Time
59 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Hello. Welcome to the protecting data class with Russia.
00:05
I want to talk about a C I A security trade s o the C stand for confidentiality,
00:17
Eyes for integrity and it is for availability.
00:22
Now, when you talk about computer security, these are the three basic things you want basically provide them all the time for your customers, for the user's or the service.
00:35
Confidentiality usually is
00:38
ah,
00:39
provided by cryptography,
00:42
which is basically encryption, encrypting and decrypting the data
00:47
and the integrity. We do use hashing to make sure that our data is not modified and it has the original content. Now, when I talk about availability for data, it is very important
01:07
for the customers or the users to five. A little windy
01:11
made it.
01:12
Let's learn a little bit about cryptography.
01:15
So cryptography is a science off hiding information. What we do, we do something called encryption. Encryption is a process that scrambles data to make it unreadable. So, mistress, we take our information, we change it, totally change the order off the
01:34
information and get
01:38
ah hard to read and recognize
01:41
text or output, which is basically pretty secure because you cannot if you're an attacker. If you're an evil guy, you can actually get to know what the information are.
01:53
The decryption is the process off at scrambling the to retrieve the original information. So what we're doing here is we are revising the process that we are getting back in getting back the original message.
02:12
So in cryptography,
02:14
the encryption is a revise herbal
02:19
process.
02:20
So basically, you have a plan ticks that the original text and what we do for the Plant IX is we apply an encryption algorithm and the result will be the cyber text.
02:38
The cipher text is the result off encrypting the data
02:44
and the sun for six
02:46
can be revised by applying the crusher on getting our plane fixed back.
02:57
One of the old, most common theory or methodology or grip for cryptography algorithm is irritating validators. So they say the message math slightly. It's an alphabet message
03:10
or text,
03:13
and we located. This is tradition 13. So we move every litter 13 spot after, and we replaced each letter with the little that we rotated Jew.
03:25
By that, we can incorrectly letter. In order to decrypt it, we are going to,
03:32
um,
03:35
do the same rotation in the other way. So, like we take that lettering and remove it
03:40
upward in the alphabets 13 spots, it will go back to the litter. A. On by that you can decrypt that message. This is the substitution cipher, and it's used to. It was basically with that Caesar cipher that what it's used to call,
04:00
and in this example, we are irritating the little 13 spaces.
04:04
There is something going crypto graffiti called Obstacle Ocean. It's a myth. It makes something Anchalee or difficult to understand and that what is the rotation and substitution cipher is based on?
04:20
So let's look at our table an example of that for instant we are taken. If I give you a message. Hands to litter, When is you
04:30
and the other is the and you ve really doesn't have an actual meaning. But what you can do is you can apply them
04:40
substitution cipher, and you can go back and you move little. You 30 litter backward in the ultimate. That will be little Etch and you move the litter many backward, a 13 spot in the alphabet and this will be the letter I
04:58
I have a message is high
05:00
Yes, E said the message I wanted to say to you Now let's try to understand the difference between a code and the cipher
05:11
include, basically, you are replacing a work
05:15
in the ultimate
05:16
they can own ward in the language with another word.
05:20
So you basically like for instant will be them. Um, for the word for that, the agent will be the Ferran and for location would be the,
05:31
uh, stadium.
05:33
So if you want to say, like, the parent is in the stadium so you know that the engine is basically in the location you want or you're thinking about this is the same code that basically mafia and Bob's used. And it is also used with the government, such as first and in the police.
05:54
So this stable here we have court, which is actually in them, but
05:58
and it's like you say Operation 100. The code for this 1 28 meters oppression 100. That is its meat. So we actually speaking on understandable language, but we don't really understand the actual message behind it unless we are able to.
06:16
I understand
06:18
the court that is using now cipher is you take the text huge scramble it. You get
06:28
another different language. It's nothing that part of the language you were the result of surfer is encrypted. And it is basically,
06:36
um, not understandable. Fixed.
06:41
Cypher could be It's encrypted, but the result could be decrypted. To get the cipher and with the court, you need to
06:49
understand what did the could each word, whatever equal work to it in under to understand the message. Let's just our understanding really quick. So the result of the encryption is plan tic suffer text our code.
07:05
The answer is just right here in the green. It is the cipher
07:10
text cyber ticks in the result off encrypting or encryption using encryption algorithm. Thank you so much for watching this with Russia and have wonderfully

Up Next

Data Protection Fundamentals

In Data Protection Fundamentals, Rasha Sharif explains the relationship between the collection and distribution of data, technology, and legal issues surrounding email encryption, steganography, and hashing algorithms. It is important to understand how safeguarding information can lead to no corruption or compromises taking place.

Instructed By

Instructor Profile Image
Rasha Sharif
Software Instructor at ASRC Federal
Instructor