馃攳
Lec-80: Cryptography in computer network in Hindi | Cryptography in Information Security - YouTube
Channel: Gate Smashers
[0]
Hello friends, Welcome to Gate Smashers
[3]
The topic is cryptography.
[5]
Cryptography is such a technique
[7]
through which
[8]
we can convert plain text to cipher text.
[11]
And cipher text is converted to plain text again.
[15]
Now you must be thinking the meaning
[16]
of plain text and
[18]
cipher text.
[19]
Plain text is a message,
[21]
a normal ,message
[22]
that anyone can read
[23]
and understand.
[24]
That what is written in this message.
[26]
But cipher text is
[28]
such a message.
[29]
We can say a secret message.
[31]
That anyone can
[33]
read but
[34]
cannot understand.
[35]
Meaning the message can be seen.
[38]
But what is written,
[39]
the meaning of that.
[41]
That can never be understood.
[42]
So why do we convert from plain text to cipher text.
[46]
We use cryptography
[49]
to achieve confidentiality.
[51]
Confidentiality.
[56]
When we talk about network security. There is one important concept in network security.
[61]
Of CIA.
[62]
Confidentiality, Intergrity, and Availability.
[63]
Intergrity, and Availability.
[66]
Now the C in CIA is .
[68]
confidentiality
[69]
Confidentiality means.
[72]
What we
[73]
understand from confidentiality
[75]
that no one could
[76]
take my message.
[77]
No one should
[79]
take my message.
[80]
Meaning if I am sending a message from here.
[83]
To another receiver.
[85]
Let's say receiver is sitting somewhere else.
[86]
Receiver is sitting
[87]
1000km away.
[89]
Now someone is
[91]
taking my message on the way.
[93]
He is trying to hack
[95]
my message in
[97]
an unauthorised way.
[99]
But it does not mean that your confidentiality
[101]
is breached.Confidentiality becomes zero.
[103]
No. Anyone can take the message.
[105]
Because what is internet
[107]
On internet all the devices are
[110]
connected in a vulnerable manner.
[112]
Vulnerable means
[114]
that any person
[116]
with some knowledge.
[117]
If he knows the
skill of .
[119]
hacking
[120]
He can
take
[121]
your packet.
[122]
But taking the packet does not mean.Taking the data does not mean.
[126]
That he can read the data.
[128]
If the person can also read the data.Understand that.
[132]
Then you can say confidentiality zero.
[135]
But if on the way any person
[137]
trace
[138]
your packet.
[140]
Trace does not means that
[142]
he will
[143]
understand
[144]
what is written in the packet.
[147]
So that is the meaning of confidentiality.
[149]
Now we are talking that the
[152]
sender has to send a plain text.
[153]
Plain text means a
[156]
normal message that anyone can read.
[158]
It is a normal message.
[159]
Now if
[161]
send that message
[162]
to receiver.
[165]
There is no dedicated wire here.
[167]
We don't have a dedicated wire on internet.
[171]
Let's say I have to send a message from India to California.Send an email.
[173]
So is there a dedicated
[175]
line from India to california.
[177]
A dedicated link.No.We are using internet.
[180]
Meaning when the message exits our machine.
[183]
On which router,
[184]
on which node does it go.
[186]
Meaning this channel,
[188]
this medium
[190]
is unsecure.
[191]
It is .
[194]
unsecure
[195]
So an unsecure medium,
[197]
unsecure channel.We are sending a message on.
[199]
Any unauthorized person
[201]
can
[203]
take that message.
[204]
So there is no problem of confidentiality here.
[206]
It can take any .
[207]
message
[208]
But if we send that
[210]
message as plain text.
[212]
Anyone can read that message.
[215]
Understand it.
[217]
But we don't want this.
[218]
For that we use cryptography.
[220]
What do we do.
[222]
Sender,
[224]
before sending the plain text use
[226]
encryption method.
[231]
In encryption we use many algorithms.
[232]
I will tell you about that algorithms.
[234]
What do these algorithms do.
[236]
The most important part
[238]
here is key. They use a key.Lock, the lock that
[241]
we put in our house.
[243]
What is that lock
[244]
It get locks, and get opened with a key.
[246]
So that is the key.
[248]
They will lock with this key.
[250]
After applying the lock.
[252]
It becomes cipher text.Cipher text is a secret message
[255]
which nobody can read.
[257]
No one can understand.
[258]
When we will
[260]
send that message on this channel.
[262]
On this unsecured channel.If we send.
[265]
Then anyone can take that on the way.
[267]
But that
[269]
M is not M.
[272]
That M has become M'.Because we are not sending M as it is.
[275]
Not sending plain text as it is.
[276]
We are sending after converting into cipher text.
[278]
So M becomes
[280]
.Let's say M'.
[281]
So the unauthorized person that is reading this on the way.
[285]
He thinks that
[286]
sender is sending M'.
[288]
But we are sending M.
[290]
And as the message reaches receiver.
[293]
Receiver will
[295]
decrypt that message.
[297]
Because when we are saying that no one can understand the message
[299]
So how will the receiver understand it
[302]
So the receiver has
[303]
to decrypt the message.
[306]
Decrypt means convert
[307]
M'
[309]
to M again.
[311]
Meaning
[312]
convert cipher text
[313]
to plain text.
[314]
So sender
[316]
does encryption
[317]
Receiver does
[318]
decryption
[321]
And after decrypting he will read plain text.
[322]
So along the way the
[324]
unauthorized user
[325]
will think it is M'
[327]
But it is M.
[328]
So cryptography
[330]
is not a new term.
[332]
Although it is becoming very popular.
[334]
Because if we talk about
network
[336]
security
[337]
If we talk about
network security or
[338]
cyber security
[339]
in today's time.
[341]
It is very popular.
[343]
But it does not mean
[344]
that cryptography is used in today's time.
[346]
Cryptography started at the time of Caesar.
[349]
King of Rome was Caesar.
[351]
He used a technique called
[353]
caesar's cipher And through it if he talked to another king.
[357]
So they used to encode the message
[359]
in such a way that no one could
[360]
encode that message.
[362]
But after
[364]
attacking
[365]
the message carrier.
[367]
Anyone could take the message.
[368]
But it does not mean that
[370]
they could read the message
[373]
They have to decrypt to read that message.And for decrypting
[376]
we need a key
[377]
And he would not
[380]
have that key.
[381]
That is called
[382]
cryptography
[384]
Or you can say encryption.
[385]
And how do we achieve confidentiality.
[388]
Through
[389]
encryption method
[391]
Here we have an
[392]
important concept
[394]
That we use cryptography in two ways.
[397]
Symmetric
and
[398]
asymmetric.
[401]
Symmetric and
[402]
asymmetric
means of
[404]
same
Symmetric
[405]
key
[407]
Meaning with the key
[408]
used for encryption.
[412]
With the same key it will decrypt
[413]
Like same, the lock that we use at home.
[415]
With the key we closed the lock.
[418]
If I take my neighbours key and
[420]
unlock it.So anyone can unlock it.
[423]
No.With the key used to lock.
[426]
With the same key
[427]
we will
[429]
unlock
[430]
That is the symmetric key.
[432]
Asymmetric means.
[434]
We will use two keys.
[435]
With one key we will lock.
[437]
And with some another key
[438]
we will unlock.
[440]
We will see about this in detail
[441]
This is just the introduction of
[443]
cryptography
[444]
This is very important for
[445]
UGC net and
[447]
GATE exam.
[448]
Because many questions are asked on
[450]
cryptography in that.
[452]
So that is the basic introduction.
[453]
Then we will see
[454]
symmetric and asymmetric key.
[456]
Thank you.
Most Recent Videos:
You can go back to the homepage right here: Homepage





