Encryption and public keys | Internet 101 | Computer Science | Khan Academy

Encryption and public keys | Internet 101 | Computer Science | Khan Academy


(energetic music) – Hi. My name is Mia Gil Epner. I’m majoring in Computer
Science at UC Berkeley and I work for the Department of Defense where I try to keep information safe. The internet is an open and public system. We all send and receive information over shared wires and connections. Even though it’s an open system, we still exchange a lot of private data, things like credit card numbers, bank information, passwords, and emails. So how is all this
private stuff kept secret? Data of any kind can be kept secret through a process known as encryption, descrambling or changing of the message to hide the original text. Now, decryption is the process of unscrambling that
message to make it readable. This is a simple idea, and people have been
doing it for centuries. One of the first well-known
methods of encryption was Caesar’s cipher,
named after Julius Caesar, a Roman general who encrypted
his military commands to make sure that if a message
was intercepted by enemies, they wouldn’t be able to read it. Caesar’s cipher is an algorithm that substitutes each letter
in the original message with a letter a certain number
of steps down the alphabet. If the number is something only the sender and receiver know, then
it’s called the key. It allows the reader to
unlock the secret message. For example, if your
original message is, “Hello”, then, using the Caesar’s cipher algorithm with a key of five, the
encrypted message would be this. (typrwriter keys clacking) (computer chime) To decrypt the message, the recipient would simply use the key
to reverse the process. But there’s a big problem
with Caesar’s cipher. Anybody can easily break or
crack the encrypted message by trying every possible key. In the English alphabet,
there are only 26 letters, which means you’d only
need to try, at most, 26 keys to decrypt the message. Now, trying 26 possible
keys isn’t very hard. It would take, at most, an hour to do. So let’s make it harder. Instead of shifting every
letter by the same amount, let’s shift each letter
by a different amount. In this example, a 10 digit key shows how many positions
each successive letter will be changed to
encrypt a longer message. (typewriter keys clacking) Guessing this key would be really hard. Using 10 digit encryption, there could be 10 billion
possible key solutions. Obviously, that’s more than
any human could ever solve. It would take many centuries,
but an average computer today would take just a few seconds to try all 10 billion possibilities. So in a modern world, where the bad guys are armed with computers
instead of pencils, how can you encrypt messages so securely that they’re too hard to crack? Now, “too hard” means that
there are too many possibilities to compute in a reasonable amount of time. Today’s secure communications are encrypted using 256 bit keys. That means a bad guy’s computer that intercepts your message, would need to try this
many possible options until they discover the
key and crack the message. (robot bleeps and beeps) (energetic music) Even if you had a hundred
thousand super computers, and each of them was able to try a million billion keys every second, it would take trillions
of trillions of trillions of years to try every option, just to crack a single message protected with 256 bit encryption. Of course, computer
chips get twice as fast, then half the size every year or so. If that pace of exponential
progress continues, today’s impossible
problems will be solvable just a few hundred years in the future, and 256 bits won’t be enough to be safe. In fact, we’ve already had to increase the standard key length to keep up with the speed of computers. The good news is, using a longer key doesn’t make encrypting
messages much harder, but it exponentially increases
the number of guesses that it would to crack a cipher. When the sender and the
receiver share the same key to scramble and unscramble a message, it’s called symmetric encryption. With symmetric encryption,
like Caesar’s cipher, the secret key has to be
agreed on ahead of time by two people in private. That’s great for people, but the internet is open and public, so it’s impossible for two computers to meet in private to
agree on a secret key. Instead, computers use asymmetric keys, a public key that can be
exchanged with anybody and a private key that is not shared. The public key is used to encrypt data and anybody can use it to
create a secret message, but the secret can only be decrypted by a computer with access
to the private key. How it works is with some math that we won’t get into right now. Think of it this way, imagine that you have a personal mailbox where anybody can deposit mail, but they need a key to do it. Now, you could make many copies of the deposit key, and
send one to your friend or even just make it publicly available. Your friend, or even a stranger, can use the public key to access your deposit
slot and drop a message in, but only you can open the
mailbox with your private key to access all of the secret
messages you’ve received. You can send a secure
message back to your friend by using the public deposit
key to their mailbox. This way, people can
exchange secure messages without ever needing to
agree on a private key. Public key cryptography is the foundation of all secure messaging
on the open internet including security protocols
known as SSL and TLS which protect us when
we’re browsing the web. Your computer uses this today. Any time you see the little lock or the letters https in
your browser’s address bar, this means your computer is
using public key encryption to exchange data securely
with the website you’re on. (energetic music) As more and more people
get on the internet, more and more private
data will be transmitted, and the need to secure that data will be even more important. As computers become faster and faster, we’ll have to develop new ways to make encryption too hard
for computers to break. This is what I do with my
work, and it’s always changing. (energetic music)

10 thoughts on “Encryption and public keys | Internet 101 | Computer Science | Khan Academy”

  1. What they fail to tell you here while the blow encryption out of proportion is that the NSA, CIA and five eyes do not care about cracking codes when they have backdoor access to nodes. They can tailgate any message on the internet that triggers their attention. Encryption although affective to an extent is just being hopeful. It’s all about language mixed with encryption and avoiding the surface.

  2. Great explanation of Encryption and securing data in a very eloquent way Mia. God bless and best wishes in your education and career

Leave a Reply

Your email address will not be published. Required fields are marked *