馃攳
Lec-83: Asymmetric key Cryptography with example | Network Security - YouTube
Channel: Gate Smashers
[1]
Hello friends, welcome to Gate Smashers
[3]
the topic is
asymmetric key cryptography
[6]
or which we can also call public key cryptography
[9]
there is actually a difference between symmetric and asymmetric
[13]
keys
[14]
symmetric means same key
[16]
means same key we encrypt
[18]
with same key We decrypt
[20]
and this is the
biggest challenge in that
[22]
if the same key is being encrypted and decrypted
[25]
then how will the sender send it to the receiver
[29]
because they will also have to share the key among themselves
[31]
but here in asymmetric
[34]
we use two keys
[36]
one public key
[38]
and other private key
[40]
public and private means
[43]
that
[45]
if we talk about a network
[46]
then all the people in a network
[50]
will make two kisses one public and one private
[52]
means if I talk let's say
[55]
A and B Are two People
[56]
are A makes his public key private key
[58]
B will make his public and private key
[61]
so if I talk about A
[63]
then A made his public key
[65]
A made his
[67]
private key
[69]
similarly B
[70]
made his public key
[72]
and B made his own
[73]
private key
[75]
then all the people in the network,
[77]
What will the first thing do is
[79]
will generate public and private keys
[82]
and what is the funda of public and private,
[85]
how are they
[87]
related to each other,
[88]
if I encrypt a message with public-key,
[92]
then it can be decrypted with the same private key.
[96]
And if I encrypt a message
[98]
with a private key,
[100]
with the same public key,
[102]
then it will be decrypted
[103]
from the same person's
[106]
If i with the same key
[109]
encrypt with the same public-key,
[111]
it open's with the same private key.
[113]
And if I encrypt with the same private
key
[115]
and apply the lock,
[116]
with the same public-key,
[118]
it will open
[119]
these two keys are in such a way
[121]
are related to each other
[123]
what happens next
[124]
public, now republic means
[126]
General public
[127]
means that this key known to everyone,
[129]
either I will broadcast,
[131]
this is my public key
[132]
in the network,
[134]
Or any third party
[136]
We give keys to an authorized certified person
[139]
whoever wants to communicates with me
[142]
will take my public key from that person,
[145]
then public key and private key
[147]
private key means that private
[148]
means do not share to anyone
[152]
now, Let us see how the communication goes,
[155]
how the encryption is done,
[157]
if A and B want to communicate with each other,
[160]
then we will have 4 cases
[162]
because we have
[164]
Four methods
[165]
then these 4 cases use this from
[167]
let to any message A have to send
[171]
To B
[174]
here A
[177]
I write here...
[185]
A....
[187]
encrypted the message
[189]
with its public key.
[193]
A encrypted the message with his public-key
[198]
SO what happened.
[201]
Think about it
[204]
A....
[206]
encrypted the message with his public-key
[209]
And send it..
[211]
now how will it be decrypted
[213]
I have already said
[215]
that if A is encrypted with public key
[217]
then it decrypted with the same private key
[219]
with its public-key Sent to B after putting a lock on it,
[222]
even if it reached B,
[223]
how will it be opened,
[226]
no one can open it not even B?
[228]
Or nobody can open
[230]
if there is an unauthorized person on the way,
[232]
he can do it or even b can't
[236]
because it needs A's private key
[238]
is A's private key then A has it
[239]
so that means we can't use this case
[243]
second...
[244]
if the message
[247]
with B's
[248]
private key
[250]
encrypted and send
[252]
whose, B's private key,
[253]
This is case One..
[255]
this is case two
[256]
i encrypt with B's private key
[259]
how can i encrypt
[260]
private key of B then B has it
[262]
I don't have it
[263]
i.e. this case is also
[265]
invalid,
[267]
we can't use it,
[268]
what can be the third case,
[272]
what can we have with the third case,
[275]
lat's say that if I want to send the message
[279]
and I have here used my Public key
[282]
let say, I use my private
key
[285]
I send it with private key..
[288]
When B get this message.
[291]
Than how will B open it..
[293]
With my Public key.
[295]
But be careful.
[296]
Not only B have my public key.
[299]
C, D, E, all have it.
[302]
so that means B can open that message.
[304]
Before that, maybe someone else can open that message,
[308]
then there is no encryption
[309]
and if the encryption is not done,
[312]
then the confidence will not be achieved,
[313]
so these three cases are invalid,
[316]
which is the fourth and last case,
[319]
If A
[321]
want to send a message to B,
[322]
that message,
[324]
encrypt
[326]
the fourth case,
[328]
B's
[329]
which is the public key of B,
[334]
means the public key of the receiver,
[335]
the person to whom you are sending the message,
[338]
take the public key of the person
[340]
And that The public key either broadcast to me
[343]
or any certified fellow
[345]
I will tell the third party that I want to communicate
[349]
then give his public key
[350]
and public key then shareable
[352]
then I took his public key
[354]
Encrypted
[355]
and sent
[357]
now how will B open it.
[359]
his private key
[361]
and that b private key is with
[363]
whom b is with
[364]
even if you C, D, E, try it on the way.
[367]
then They can't open it, why...
[370]
because B's private If only B is there
[373]
then there is only one case which is most
[377]
important used here for encrypt
[379]
so the from the point of view of encryption
[381]
important factor is
[383]
always use the receivers public key
[387]
always use the receivers public key
[390]
to encrypt the message
[391]
and how will the receiver open that message
[395]
with his private key.
[397]
open the message.
[398]
this is the concept of asymmetric key cryptography.
[403]
now in this which we use in real life
[406]
RSA, this is one of the very important algorithm
[410]
Rivest-Shamir-Adleman
[413]
these three scientists together made the algorithm
[416]
it's very secure algorithm
[418]
which is used as asymmetric Algorithm
[420]
So this has already come in GATE and UGC NET.
[424]
also and let me tell you a small point
[426]
we also discussed in
symmetric-key
[429]
that if four devices
[432]
re connected to each other,
[435]
so, how many keys will be required
[437]
in the case of symmetric,
[441]
I said nC2 is the formula
[442]
but what is the formula here.
[445]
2N
[447]
N is the number of nodes or device.
[451]
let say A, B, C, and D.
[455]
How can they maximum connected.
[457]
From the way of the graph,
[459]
because in the complete graph,
[461]
there cannot be more edges
[463]
then if we talk here A will make how many keys
[466]
Two...
[467]
B...
[467]
Two...
[468]
C..
[469]
Two...
[470]
D is Two..
[470]
all it's private public private public
[472]
then how much will be
[473]
Eight...
[474]
if here 2 into N
[476]
how many numbers of nodes or device
[478]
i.e. 8 keys
[481]
where needed
[482]
then basically
[483]
this is whatever point you have to remember
[485]
because It has already appeared in UGC NET
[488]
and there are chances of appearing in upcoming exams
[491]
so this is all About Basic of Asymmetric Key
[494]
Cryptography
[495]
If you like this video please like it
[498]
do share please subscribe my channel
[501]
THANK YOU...
Most Recent Videos:
You can go back to the homepage right here: Homepage





