< Return to Video

The Internet: Encryption & Public Keys

  • 0:03 - 0:08
    The Internet: Encryption and Public Keys
  • 0:09 - 0:14
    Hi my name is Mia Gil-Epner, I'm majoring
    in Computer Science at UC Berkeley and I work
  • 0:14 - 0:19
    for the Department of Defense, where I try
    to keep information safe. The Internet is
  • 0:19 - 0:26
    an open and public system. We all send and
    receive information over shared wires and
  • 0:26 - 0:30
    connections. But even though it's an open
    system we still exchange a lot of private
  • 0:30 - 0:36
    data. Things like credit card numbers,
    bank information, passwords, and emails. So
  • 0:36 - 0:41
    how is all this private stuff kept secret?
    Data of any kind can be kept secret through
  • 0:41 - 0:45
    a process known as encryption, the scrambling
    or changing of the message to hide the original
  • 0:45 - 0:52
    text. Now decryption is the process of un-scrambling
    that message to make it readable. This is
  • 0:52 - 0:57
    a simple idea, and people have been doing
    it for centuries. One of the first well known
  • 0:57 - 1:02
    methods of encryption was Caesar's Cipher.
    Named after Julius Caesar, a Roman general
  • 1:02 - 1:07
    who encrypted his military commands to make
    sure that if a message was intercepted by
  • 1:07 - 1:13
    enemies, they wouldn't be able to read it.
    Caesar Cipher is an Algorithm that substitutes
  • 1:13 - 1:17
    each letter in the original message with a
    letter a certain number of steps down the
  • 1:17 - 1:21
    alphabet. If the number is something only
    the sender and receiver know, then it's called
  • 1:21 - 1:29
    the key. It allows the reader to unlock the
    secret message. For example, if your original
  • 1:29 - 1:36
    message is 'HELLO' then using the Caesar Cipher
    algorithm with a key of 5 the encrypted message
  • 1:36 - 1:43
    would be this... To decrypt the message, the
    recipient would simple use the key to reverse
  • 1:43 - 1:50
    the processes. But there is a big problem
    with Caesar Cipher, anybody can easily break
  • 1:50 - 1:56
    or crack the encrypted message, by trying
    every possible key, and in the english alphabet
  • 1:56 - 2:00
    there are only 26 letters, which means you
    would only need to try at most 26 keys to
  • 2:00 - 2:07
    decrypt the message. Now trying 26 possible
    keys isn't very hard, it would take at most
  • 2:07 - 2:13
    an hour or two. So lets make it harder. Instead
    of shifting every letter by the same amount,
  • 2:13 - 2:19
    let's shift each letter by a different amount.
    In this example a ten digit key shows how many
  • 2:19 - 2:27
    positions each successive letter will be changed
    to encrypt a longer message. Guessing this
  • 2:27 - 2:34
    key would be really hard. Using 10 digit encryption
    there could be 10 billion possible key solutions.
  • 2:34 - 2:40
    Obviously that's more then any human could
    ever solve, it would take many centuries.
  • 2:40 - 2:46
    But an average computer today, would take
    just a few seconds to try all 10 billion possibilities.
  • 2:46 - 2:51
    So in a modern world were the bad guys are
    armed with computers instead of pencils how
  • 2:51 - 2:58
    can you encrypt messages so securely that
    they're too hard to crack? Now too hard means
  • 2:58 - 3:04
    that there are too many possibilities to compute
    in a reasonable amount of time. Today's secure
  • 3:04 - 3:10
    communications are encrypted using 256 bit
    keys. That means a bad guy's computer that
  • 3:10 - 3:16
    intercepts your message would need to try
    this many possible options... until they discover
  • 3:16 - 3:24
    the key and crack the message. Even if you
    had a 100,000 super computers and each of
  • 3:24 - 3:31
    them was able to try a million billion keys
    every second it would take trillions of trillions
  • 3:31 - 3:38
    of years to try every option, just to crack
    a single message protected with 256 bit encryption.
  • 3:38 - 3:43
    Of course computer chips get twice as fast
    and half the size every year or so. If that
  • 3:43 - 3:48
    pace of exponential progress continues, today's
    impossible problems will be solvable just
  • 3:48 - 3:55
    a few hundred years in the future and 256
    bits won't be enough to be safe. In fact
  • 3:55 - 4:01
    we've already had to increase the standard key
    length to keep up with the speed of computers.
  • 4:01 - 4:06
    The good news is using a longer key doesn't
    make encrypting messages much harder but it
  • 4:06 - 4:12
    exponentially increases the number of guesses
    that it would take to crack a cipher. When
  • 4:12 - 4:17
    the sender and receiver share the same key
    to scramble and unscramble a message its called
  • 4:17 - 4:24
    Symmetric Encryption. With Symmetric Encryption,
    like Caesar Cipher, the secret key has to be
  • 4:24 - 4:30
    agreed on ahead of time by two people in private.
    So that's great for people, but the internet
  • 4:30 - 4:36
    is open and public so it's impossible for
    two computers to "meet" in private to agree
  • 4:36 - 4:42
    on a secret key. Instead computers use Asymmetric
    Encryption keys, a public key that can be
  • 4:42 - 4:49
    exchanged with anybody and a private key that is
    not shared. The Public Key is used to encrypt
  • 4:49 - 4:56
    data and anybody can use it to create a secret
    message, but the secret can only be decrypted
  • 4:56 - 5:01
    by a computer with access to the private key.
    How this works is with some math that we won't
  • 5:01 - 5:06
    get into right now. Think of it this way,
    imagine that you have a personal mailbox,
  • 5:06 - 5:11
    where anybody can deposit mail but they need
    a key to do it. Now you can make many copies
  • 5:11 - 5:17
    of the deposit key and send one to your friend
    or even just make it publicly available. Your
  • 5:17 - 5:21
    friend or even a stranger can use the public
    key to access your deposit slot and drop a
  • 5:21 - 5:27
    message in, But only you can open the mailbox
    with your private key, to access all of the
  • 5:27 - 5:32
    secret messages you've received. And you can
    send a secure message back to your friend
  • 5:32 - 5:38
    by using the public deposit key to their mailbox.
    This way people can exchange secure messages
  • 5:38 - 5:44
    without ever needing to agree on a private
    key. Public Key cryptography is the foundation
  • 5:44 - 5:49
    of all secure messaging on the open internet.
    Including the Security Protocols known as
  • 5:49 - 5:56
    SSL and TLS, which protect us when we are
    browsing the web. Your computer uses this
  • 5:56 - 6:01
    today, anytime you see the little lock or
    the letters https in your browser's address
  • 6:01 - 6:07
    bar. This means your computer is using public
    key encryption to exchange data securely with
  • 6:07 - 6:13
    the website you're on. As more and more people
    get on the internet more and more private
  • 6:13 - 6:19
    data will be transmitted, and the need to
    secure that data will be even more important.
  • 6:19 - 6:24
    And as computers become faster and faster
    we will have to develop new ways to make encryption
  • 6:24 - 6:29
    too hard for computers to break. This is what
    I do with my work and it's always changing.
Title:
The Internet: Encryption & Public Keys
Description:

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256 bit encryption, public and private keys, SSL & TLS and HTTPS.

Learn more at http://code.org/

Stay in touch with us!
• on Twitter https://twitter.com/codeorg
• on Facebook https://www.facebook.com/Code.org
• on Instagram https://instagram.com/codeorg
• on Tumblr https://blog.code.org
• on LinkedIn https://www.linkedin.com/company/code-org
• on Google+ https://google.com/+codeorg

more » « less
Video Language:
English
Duration:
06:40

English subtitles

Revisions