title
What is Cryptography? | Introduction to Cryptography | Cryptography for Beginners | Edureka

description
🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN 🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl Cryptography is essential to protect the information shared across the internet. This video on What is cryptography explaines you the fundamental concepts along with various encryption techniques. Below are the topics covered in this tutorial: 1. What is Cryptography? 2. Classification of Cryptography 3. How various Cryptographic Algorithm Works? 4. Demo: RSA Cryptography 🔵CyberSecurity Certification Training (Use Code "𝐘𝐎𝐔𝐓𝐔𝐁𝐄𝟐𝟎"): https://www.edureka.co/cybersecurity-certification-training Cybersecurity Training Playlist: https://bit.ly/2NqcTQV Subscribe to our channel to get video updates. Hit the subscribe button above. About Edureka Cyber Security Training Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access. Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses. ------------------------------------------------ Why Learn Cyber Security? Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings. --------------------------------------------------- Objectives of Edureka Cyber Security Course This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on This course focuses mainly on the basics concepts of Cyber Security In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses This course will be your first step towards learning Cyber Security -------------------------------------- Who Should go for this Training? Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:- Networking Professionals Linux Administrators ----------------------------------------------- For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free). Instagram: https://www.instagram.com/edureka_learning/ Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka

detail
{'title': 'What is Cryptography? | Introduction to Cryptography | Cryptography for Beginners | Edureka', 'heatmap': [{'end': 141.231, 'start': 128.477, 'weight': 0.728}, {'end': 302.797, 'start': 274.247, 'weight': 0.714}, {'end': 350.647, 'start': 328.829, 'weight': 0.73}, {'end': 635.92, 'start': 597.439, 'weight': 0.862}], 'summary': 'Provides an overview of cryptography, highlighting its significance in cybersecurity and secure communication. it covers topics such as encryption algorithms, rsa algorithm, and encryption techniques, offering insights into safeguarding data and ensuring privacy and integrity in modern cryptography.', 'chapters': [{'end': 60.278, 'segs': [{'end': 32.634, 'src': 'embed', 'start': 7.509, 'weight': 0, 'content': [{'end': 14.351, 'text': "Cryptography is essentially important because it allows you to securely protect data that you don't want anyone else to have access to.", 'start': 7.509, 'duration': 6.842}, {'end': 16.231, 'text': 'it is used to protect corporate secrets,', 'start': 14.351, 'duration': 1.88}, {'end': 21.552, 'text': 'secure classified information and to protect personal information to guard against things like identity theft.', 'start': 16.231, 'duration': 5.321}, {'end': 22.653, 'text': 'Hi guys.', 'start': 22.153, 'duration': 0.5}, {'end': 27.714, 'text': 'My name is Arya from edureka, and I welcome you all to another session on cybersecurity,', 'start': 22.693, 'duration': 5.021}, {'end': 32.634, 'text': "and today's video is basically going to be about cryptography now, before we actually jump into the session.", 'start': 27.714, 'duration': 4.92}], 'summary': 'Cryptography is crucial for securing data, including corporate secrets and personal information against threats like identity theft.', 'duration': 25.125, 'max_score': 7.509, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y7509.jpg'}, {'end': 67.866, 'src': 'embed', 'start': 40.58, 'weight': 1, 'content': [{'end': 46.846, 'text': 'Then we are going to go through the classifications of cryptography and how the different classificative algorithm books in the end.', 'start': 40.58, 'duration': 6.266}, {'end': 51.93, 'text': "I'm going to show you guys a nifty demo on how a popular algorithm called RSA actually works.", 'start': 47.026, 'duration': 4.904}, {'end': 54.713, 'text': "So let's get started now.", 'start': 52.691, 'duration': 2.022}, {'end': 59.397, 'text': "I'm going to take the help of an example or a scenario to actually explain what is cryptography.", 'start': 54.813, 'duration': 4.584}, {'end': 60.278, 'text': 'All right.', 'start': 60.018, 'duration': 0.26}, {'end': 63.619, 'text': "So let's say we have a person and let's call him Andy.", 'start': 60.914, 'duration': 2.705}, {'end': 67.866, 'text': 'Now suppose Andy sends a message to his friend Sam who is on the other side of the world.', 'start': 64.12, 'duration': 3.746}], 'summary': 'Classification of cryptography and rsa algorithm demonstration.', 'duration': 27.286, 'max_score': 40.58, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y40580.jpg'}], 'start': 7.509, 'title': 'Importance of cryptography', 'summary': 'Discusses the significance of cryptography in cybersecurity, emphasizing its role in safeguarding corporate secrets, classified information, and personal data from identity theft. it also outlines the covered topics, such as cryptography definition, classifications, and an rsa algorithm demo.', 'chapters': [{'end': 60.278, 'start': 7.509, 'title': 'Importance of cryptography in cybersecurity', 'summary': 'Discusses the importance of cryptography in cybersecurity, highlighting its role in protecting corporate secrets, classified information, and personal data against identity theft. it also outlines the topics to be covered, including the definition of cryptography, its classifications, and a demo of the rsa algorithm.', 'duration': 52.769, 'highlights': ['Cryptography is crucial for protecting data, including corporate secrets and personal information, to guard against identity theft.', 'The session will cover the definition of cryptography, its classifications, and a demo of the RSA algorithm.', 'The different classifications of cryptography and how the algorithms function will be explained in the session.']}], 'duration': 52.769, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y7509.jpg', 'highlights': ['Cryptography is crucial for protecting data, including corporate secrets and personal information, to guard against identity theft.', 'The session will cover the definition of cryptography, its classifications, and a demo of the RSA algorithm.', 'The different classifications of cryptography and how the algorithms function will be explained in the session.']}, {'end': 246.174, 'segs': [{'end': 173.429, 'src': 'heatmap', 'start': 128.477, 'weight': 0, 'content': [{'end': 129.999, 'text': 'Well, first of all, we have a message.', 'start': 128.477, 'duration': 1.522}, {'end': 138.468, 'text': 'This message is firstly converted into a numeric form, and then this numeric form is applied with a key called an encryption key,', 'start': 130.52, 'duration': 7.948}, {'end': 141.231, 'text': 'and this encryption key is used in an encryption algorithm.', 'start': 138.468, 'duration': 2.763}, {'end': 148.418, 'text': 'So once the numeric message and the encryption key has been applied in an encryption algorithm, what we get is called a ciphertext.', 'start': 141.691, 'duration': 6.727}, {'end': 153.409, 'text': 'Now this ciphertext is sent over the network to the other side of the world,', 'start': 149.125, 'duration': 4.284}, {'end': 162.979, 'text': 'where the other person who the message is intended for will actually use a decryption key and use the ciphertext as a parameter of a decryption algorithm,', 'start': 153.409, 'duration': 9.57}, {'end': 168.904, 'text': "and then he'll get what we actually sent as a message, and if some error had actually occurred, he'd get an error.", 'start': 162.979, 'duration': 5.925}, {'end': 173.429, 'text': "So let's see how cryptography can help secure the connection between Andy and Sam.", 'start': 169.665, 'duration': 3.764}], 'summary': 'Cryptography secures messages with encryption and decryption keys for secure communication.', 'duration': 112.515, 'max_score': 128.477, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y128477.jpg'}, {'end': 219.827, 'src': 'embed', 'start': 193.043, 'weight': 8, 'content': [{'end': 197.707, 'text': 'So now, if Andy sends the ciphertext or encrypted message over communication channel,', 'start': 193.043, 'duration': 4.664}, {'end': 201.27, 'text': "he won't have to worry about somebody in the middle of discovering the private message.", 'start': 197.707, 'duration': 3.563}, {'end': 208.244, 'text': "Even if somebody manages to discover the message, he won't be able to decrypt the message without having a proper key to unlock this message.", 'start': 201.923, 'duration': 6.321}, {'end': 215.166, 'text': 'So suppose Eve here discovers the message and he somehow manages to tamper with the message and message finally reaches Sam.', 'start': 209.044, 'duration': 6.122}, {'end': 219.827, 'text': 'Sam would need a key to decrypt the message to recover the original plaintext.', 'start': 215.686, 'duration': 4.141}], 'summary': 'Using encryption ensures secure communication, preventing unauthorized access to the private message.', 'duration': 26.784, 'max_score': 193.043, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y193043.jpg'}, {'end': 251.115, 'src': 'embed', 'start': 225.868, 'weight': 7, 'content': [{'end': 230.889, 'text': 'Now after using the key for decryption, what will come out is the original plaintext message or an error.', 'start': 225.868, 'duration': 5.021}, {'end': 233.131, 'text': 'Now this error is very important.', 'start': 231.511, 'duration': 1.62}, {'end': 238.412, 'text': 'It is the way Sam knows that message sent by Andy is not the same as the message that he received.', 'start': 233.471, 'duration': 4.941}, {'end': 242.093, 'text': 'So the error in a sense tells us that Eve has tampered with the message.', 'start': 238.853, 'duration': 3.24}, {'end': 246.174, 'text': 'Now, the important thing to note here is that in modern cryptography,', 'start': 242.813, 'duration': 3.361}, {'end': 251.115, 'text': 'the security of the system purely relies on keeping the encryption and decryption key secret.', 'start': 246.174, 'duration': 4.941}], 'summary': 'Decryption using key reveals plaintext or error. error indicates tampering. security relies on key secrecy.', 'duration': 25.247, 'max_score': 225.868, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y225868.jpg'}], 'start': 60.914, 'title': 'Cryptography and secure communication', 'summary': 'Emphasizes the importance of cryptography in securing communications, highlighting potential risks and secure communication techniques. it discusses converting messages into ciphertext and using encryption and decryption keys, with a focus on ensuring privacy, integrity, and error detection in modern cryptography.', 'chapters': [{'end': 117.137, 'start': 60.914, 'title': 'Securing communication with cryptography', 'summary': "Discusses the importance of securing communications and the potential risks of unauthorized access, emphasizing the need for cryptography to ensure privacy and integrity of messages, using the example of andy and sam's communication being intercepted by eve.", 'duration': 56.223, 'highlights': ["Cryptography is essential for ensuring the security and privacy of communications, especially in scenarios where unauthorized access can lead to catastrophic consequences, as demonstrated by the potential risks of Eve accessing Andy's private information.", 'The example of Andy sending a private message to Sam on a public forum highlights the vulnerability of communication channels and the need for secure methods to prevent unauthorized access and tampering.', 'The potential threat posed by Eve, who could not only eavesdrop but also alter messages, underscores the importance of implementing cryptography to safeguard against such malicious activities.']}, {'end': 192.403, 'start': 117.797, 'title': 'Cryptography basics', 'summary': 'Explains the process of cryptography, where a message is converted into ciphertext using an encryption key and decryption key, highlighting the secure communication techniques.', 'duration': 74.606, 'highlights': ['Cryptography involves converting a message into a numeric form and applying an encryption key, resulting in a ciphertext, ensuring secure communication.', 'The encryption key is used in an encryption algorithm to convert the numeric message into ciphertext, securing the communication process.', 'The decryption key is used to decrypt the ciphertext and obtain the original message, ensuring secure communication and data integrity.']}, {'end': 246.174, 'start': 193.043, 'title': 'Cryptography basics and message security', 'summary': 'Explains how using encryption and decryption keys in modern cryptography ensures secure communication by preventing unauthorized access and tampering with the message, with a focus on the importance of error detection in detecting message tampering.', 'duration': 53.131, 'highlights': ['Using encryption and decryption keys in modern cryptography ensures secure communication by preventing unauthorized access and tampering with the message.', 'The error in decryption indicates that the message has been tampered with, providing a crucial method for detecting unauthorized modifications.', "Even if somebody manages to discover the message, he won't be able to decrypt the message without having a proper key to unlock this message."]}], 'duration': 185.26, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y60914.jpg', 'highlights': ["Cryptography is essential for ensuring the security and privacy of communications, especially in scenarios where unauthorized access can lead to catastrophic consequences, as demonstrated by the potential risks of Eve accessing Andy's private information.", 'Using encryption and decryption keys in modern cryptography ensures secure communication by preventing unauthorized access and tampering with the message.', 'The example of Andy sending a private message to Sam on a public forum highlights the vulnerability of communication channels and the need for secure methods to prevent unauthorized access and tampering.', 'The potential threat posed by Eve, who could not only eavesdrop but also alter messages, underscores the importance of implementing cryptography to safeguard against such malicious activities.', 'Cryptography involves converting a message into a numeric form and applying an encryption key, resulting in a ciphertext, ensuring secure communication.', 'The encryption key is used in an encryption algorithm to convert the numeric message into ciphertext, securing the communication process.', 'The decryption key is used to decrypt the ciphertext and obtain the original message, ensuring secure communication and data integrity.', 'The error in decryption indicates that the message has been tampered with, providing a crucial method for detecting unauthorized modifications.', "Even if somebody manages to discover the message, he won't be able to decrypt the message without having a proper key to unlock this message."]}, {'end': 790.655, 'segs': [{'end': 302.797, 'src': 'heatmap', 'start': 274.247, 'weight': 0.714, 'content': [{'end': 280.633, 'text': 'Further drilling down, classical cryptography is divided into two, which is transposition cipher and substitution cipher.', 'start': 274.247, 'duration': 6.386}, {'end': 285.858, 'text': 'On the other hand, modern cryptography is divided into stream cipher and block cipher.', 'start': 281.154, 'duration': 4.704}, {'end': 290.286, 'text': "In the upcoming slides, I'll broadly explain all these types of cryptography.", 'start': 286.582, 'duration': 3.704}, {'end': 293.008, 'text': "So let's start with symmetric key cryptography first.", 'start': 290.686, 'duration': 2.322}, {'end': 302.797, 'text': 'So symmetric key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.', 'start': 293.589, 'duration': 9.208}], 'summary': 'Cryptography includes classical and modern techniques, such as transposition and substitution ciphers, and symmetric key algorithms.', 'duration': 28.55, 'max_score': 274.247, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y274247.jpg'}, {'end': 350.647, 'src': 'heatmap', 'start': 309.187, 'weight': 0, 'content': [{'end': 316.334, 'text': 'The keys in practice represent a shared secret between two or more parties that can be used to maintain a private information link.', 'start': 309.187, 'duration': 7.147}, {'end': 326.064, 'text': 'This requirement that both parties have access to the secret key is one of the main drawbacks of symmetric key encryption in comparison to publicly encryption,', 'start': 317.095, 'duration': 8.969}, {'end': 328.006, 'text': 'also known as asymmetric key encryption.', 'start': 326.064, 'duration': 1.942}, {'end': 333.574, 'text': 'Now, symmetric key cryptography is sometimes also called secret key cryptography,', 'start': 328.829, 'duration': 4.745}, {'end': 340.261, 'text': 'and the most popular symmetric key system is a data encryption standards, which all stands for des next up.', 'start': 333.574, 'duration': 6.687}, {'end': 342.303, 'text': "We're going to discuss transposition cipher.", 'start': 340.461, 'duration': 1.842}, {'end': 350.647, 'text': 'So, in cryptography, a transposition cipher is a method of encryption by which the positions held by units of plain text,', 'start': 343.203, 'duration': 7.444}], 'summary': 'Symmetric key encryption requires shared secret between parties, drawback compared to asymmetric key encryption. des is a popular symmetric key system.', 'duration': 41.46, 'max_score': 309.187, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y309187.jpg'}, {'end': 436.414, 'src': 'embed', 'start': 406.712, 'weight': 6, 'content': [{'end': 408.053, 'text': 'and it can be done very easily.', 'start': 406.712, 'duration': 1.341}, {'end': 411.415, 'text': 'Moving on we are going to discuss substitution cipher.', 'start': 408.854, 'duration': 2.561}, {'end': 414.717, 'text': 'So substitution of single letters separately.', 'start': 412.276, 'duration': 2.441}, {'end': 420.861, 'text': 'simple substitution can be demonstrated by writing out the alphabets in some order to represent the substitution.', 'start': 414.717, 'duration': 6.144}, {'end': 423.342, 'text': 'This is termed a substitution alphabet.', 'start': 421.401, 'duration': 1.941}, {'end': 432.633, 'text': 'the cipher alphabet may be shifted or reversed, creating the Caesar and up stash cipher respectively, or scrambled in a more complex fashion,', 'start': 423.931, 'duration': 8.702}, {'end': 436.414, 'text': 'in which case it is called a mixed alphabet or deranged alphabet.', 'start': 432.633, 'duration': 3.781}], 'summary': 'Discussion on substitution cipher and its variations.', 'duration': 29.702, 'max_score': 406.712, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y406712.jpg'}, {'end': 565.664, 'src': 'embed', 'start': 543.957, 'weight': 4, 'content': [{'end': 554.604, 'text': 'So a stream cipher is a method of encrypting text to produce ciphertext in which a cryptographic key and algorithm are applied to each binary digit in a data stream one bit at a time.', 'start': 543.957, 'duration': 10.647}, {'end': 557.939, 'text': 'This method is not much used in modern cryptography.', 'start': 555.177, 'duration': 2.762}, {'end': 565.664, 'text': 'The main alternative method is block cipher in which a key and algorithm are applied to block of data rather than individual bits in a stream.', 'start': 558.499, 'duration': 7.165}], 'summary': 'Stream cipher encrypts text with key and algorithm. less used in modern cryptography. block cipher is main alternative method.', 'duration': 21.707, 'max_score': 543.957, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y543957.jpg'}, {'end': 635.92, 'src': 'heatmap', 'start': 597.439, 'weight': 0.862, 'content': [{'end': 602.561, 'text': 'These PRPs are function that cannot be differentiated from completely random permutation,', 'start': 597.439, 'duration': 5.122}, {'end': 606.622, 'text': 'and thus are considered reliable and then proven to be unreliable by some source.', 'start': 602.561, 'duration': 4.061}, {'end': 610.403, 'text': "Okay, so now it's time that we discuss some asymmetric cryptography.", 'start': 607.182, 'duration': 3.221}, {'end': 618.85, 'text': 'So asymmetric cryptography, also known as public key cryptography, is any cryptographic system that uses pair of keys, which is a public key,', 'start': 610.965, 'duration': 7.885}, {'end': 623.252, 'text': 'which may be this emanated widely, and private keys, which are known only to the owner.', 'start': 618.85, 'duration': 4.402}, {'end': 630.877, 'text': 'This accomplishes two functions authentication, where the public key verifies that a holder of the paired private key sent the message,', 'start': 623.773, 'duration': 7.104}, {'end': 635.92, 'text': 'and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.', 'start': 630.877, 'duration': 5.043}], 'summary': 'Prps are considered reliable but proven unreliable by some source. asymmetric cryptography uses public and private keys for authentication and encryption.', 'duration': 38.481, 'max_score': 597.439, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y597439.jpg'}, {'end': 630.877, 'src': 'embed', 'start': 602.561, 'weight': 5, 'content': [{'end': 606.622, 'text': 'and thus are considered reliable and then proven to be unreliable by some source.', 'start': 602.561, 'duration': 4.061}, {'end': 610.403, 'text': "Okay, so now it's time that we discuss some asymmetric cryptography.", 'start': 607.182, 'duration': 3.221}, {'end': 618.85, 'text': 'So asymmetric cryptography, also known as public key cryptography, is any cryptographic system that uses pair of keys, which is a public key,', 'start': 610.965, 'duration': 7.885}, {'end': 623.252, 'text': 'which may be this emanated widely, and private keys, which are known only to the owner.', 'start': 618.85, 'duration': 4.402}, {'end': 630.877, 'text': 'This accomplishes two functions authentication, where the public key verifies that a holder of the paired private key sent the message,', 'start': 623.773, 'duration': 7.104}], 'summary': 'Asymmetric cryptography uses public and private keys for authentication and security.', 'duration': 28.316, 'max_score': 602.561, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y602561.jpg'}, {'end': 756.373, 'src': 'embed', 'start': 727.862, 'weight': 3, 'content': [{'end': 731.623, 'text': 'Also, let me show you a little how public key encryption actually works.', 'start': 727.862, 'duration': 3.761}, {'end': 743.147, 'text': 'So on the site, which is basically cobwebs.cs.uga.edu, you can actually demo out public key encryption So suppose we had to send a message.', 'start': 732.603, 'duration': 10.544}, {'end': 744.988, 'text': 'First we would need to generate keys.', 'start': 743.347, 'duration': 1.641}, {'end': 753.151, 'text': 'So, as you can see, I just click generate keys and it got me two keys, which is one is the public key, which I will distribute throughout the network,', 'start': 745.608, 'duration': 7.543}, {'end': 756.373, 'text': 'and one the private key, which I will actually keep secret to myself.', 'start': 753.151, 'duration': 3.222}], 'summary': 'Demonstrating public key encryption on cobwebs.cs.uga.edu, generating keys and distributing them as part of the process.', 'duration': 28.511, 'max_score': 727.862, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y727862.jpg'}], 'start': 246.174, 'title': 'Cryptography overview & techniques', 'summary': 'Delves into cryptography, covering symmetric key and asymmetric key cryptography, along with encryption algorithms such as substitution cipher, stream cipher, and block cipher, emphasizing their attributes and practical applications.', 'chapters': [{'end': 370.179, 'start': 246.174, 'title': 'Cryptography overview & symmetric key cryptography', 'summary': 'Provides an overview of cryptography, classifying it into two main categories: symmetric key cryptography and asymmetric key cryptography. it delves into the subcategories of symmetric key cryptography, explaining the use of cryptographic keys and drawbacks of symmetric key encryption.', 'duration': 124.005, 'highlights': ['Symmetric key cryptography relies on using the same cryptographic keys for both encryption and decryption, representing a shared secret between parties.', 'Asymmetric key cryptography is compared to symmetric key encryption, highlighting the drawback of symmetric key encryption in requiring both parties to have access to the secret key.', 'Transposition cipher is explained as a method of encryption by shifting the positions of units of plain text according to a regular system, constituting a permutation of the plain text.']}, {'end': 790.655, 'start': 370.729, 'title': 'Cryptography techniques overview', 'summary': 'Discusses various cryptographic techniques including encryption algorithms such as substitution cipher, stream cipher, block cipher, and asymmetric cryptography, highlighting their key attributes and practical applications.', 'duration': 419.926, 'highlights': ['Substitution cipher demonstration', 'Stream cipher vs. block cipher', 'Explanation of asymmetric cryptography', 'Demonstration of public key encryption']}], 'duration': 544.481, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y246174.jpg', 'highlights': ['Symmetric key cryptography relies on using the same cryptographic keys for both encryption and decryption, representing a shared secret between parties.', 'Asymmetric key cryptography is compared to symmetric key encryption, highlighting the drawback of symmetric key encryption in requiring both parties to have access to the secret key.', 'Transposition cipher is explained as a method of encryption by shifting the positions of units of plain text according to a regular system, constituting a permutation of the plain text.', 'Demonstration of public key encryption', 'Stream cipher vs. block cipher', 'Explanation of asymmetric cryptography', 'Substitution cipher demonstration']}, {'end': 1073.856, 'segs': [{'end': 847.439, 'src': 'embed', 'start': 809.907, 'weight': 0, 'content': [{'end': 813.049, 'text': 'So RSA has a very unique way of applying this algorithm.', 'start': 809.907, 'duration': 3.142}, {'end': 816.451, 'text': 'There are many actual parameters that you actually need to study.', 'start': 813.589, 'duration': 2.862}, {'end': 823.157, 'text': "Okay, so now we're actually going to discuss RSA, which is a very popular algorithm that is used throughout the internet,", 'start': 817.191, 'duration': 5.966}, {'end': 825.559, 'text': "and you also saw that it's being used by YouTube right now.", 'start': 823.157, 'duration': 2.402}, {'end': 828.181, 'text': 'So this crypto system is one of the initial system.', 'start': 825.979, 'duration': 2.202}, {'end': 837.209, 'text': 'It remains most employed crypto system even today and the system was invented by three scholars, which is Ron Rivest Addie Shammer and Len Adleman.', 'start': 828.702, 'duration': 8.507}, {'end': 843.315, 'text': 'Hence the name RSA and we will see the two aspects of the RSA crypto system.', 'start': 838.11, 'duration': 5.205}, {'end': 847.439, 'text': 'Firstly generation of key pair and secondly encryption decryption algorithms.', 'start': 843.615, 'duration': 3.824}], 'summary': 'Rsa is a widely used algorithm on the internet, employed by youtube, and invented by three scholars: ron rivest, addie shammer, and len adleman.', 'duration': 37.532, 'max_score': 809.907, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y809907.jpg'}, {'end': 962.898, 'src': 'embed', 'start': 914.32, 'weight': 5, 'content': [{'end': 922.364, 'text': 'N is a part of the public key and the difficulty in factorizing a large prime number ensures that the attacker cannot find in finite time the two primes,', 'start': 914.32, 'duration': 8.044}, {'end': 925.285, 'text': 'that is, P and Q, that is used to obtain N.', 'start': 922.364, 'duration': 2.921}, {'end': 927.627, 'text': 'This actually ensures the strength of RSA.', 'start': 925.285, 'duration': 2.342}, {'end': 936.496, 'text': 'Now in the generation of the private key The private key D is calculated from P Q and E for given n and E.', 'start': 928.227, 'duration': 8.269}, {'end': 938.257, 'text': 'There is a unique number D.', 'start': 936.496, 'duration': 1.761}, {'end': 941.439, 'text': 'Now the number D is the inverse of E modulo Phi.', 'start': 938.257, 'duration': 3.182}, {'end': 947.203, 'text': 'This means that D is a number less than Phi such that when multiplied by E it gives one.', 'start': 941.879, 'duration': 5.324}, {'end': 950.424, 'text': "So let's go and actually fill up these numbers.", 'start': 948.001, 'duration': 2.423}, {'end': 960.755, 'text': 'So N should be 35 out here, and if we generate them, we get the value of five, which is 24, which is basically four, into six,', 'start': 950.704, 'duration': 10.051}, {'end': 962.898, 'text': 'and then we should also get E.', 'start': 960.755, 'duration': 2.143}], 'summary': 'Rsa ensures security by using large prime numbers to generate public and private keys, achieving strength and uniqueness.', 'duration': 48.578, 'max_score': 914.32, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y914320.jpg'}, {'end': 1066.79, 'src': 'embed', 'start': 1038.327, 'weight': 7, 'content': [{'end': 1042.088, 'text': 'If you all are still more interested, you all can actually research a lot on RSA.', 'start': 1038.327, 'duration': 3.761}, {'end': 1044.608, 'text': "It's a very in-depth cryptographic system.", 'start': 1042.127, 'duration': 2.481}, {'end': 1047.949, 'text': 'And also that brings us to the end of this session.', 'start': 1045.488, 'duration': 2.461}, {'end': 1053.41, 'text': 'I hope you guys had fun learning about cryptography and the different methods that are actually used on the internet.', 'start': 1048.469, 'duration': 4.941}, {'end': 1055.21, 'text': "That's it for me, goodbye.", 'start': 1053.93, 'duration': 1.28}, {'end': 1058.843, 'text': 'I hope you have enjoyed listening to this video.', 'start': 1056.701, 'duration': 2.142}, {'end': 1066.79, 'text': 'Please be kind enough to like it and you can comment any of your doubts and queries and we will reply them at the earliest.', 'start': 1059.203, 'duration': 7.587}], 'summary': 'Introduction to rsa, an in-depth cryptographic system, and other internet encryption methods.', 'duration': 28.463, 'max_score': 1038.327, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y1038327.jpg'}], 'start': 790.735, 'title': 'Rsa algorithm and encryption', 'summary': 'Covers the widely used rsa algorithm in internet security, discussing its common usage, unique application, and inventors, ron rivest, addie shammer, and len adleman. it also explains the rsa encryption process, including the generation of public and private keys using large prime numbers, co-prime factors, encryption, and decryption steps, with an example using n=35, e=11, and d=5.', 'chapters': [{'end': 847.439, 'start': 790.735, 'title': 'Rsa algorithm in internet security', 'summary': 'Discusses the widely used rsa algorithm in internet security, highlighting its common usage, unique application, and its inventors, ron rivest, addie shammer, and len adleman, and the two aspects of the rsa crypto system.', 'duration': 56.704, 'highlights': ['The RSA algorithm is widely used throughout the internet, including by platforms like YouTube, indicating its commonality and importance.', 'The inventors of the RSA system are Ron Rivest, Addie Shammer, and Len Adleman, emphasizing the credibility and expertise behind the algorithm.', 'The RSA crypto system consists of two main aspects: the generation of key pair and encryption/decryption algorithms, signifying its comprehensive security measures and functionality.', 'RSA remains one of the most employed crypto systems, demonstrating its enduring relevance and effectiveness in internet security.', 'The chapter provides an overview of the RSA algorithm, its unique application, and its widespread usage on the internet, offering valuable insights into its significance in maintaining secure communication.']}, {'end': 1073.856, 'start': 847.959, 'title': 'Rsa encryption explained', 'summary': 'Explains the rsa encryption process, including the generation of public and private keys using large prime numbers, co-prime factors, encryption, and decryption steps, with an example using n=35, e=11, and d=5.', 'duration': 225.897, 'highlights': ['The RSA encryption process involves generating a pair of keys, public and private, using large prime numbers, with N=35, E=11, and D=5 as an example.', 'The generation of the private key involves calculating the unique number D, which is the inverse of E modulo Phi, ensuring secure decryption.', 'The chapter emphasizes the importance of RSA encryption for secure communication and encourages further research on the topic.']}], 'duration': 283.121, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/5jpgMXt1Z9Y/pics/5jpgMXt1Z9Y790735.jpg', 'highlights': ['The RSA algorithm is widely used throughout the internet, including by platforms like YouTube, indicating its commonality and importance.', 'The inventors of the RSA system are Ron Rivest, Addie Shammer, and Len Adleman, emphasizing the credibility and expertise behind the algorithm.', 'The RSA crypto system consists of two main aspects: the generation of key pair and encryption/decryption algorithms, signifying its comprehensive security measures and functionality.', 'RSA remains one of the most employed crypto systems, demonstrating its enduring relevance and effectiveness in internet security.', 'The chapter provides an overview of the RSA algorithm, its unique application, and its widespread usage on the internet, offering valuable insights into its significance in maintaining secure communication.', 'The RSA encryption process involves generating a pair of keys, public and private, using large prime numbers, with N=35, E=11, and D=5 as an example.', 'The generation of the private key involves calculating the unique number D, which is the inverse of E modulo Phi, ensuring secure decryption.', 'The chapter emphasizes the importance of RSA encryption for secure communication and encourages further research on the topic.']}], 'highlights': ['Cryptography is crucial for protecting data, including corporate secrets and personal information, to guard against identity theft.', 'The RSA algorithm is widely used throughout the internet, including by platforms like YouTube, indicating its commonality and importance.', 'Using encryption and decryption keys in modern cryptography ensures secure communication by preventing unauthorized access and tampering with the message.', 'The RSA crypto system consists of two main aspects: the generation of key pair and encryption/decryption algorithms, signifying its comprehensive security measures and functionality.', 'The session will cover the definition of cryptography, its classifications, and a demo of the RSA algorithm.', 'The different classifications of cryptography and how the algorithms function will be explained in the session.', 'The example of Andy sending a private message to Sam on a public forum highlights the vulnerability of communication channels and the need for secure methods to prevent unauthorized access and tampering.', 'The potential threat posed by Eve, who could not only eavesdrop but also alter messages, underscores the importance of implementing cryptography to safeguard against such malicious activities.', 'The RSA encryption process involves generating a pair of keys, public and private, using large prime numbers, with N=35, E=11, and D=5 as an example.', 'Symmetric key cryptography relies on using the same cryptographic keys for both encryption and decryption, representing a shared secret between parties.', 'The inventors of the RSA system are Ron Rivest, Addie Shammer, and Len Adleman, emphasizing the credibility and expertise behind the algorithm.', 'The generation of the private key involves calculating the unique number D, which is the inverse of E modulo Phi, ensuring secure decryption.', 'The error in decryption indicates that the message has been tampered with, providing a crucial method for detecting unauthorized modifications.', 'The encryption key is used in an encryption algorithm to convert the numeric message into ciphertext, securing the communication process.', 'The decryption key is used to decrypt the ciphertext and obtain the original message, ensuring secure communication and data integrity.']}