1 00:00:00,750 --> 00:00:07,830 Now that we understand how signing works in PDP and this lecture I want to show you how to encrypt messages 2 00:00:08,100 --> 00:00:16,420 and sign them as the sender and how to verify the signature as a receiver and then decrypt the message. 3 00:00:16,510 --> 00:00:22,030 So right here I have Jones computer and let's go ahead and send a message to David. 4 00:00:22,090 --> 00:00:28,510 So as we seem before the first thing you want to do is open up a text editor and we're going to type 5 00:00:28,510 --> 00:00:29,890 the content of our message. 6 00:00:29,890 --> 00:00:36,570 So I'm just going to say this is a secret side message from John to David. 7 00:00:36,580 --> 00:00:39,690 Now like we've seen before I'm going to select all of this. 8 00:00:39,790 --> 00:00:40,930 I'm going to copy it. 9 00:00:41,800 --> 00:00:49,300 I'm going to go to my PDP clipboard and I'm going to click on sign encrypt clipboard with public keys. 10 00:00:49,390 --> 00:00:53,590 Next we want to select the public keys that we want to encrypt the message with. 11 00:00:53,590 --> 00:00:56,170 And like I said I'm sending this message to David. 12 00:00:56,170 --> 00:00:57,540 So I'm going to take him. 13 00:00:57,580 --> 00:01:01,870 You can also take John if you want to be able to decrypt your own message. 14 00:01:02,140 --> 00:01:08,290 And unlike what we did in the previous lecture before clicking on OK I'm going to go to sign message 15 00:01:08,350 --> 00:01:15,430 as if you click on this list you will see a list of all of the private keys that you have on this computer. 16 00:01:15,430 --> 00:01:17,260 So this is John's computer. 17 00:01:17,260 --> 00:01:21,340 And as you can see the only private key that we have is John Wilkes. 18 00:01:21,430 --> 00:01:28,210 So I'm going to select that and I'm going to click OK it's showing a warning about the key. 19 00:01:28,220 --> 00:01:29,930 It's my own key so I trust it. 20 00:01:29,930 --> 00:01:30,800 So I'm going to click. 21 00:01:30,810 --> 00:01:37,940 Yes and then it's going to ask you to enter the passphrase that you selected when you created this key 22 00:01:39,570 --> 00:01:40,110 I'm going to hit. 23 00:01:40,140 --> 00:01:40,700 OK. 24 00:01:42,040 --> 00:01:48,100 And as you can see right here the icon of the clipboard changed to a log which means that now in my 25 00:01:48,100 --> 00:01:52,930 clipboard I have the encrypted message along with the signature. 26 00:01:52,930 --> 00:01:58,330 So I know in my diagrams in here when we were sending the message I said we're going to send a message 27 00:01:58,330 --> 00:02:05,470 with its signature but in reality both the message content and the signature is all going to be one 28 00:02:05,470 --> 00:02:06,970 block of text. 29 00:02:06,970 --> 00:02:13,330 So if I'm back here at my text editor and just paste wherever that is in my clipboard You'll see we'll 30 00:02:13,330 --> 00:02:20,370 just get one block of text that contains the content of the message and the signature. 31 00:02:20,500 --> 00:02:23,670 So as we did before I'm going to go to my email. 32 00:02:23,830 --> 00:02:28,450 I'm going to compose a new message and I'm sending this to David Smith 33 00:02:31,210 --> 00:02:34,540 and I'm going to piece the message along with its signature. 34 00:02:34,540 --> 00:02:43,140 Like I said and I'm going to click on send to send the message now let's go to David's computer refresh 35 00:02:43,170 --> 00:02:49,060 our inbox and click on the new email. 36 00:02:49,070 --> 00:02:50,470 We have the message contents. 37 00:02:50,480 --> 00:02:54,890 So again we're going to select all of it right click copy. 38 00:02:55,080 --> 00:03:02,630 And as you can see right here we can see the log on the PDP upload one click on this and we're going 39 00:03:02,630 --> 00:03:09,140 to click on decrypt verify clipboard so the steps are very very similar to what we did in the previous 40 00:03:09,140 --> 00:03:11,310 lecture. 41 00:03:11,340 --> 00:03:16,800 Now it's going to ask me to enter the passphrase for my own key for David Smith Skip 42 00:03:20,130 --> 00:03:25,410 and as you can see we see the content of the message again very similar to what we've seen in the previous 43 00:03:25,410 --> 00:03:32,490 lecture but at the same time you can see at the bottom in here it's telling us that this message has 44 00:03:32,490 --> 00:03:42,520 been signed with a good signature of John Wick we can also see the key I.D. And the key fingerprint. 45 00:03:42,690 --> 00:03:49,590 So right now we're sure that the person that encrypted this message the sender is actually John week 46 00:03:49,860 --> 00:03:53,860 and it's not someone else that is pretending to be John wake. 47 00:03:54,060 --> 00:04:01,710 Not only that but we're also sure that the contents of this message was not modified as it was transmitted 48 00:04:01,710 --> 00:04:08,190 to us because like I said when data is sent over the Internet or over a lot of methods of communications 49 00:04:08,610 --> 00:04:14,190 it passes through a number of hubs and each one of these hubs could be modified. 50 00:04:14,190 --> 00:04:17,920 Not only that it can also be intercepted by a number of methods. 51 00:04:18,000 --> 00:04:25,440 And when hackers or agencies intercept them they can modify them implant data or remove some data. 52 00:04:25,620 --> 00:04:32,760 Therefore when the signature checks out as we can see in here if it's verified that means that the message 53 00:04:32,880 --> 00:04:39,250 was not modified since it was signed by John's private key. 54 00:04:39,480 --> 00:04:46,350 No can also see that there is a warning say saying the key is not certified with a trusted signature. 55 00:04:46,410 --> 00:04:47,160 This is fine. 56 00:04:47,160 --> 00:04:49,260 You can actually ignore the message. 57 00:04:49,260 --> 00:04:52,830 It's just because the key is not set to be trusted. 58 00:04:52,830 --> 00:04:59,040 But what's really important in here is to see if this is a good signature because like I said if it 59 00:04:59,040 --> 00:05:06,090 says it's a good signature that means that the message was signed by John's private key and it did not 60 00:05:06,090 --> 00:05:10,890 get modified since it got signed by his key. 61 00:05:10,980 --> 00:05:17,880 So right now we have a method to send data anyway so that even if it gets intercepted by any party they 62 00:05:17,880 --> 00:05:19,480 won't be able to read it. 63 00:05:19,500 --> 00:05:22,950 The only person that will be able to read it is the receiver. 64 00:05:22,980 --> 00:05:29,400 Not only that but the receiver will be able to verify that this was sent from the person that they want 65 00:05:29,400 --> 00:05:30,370 the message from. 66 00:05:30,420 --> 00:05:37,680 So they can verify the sender and verified that the message did not get modified as it was being sent.