1 00:00:01,260 --> 00:00:08,660 All right, without wasting any much time around cryptography, let us get started with the most of 2 00:00:08,860 --> 00:00:12,980 the topic of symmetric encryption and asymmetric encryption. 3 00:00:13,710 --> 00:00:21,390 So what is cryptography is you encrypt data, you pass the encrypted text and decipher text, and then 4 00:00:21,390 --> 00:00:22,650 you decrypt the data. 5 00:00:22,800 --> 00:00:30,270 OK, so now there are two major types of encryption that we are going to see, symmetric encryption 6 00:00:30,270 --> 00:00:31,830 and asymmetric encryption. 7 00:00:32,430 --> 00:00:37,980 So let us consider that you have this document over here and this is very confidential, okay? 8 00:00:37,990 --> 00:00:44,450 It has some sort of statistics that only you want, that only your boss wants to know. 9 00:00:44,460 --> 00:00:47,430 You don't want to leak any confidential information. 10 00:00:48,270 --> 00:00:52,990 So what you do is you lock this document, okay? 11 00:00:53,040 --> 00:00:55,740 You lock this document with a key. 12 00:00:55,920 --> 00:01:02,350 Now, remember, now this is the key which we have used in order to encrypt this data. 13 00:01:02,370 --> 00:01:05,960 So when you encrypt this document, it is locked. 14 00:01:06,000 --> 00:01:13,680 OK, so this is the lock for what you do is you transfer, you encrypt, and it gives you an encrypted 15 00:01:13,680 --> 00:01:16,380 document, a cipher document. 16 00:01:16,380 --> 00:01:21,930 You can call this as a text encrypted with one key. 17 00:01:21,930 --> 00:01:23,710 It is known as a ciphertext. 18 00:01:24,330 --> 00:01:33,510 Now, what you do is you pass over the ciphertext and once you pass the ciphertext, the if you if someone 19 00:01:33,510 --> 00:01:37,950 wants to read this ciphertext, they will only read some gibberish characters. 20 00:01:37,950 --> 00:01:40,530 They won't know what they've actually done. 21 00:01:40,950 --> 00:01:43,380 And that is the encryption algorithm. 22 00:01:43,740 --> 00:01:47,420 We are going to see different types of encryption algorithm. 23 00:01:47,760 --> 00:01:52,980 We are also going to see some live conversions and encryption. 24 00:01:53,340 --> 00:02:01,860 So just remember that when you take a plain text and you encrypted with a key, it gives you a cipher 25 00:02:01,860 --> 00:02:02,320 text. 26 00:02:03,420 --> 00:02:05,280 So now you have the ciphertext. 27 00:02:05,280 --> 00:02:07,860 But how are you going to decrypt the ciphertext? 28 00:02:08,290 --> 00:02:15,360 Well, in the same way, consider this situation as this is your house and you know what's inside the 29 00:02:15,360 --> 00:02:15,810 house. 30 00:02:15,810 --> 00:02:18,180 You know what is inside your own house. 31 00:02:18,540 --> 00:02:23,110 You know where your wardrobe is, where your kitchen is, where your money is in the house. 32 00:02:23,650 --> 00:02:29,160 Now, let's consider your going out on a business trip and you don't want anyone to enter your house. 33 00:02:29,190 --> 00:02:32,040 Well, every one of us wish the same. 34 00:02:33,000 --> 00:02:36,450 Now, what you do is you lock your house with a lock and you have the key. 35 00:02:36,900 --> 00:02:38,270 So this is a locked house. 36 00:02:38,520 --> 00:02:39,800 This is your locked house. 37 00:02:40,200 --> 00:02:48,750 Now, when you return, you have the key you unlock and then you get the original documents. 38 00:02:48,750 --> 00:02:57,120 So you get into your house and you can see that this is the same key that we had used to lock and we 39 00:02:57,120 --> 00:02:59,070 have also used to unlock. 40 00:02:59,490 --> 00:03:03,690 And that is why the name is symmetric encryption. 41 00:03:03,690 --> 00:03:09,360 Only one key is used to encrypt, that is to lock. 42 00:03:09,780 --> 00:03:15,370 And the same key is then used to decrypt, that is unlock. 43 00:03:16,860 --> 00:03:26,760 So this is known as symmetric encryption, where you use one key to unlock or lock the message and you 44 00:03:26,760 --> 00:03:30,870 use the same key to unlock so that there is no other thing. 45 00:03:30,870 --> 00:03:33,360 You just lock and unlock the box. 46 00:03:34,170 --> 00:03:39,250 If you want to remember asymmetric encryption, remember that you have your house, you're going on 47 00:03:39,250 --> 00:03:44,880 a vacation, you lock your house, you come back, you unlock your house with the same key and that 48 00:03:44,880 --> 00:03:46,560 is symmetric encryption. 49 00:03:47,610 --> 00:03:52,200 And that is another type of encryption, which is asymmetric encryption. 50 00:03:52,740 --> 00:03:57,720 So let us see how many keys are used in asymmetric encryption. 51 00:04:00,000 --> 00:04:02,760 So let us have a look at asymmetric encryption. 52 00:04:02,780 --> 00:04:05,210 Again, this is the original plain text. 53 00:04:06,410 --> 00:04:07,310 This is the key. 54 00:04:08,290 --> 00:04:18,490 You have encrypted this document to give you the ciphertext now, since this is asymmetric encryption, 55 00:04:20,800 --> 00:04:29,750 what are you going to do is you have another key here, then you unlock and you get the original document. 56 00:04:30,580 --> 00:04:32,380 So what's the exact difference? 57 00:04:32,410 --> 00:04:39,630 Well, you locked with this key, the first key, and then you unlocked with this key. 58 00:04:39,670 --> 00:04:40,870 That is the second key. 59 00:04:41,500 --> 00:04:49,910 So here in asymmetric encryption, two keys are used in order to encrypt and decrypt. 60 00:04:50,470 --> 00:04:56,520 Well, you can also encrypt with this black key here and you can also decrypt this key. 61 00:04:56,890 --> 00:05:01,360 But what you need to understand is you need to have two different keys. 62 00:05:02,710 --> 00:05:10,270 Again, if you want to visualize this example, let's say you are going on a business trip and right 63 00:05:10,270 --> 00:05:14,170 now your wife is at the office and you have to go urgently. 64 00:05:14,170 --> 00:05:17,930 You have a plane to catch and you don't know what to do. 65 00:05:17,950 --> 00:05:23,770 So what you do is you have a copy of your keys so that even if you lock with the key, you have your 66 00:05:23,770 --> 00:05:27,780 wife can unlock your house with the key she has. 67 00:05:28,180 --> 00:05:31,990 So in that way you can walk and therefore you have to keys. 68 00:05:31,990 --> 00:05:34,300 And it is asymmetric encryption. 69 00:05:34,720 --> 00:05:39,190 You lock with one key and then you unlock the text with a different key. 70 00:05:39,940 --> 00:05:45,760 In cryptographic world, these two keys are known as public and private keys. 71 00:05:46,060 --> 00:05:52,750 So you can either encrypt with the public key and then decrypt with the private key, or you can encrypt 72 00:05:52,750 --> 00:05:56,110 with the private key and then decrypt with the public. 73 00:05:57,220 --> 00:05:58,320 You will have a question. 74 00:05:58,330 --> 00:06:01,670 OK, if there are two methods, which one is the most secure? 75 00:06:02,500 --> 00:06:08,950 Well, I want you to think over this because we are going to see asymmetric encryption in later part 76 00:06:08,950 --> 00:06:09,640 of this course. 77 00:06:10,030 --> 00:06:16,510 But if you are curious, I would like to give I would like to give you, let's say, two to three days 78 00:06:16,510 --> 00:06:19,720 if you want, or two to three lectures to think so. 79 00:06:19,720 --> 00:06:21,010 Stress on this point. 80 00:06:21,160 --> 00:06:27,090 If we can encrypt with private key as well as public key, which key will you use? 81 00:06:27,880 --> 00:06:34,060 And I would like to give you a hint that public key is public knowledge, which is it is available to 82 00:06:34,060 --> 00:06:34,640 everyone. 83 00:06:35,080 --> 00:06:42,610 So now, while we are going to study about asymmetric encryption, those who have this question, keep 84 00:06:42,610 --> 00:06:43,470 your answer ready. 85 00:06:43,990 --> 00:06:49,440 The first option is you can encrypt with private key and then decrypt it public. 86 00:06:49,930 --> 00:06:54,970 Or the second option is you can encrypt with public key and decrypt it private. 87 00:06:56,140 --> 00:07:04,230 So this lecture was about two types of encryption, symmetric encryption and asymmetric encryption in 88 00:07:04,300 --> 00:07:04,930 the device. 89 00:07:06,070 --> 00:07:12,240 So you have this one guy over here, these two guys are saying, OK, I'll just erase everything. 90 00:07:12,250 --> 00:07:12,610 Yes. 91 00:07:12,610 --> 00:07:13,410 No, it's perfect. 92 00:07:13,960 --> 00:07:19,240 So when it comes to asymmetric encryption, you had two keys here. 93 00:07:20,020 --> 00:07:27,250 You had two keys, but the keys were exactly the same because you use the exact same keys to encrypt 94 00:07:27,490 --> 00:07:29,580 the message and decrypt the message. 95 00:07:30,850 --> 00:07:38,250 But when it came to us asymmetric encryption, you had two different keys to encrypt and decrypt. 96 00:07:38,620 --> 00:07:40,650 I hope this lecture was pretty clear. 97 00:07:40,900 --> 00:07:43,030 This is just a high level idea. 98 00:07:43,040 --> 00:07:51,970 We have not yet dive into the deep of symmetric and asymmetric encryption, but in the next lecture 99 00:07:52,270 --> 00:07:58,250 we are going to talk about different types of ciphers which are used in modern cryptography. 100 00:07:58,810 --> 00:08:01,260 I will see you in the next lecture.