1 00:00:00,180 --> 00:00:06,130 So before going in to some algorithms, you should know about some terminology in the cryptography. 2 00:00:06,870 --> 00:00:08,540 So first one is the protection. 3 00:00:08,760 --> 00:00:11,300 This is the actual message Sender wants to send to receiver. 4 00:00:11,580 --> 00:00:15,600 So this actual message I want if I want to say hi to you, see what I say? 5 00:00:15,600 --> 00:00:15,930 Hi. 6 00:00:15,930 --> 00:00:16,300 Hello. 7 00:00:16,650 --> 00:00:23,430 That is called a text and a ciphertext is this is unintelligible text and no person cannot understand 8 00:00:23,430 --> 00:00:23,640 this. 9 00:00:23,850 --> 00:00:31,290 So I perform some operation on my plain text to decipher text and I will send this over to my receiver 10 00:00:31,950 --> 00:00:32,820 and encryption. 11 00:00:33,210 --> 00:00:37,540 The process of converting this print into ciphertext is called encryption. 12 00:00:38,070 --> 00:00:42,300 OK, the actual words I'm doing on a print is called encryption. 13 00:00:42,300 --> 00:00:44,400 After encryption, I get this over text. 14 00:00:45,650 --> 00:00:49,900 And the decryption the process of converting ciphertext into plain text is called decryption. 15 00:00:50,540 --> 00:00:58,440 So on every single said that he should perform this operation called encryption, and this process automatically 16 00:00:58,440 --> 00:01:00,110 comes with the same protection, the plaintext. 17 00:01:01,410 --> 00:01:06,600 So encryption should be performed at the central side and the convention will be performed at the site. 18 00:01:08,360 --> 00:01:14,330 And is the shadow of understanding how cryptograms works and finding weaknesses. 19 00:01:16,970 --> 00:01:26,060 This is this is exactly the crucial, but it's not capricious, don't know how this process has worked. 20 00:01:26,250 --> 00:01:28,520 I can confirm decryption, but. 21 00:01:29,540 --> 00:01:33,470 Cryptanalysis is very often training how algorithms and finding weaknesses. 22 00:01:33,680 --> 00:01:42,050 So if I use this week mathematical models are just simple mathematical model, uh, for converting the 23 00:01:42,050 --> 00:01:46,820 production design protection than any other can, just these algorithms. 24 00:01:47,030 --> 00:01:54,620 And they can just decipher their own way, even though the 100 percent decipher the text, they can 25 00:01:54,620 --> 00:01:56,010 get the intention. 26 00:01:56,030 --> 00:01:59,320 What I want to send the message to the receiver. 27 00:02:00,140 --> 00:02:04,850 So the person who does this cryptanalysis process is called cryptologist. 28 00:02:05,570 --> 00:02:07,150 So we have this to with the. 29 00:02:07,880 --> 00:02:12,980 So he's a mathematician and perished because he does not know how it works. 30 00:02:12,980 --> 00:02:19,010 But he studies the algorithm and he observes that some ciphertext, how it's being converted from the 31 00:02:19,030 --> 00:02:26,780 plaintext and by finding the weaknesses and he found he discovered the Enigma cipher that cryptanalysis 32 00:02:26,960 --> 00:02:27,440 works. 33 00:02:29,930 --> 00:02:36,590 And the first one you're going to see about different emphasis substitutions ever, so the name implies 34 00:02:36,740 --> 00:02:37,630 the substitution. 35 00:02:37,640 --> 00:02:41,350 So we are substituting something instead of our plain text. 36 00:02:42,170 --> 00:02:45,440 So these are simply some other characters. 37 00:02:45,680 --> 00:02:46,910 So these are assumptions. 38 00:02:46,910 --> 00:02:47,320 I was. 39 00:02:48,700 --> 00:02:56,110 So these obstetrician's are good, but also somewhat easy to crack, like if I put every other substitution, 40 00:02:56,350 --> 00:03:01,570 I got ASCII characters, substitution, I get so many paragraphs. 41 00:03:01,570 --> 00:03:05,350 But in that are paragraphs one paragraph, maybe overprotection. 42 00:03:06,300 --> 00:03:12,610 So this is like basic sofas and next on is blocks for these sofas operate on some breakoff bits. 43 00:03:12,930 --> 00:03:16,290 So you take some of that to do with Artie Shaw. 44 00:03:16,470 --> 00:03:18,750 And this I was operates on those bits. 45 00:03:19,380 --> 00:03:23,040 Examples are the servants and Sagara atoms. 46 00:03:25,020 --> 00:03:30,920 And Semitic and Christians, the same user at the encryption and as well as the Christians. 47 00:03:31,260 --> 00:03:32,760 So there is some key. 48 00:03:33,600 --> 00:03:37,120 You use the encryption inside and outside the so. 49 00:03:37,230 --> 00:03:43,760 So this key is very like part of this mathematical operation, performing on a plain text. 50 00:03:44,730 --> 00:03:49,470 And with this key, only the receiver can decrypt at the other. 51 00:03:51,070 --> 00:03:58,240 So one good thing about this encryption that these encryption are fading fast and also very fast for 52 00:03:58,240 --> 00:04:08,260 the future, but the disadvantages, if the key was seen or got triggered by another person, they can 53 00:04:08,260 --> 00:04:15,540 use the same key for the decryption so that you need to safely secure the key to the receiver. 54 00:04:15,600 --> 00:04:15,850 So. 55 00:04:17,040 --> 00:04:23,160 And the next one is asymmetric encryption, public use for encryption and private keys for the future. 56 00:04:23,400 --> 00:04:28,500 So in these encryption, we used to kiss one Nisga'a public and leaves. 57 00:04:28,650 --> 00:04:36,190 It can be used by anyone because public key is used for encryption only even the attacker. 58 00:04:36,190 --> 00:04:37,560 Our hacker knows this publicly. 59 00:04:37,560 --> 00:04:38,580 He cannot do anything. 60 00:04:39,840 --> 00:04:41,820 And the private key is used for decryption. 61 00:04:41,970 --> 00:04:44,010 So this is a very important key. 62 00:04:44,160 --> 00:04:45,780 You need to safely. 63 00:04:47,660 --> 00:04:53,840 Sent to the receiver or receiver should also should know already this private key is used only for the 64 00:04:53,840 --> 00:04:54,310 creature. 65 00:04:54,590 --> 00:05:01,350 If this is known by a hacker, then this encryption, since he knows the plaintext. 66 00:05:01,370 --> 00:05:05,000 So this private key should be stored securely. 67 00:05:06,730 --> 00:05:11,370 The next one, we're going to see the ARE certificate, these are difficult times to establish a clear 68 00:05:11,450 --> 00:05:12,770 connection between the two. 69 00:05:13,340 --> 00:05:19,850 So, for example, is this a certificate so that you can see this as a certificate in your website? 70 00:05:20,690 --> 00:05:21,460 Like a.. 71 00:05:21,480 --> 00:05:22,980 Yes, like six years ago. 72 00:05:23,750 --> 00:05:25,370 Wondering about encryption and so on. 73 00:05:26,940 --> 00:05:33,690 So even though if you're using plaintext protocols like it should be, but if you have these SSL certificate, 74 00:05:33,930 --> 00:05:40,140 you can establish a secure connection between your secure innocence and encrypted connection between 75 00:05:40,680 --> 00:05:47,410 your so your data will go encrypted and also acrobatically the group at the receiver. 76 00:05:47,700 --> 00:05:49,430 That is a the certificate. 77 00:05:49,440 --> 00:05:53,670 And I always want to associate with it for websites. 78 00:05:54,210 --> 00:05:59,640 So these are the basic terms you need to know to get started on the cryptography. 79 00:06:00,780 --> 00:06:07,950 I think if there is another tool we have, we are coming to our next straight our next two years, then 80 00:06:07,950 --> 00:06:10,140 I will explain that in that video.