11 00:01:01,620 --> 00:01:04,060 Let us come back to the example of Alice and Bob. 12 00:01:04,630 --> 00:01:07,870 This time, Alice and Bob don't ever need to meet. 13 00:01:08,170 --> 00:01:11,230 First, Bob buys a padlock and a matching key. 14 00:01:11,800 --> 00:01:20,680 Then Bob Mills unlock padlock to Alice and keeping the key safe Alice by the simple lock box that closes 15 00:01:20,680 --> 00:01:22,930 with the padlock and puts a message in it. 16 00:01:24,330 --> 00:01:27,990 Then she locks it with Bob Spurlock and mails it to Bob. 17 00:01:30,020 --> 00:01:37,010 She knows that the mailman can't read the message as he has no way of opening the padlock when Bob receives 18 00:01:37,010 --> 00:01:40,560 the lock box, he can open it with his key and read the message. 19 00:01:41,150 --> 00:01:47,270 This only works to send messages in one direction, but Alice could buy a blue lock and the key and 20 00:01:47,270 --> 00:01:49,790 mail the ballot to Bob so that he can reply. 21 00:01:50,420 --> 00:01:57,110 Or instead of sending a message in padlock secure lock box, Alice could just send Bob one pair of identical 22 00:01:57,110 --> 00:01:57,500 keys. 23 00:01:58,870 --> 00:02:05,440 Then Alice and Bob can send messages back and forth in the Semitic lockbox, as they did in the first 24 00:02:05,440 --> 00:02:06,010 example. 25 00:02:06,580 --> 00:02:09,970 Now, I will summarize this real life example. 26 00:02:10,750 --> 00:02:14,780 Bob generates a keeper consisting of public and private key. 27 00:02:15,370 --> 00:02:22,780 Bob then publishes this public and Alice it Alice and generates a temporary Semitic. 28 00:02:23,700 --> 00:02:30,450 And uses Bob's publicly, who securely send it to Bob, Bob then uses his private key to unlock his 29 00:02:30,450 --> 00:02:31,510 copy of Tricky. 30 00:02:32,160 --> 00:02:39,060 Bob and Alice can use dosimetry keys to securely send messages back and forth in the next lecture. 31 00:02:39,330 --> 00:02:42,510 We will see advanced types of asymmetric encryption.