yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Encryption and public keys | Internet 101 | Computer Science | Khan Academy


4m read
·Nov 11, 2024

[Music] Hi, my name is Mia Gilner. I'm majoring in computer science at UC Berkeley, and I work for the Department of Defense where I try to keep information safe.

The internet is an open and public system. We all send and receive information over shared wires and connections. But even though it's an open system, we still exchange a lot of private data; things like credit card numbers, bank information, passwords, and emails.

So how is all this private stuff kept secret? Data of any kind can be kept secret through a process known as encryption. This is the scrambling or changing of the message to hide the original text. Now, decryption is the process of unscrambling that message to make it readable.

This is a simple idea, and people have been doing it for centuries. One of the first well-known methods of encryption was the Caesar Cipher, named after Julius Caesar, a Roman general who encrypted his military commands to make sure that if a message was intercepted by enemies, they wouldn't be able to read it.

The Caesar Cipher is an algorithm that substitutes each letter in the original message with a letter a certain number of steps down the alphabet. If the number is something only the sender and receiver know, then it's called the key. It allows the reader to unlock the secret message.

For example, if your original message is "hello," then using the Caesar Cipher algorithm with a key of five, the encrypted message would be "mjqqt." To decrypt the message, the recipient would simply use the key to reverse the process.

But there's a big problem with the Caesar Cipher. Anybody can easily break or crack the encrypted message by trying every possible key. In the English alphabet, there are only 26 letters, which means you'd only need to try at most 26 keys to decrypt the message.

Now, trying 26 possible keys isn't very hard; it would take at most an hour to do so. Let's make it harder. Instead of shifting every letter by the same amount, let's shift each letter by a different amount. In this example, a 10-digit key shows how many positions each successive letter will be changed to encrypt a longer message.

Guessing this key would be really hard. Using 10-digit encryption, there could be 10 billion possible key solutions. Obviously, that's more than any human could ever solve. It would take many centuries, but an average computer today would take just a few seconds to try all 10 billion possibilities.

So in a modern world where the bad guys are armed with computers instead of pencils, how can you encrypt messages so securely that they're too hard to crack? Now, "too hard" means that there are too many possibilities to compute in a reasonable amount of time. Today's secure communications are encrypted using 256-bit keys.

That means a bad guy's computer that intercepts your message would need to try this many possible options until they discover the key and crack the message. Even if you had a hundred thousand supercomputers, and each of them was able to try a million billion keys every second, it would take trillions of trillions of trillions of years to try every option just to crack a single message protected with 256-bit encryption.

Of course, computer chips get twice as fast and half the size every year or so. If that pace of exponential progress continues, today's impossible problems will be solvable just a few hundred years in the future, and 256 bits won't be enough to be safe.

In fact, we've already had to increase the standard key length to keep up with the speed of computers. The good news is that using a longer key doesn't make encrypting messages much harder, but it exponentially increases the number of guesses that it would take to crack a cipher.

When the sender and the receiver share the same key to scramble and unscramble a message, it's called symmetric encryption. With symmetric encryption like Caesar Cipher, the secret key has to be agreed on ahead of time by two people in private.

So that's great for people, but the internet is open and public, so it's impossible for two computers to meet in private to agree on a secret key. Instead, computers use asymmetric keys: a public key that can be exchanged with anybody and a private key that is not shared.

The public key is used to encrypt data, and anybody can use it to create a secret message, but the secret can only be decrypted by a computer with access to the private key. How this works is with some math that we won't get into right now.

Think of it this way: imagine that you have a personal mailbox where anybody can deposit mail, but they need a key to do it. Now, you could make many copies of the deposit key and send one to your friend or even just make it publicly available.

Your friend or even a stranger can use the public key to access your deposit slot and drop a message in, but only you can open the mailbox with your private key to access all of the secret messages you've received. And you can send a secure message back to your friend by using the public deposit key to their mailbox.

This way, people can exchange secure messages without ever needing to agree on a private key. Public key cryptography is the foundation of all secure messaging on the open internet, including the security protocols known as SSL and TLS, which protect us when we're browsing the web.

Your computer uses this today. Anytime you see the little lock or the letters HTTPS in your browser's address bar, this means your computer is using public key encryption to exchange data securely with the website you're on.

As more and more people get on the internet, more and more private data will be transmitted, and the need to secure that data will be even more important. And as computers become faster and faster, we'll have to develop new ways to make encryption too hard for computers to break.

This is what I do with my work, and it's always changing. [Music]

More Articles

View All
Punic Wars between Rome and Carthage | World History | Khan Academy
As we enter into the 3rd century BCE, we see the Roman Republic, which was founded in 509 BCE, has now exerted control over most of the Italian Peninsula. But it’s not the only power in the Mediterranean. We have the remnants of Alexander the Great’s empi…
Second derivatives (vector-valued functions) | Advanced derivatives | AP Calculus BC | Khan Academy
So I have a vector valued function H here. When I say vector valued, it means you give me a T; it’s a function of T. So you give me a T, I’m not just going to give you a number; I’m going to give you a vector. As we’ll see, you’re going to get a two-dimen…
Introduction to 3d graphs | Multivariable calculus | Khan Academy
Hello everyone! So, what I’d like to do here is describe how we think about three-dimensional graphs. Three-dimensional graphs are a way that we represent a certain kind of multivariable function, the kind that has two inputs, or rather a two-dimensional…
The Most Persistent Myth
This will revolutionize education. No prediction has been made as often or as incorrectly as that one in 1922. It was Thomas Edison who declared that the motion picture is destined to revolutionize our educational system and that in a few years it will su…
15 Investments That Will Make Your Children Rich
Would you be happy with your children living the life you’re living right now? If you are, that’s great, amazing! You’ve done it right. Now, you’ve got to keep going. If you’re not, that’s okay, because we’re going to work on those goals today. The numbe…
Top 7 WoW Cataclysm Visual Changes -- Wackygamer
Hey guys, Jeff here from Wacky Gamer. I wanted to bring you the top 7 things I’ve seen in the latest World of Warcraft Cataclysm footage. They finally filled in Thunder Ridge outside of Orgrimmar. I don’t know what Blizzard was thinking, but it’s like, l…