1 00:00:02,540 --> 00:00:07,760 Well Number seven encrypted data is only as secure as its decryption key. 2 00:00:09,530 --> 00:00:12,560 This principle is as obvious as it is overlooked. 3 00:00:15,070 --> 00:00:20,320 Some people encrypt data or passwords using a specialised program which requires a password to start 4 00:00:20,320 --> 00:00:25,450 the encryption process and then they store the decryption password on the same computer. 5 00:00:28,060 --> 00:00:31,160 This does not hinder the attack in any way. 6 00:00:31,210 --> 00:00:34,880 You have to protect the decryption key. 7 00:00:34,980 --> 00:00:39,420 The strength of encryption measures comes from the fact that it allows you to focus on protection of 8 00:00:39,420 --> 00:00:44,080 a relatively small element the key rather than the whole body of data. 9 00:00:45,460 --> 00:00:49,960 Similarly if you keep your car keys safe you don't have to worry about someone driving off with your 10 00:00:49,960 --> 00:00:50,650 car. 11 00:00:52,710 --> 00:00:57,870 But if you lock the car door and leave the keys on the car roof it would hardly protect the car from 12 00:00:57,870 --> 00:00:58,910 being stolen. 13 00:01:00,150 --> 00:01:04,160 This is a perfect metaphor for encryption measures. 14 00:01:04,280 --> 00:01:06,440 The Second Law is still valid.