1 00:00:00,450 --> 00:00:03,760 So where is this where we're going to take a look at this tool called openness. 2 00:00:04,230 --> 00:00:11,040 And this is very important for cryptography and this is mainly used for establishing the secure connection 3 00:00:11,040 --> 00:00:12,630 between the sender and receiver. 4 00:00:13,050 --> 00:00:18,710 And it's also helpful in generating the certificates and public and private keepsakes as well. 5 00:00:19,530 --> 00:00:27,690 So it supports a lot of encryption data and we can safely and pretexting to continue to do ciphertext. 6 00:00:28,950 --> 00:00:29,490 So. 7 00:00:31,580 --> 00:00:41,900 We need to take both the necessary and then sorest safer comments, so this will restart the same for 8 00:00:41,900 --> 00:00:48,940 comments I can execute, uh, to create the ciphertext and you can see the famous algorithms. 9 00:00:49,010 --> 00:00:49,680 Yes. 10 00:00:50,120 --> 00:00:58,780 Uh, this and base64, this is not an option, but we can just get the all put into this bill 64. 11 00:00:59,570 --> 00:01:06,530 So now let's go and try this Bill 64, including first, let me say open sister. 12 00:01:08,810 --> 00:01:19,310 So this openness will operate on Phylis, so let me try to file with the content, say hello world, 13 00:01:20,600 --> 00:01:23,960 and this is our plain text message and let's. 14 00:01:26,360 --> 00:01:33,620 I read this into the file complaint, so no brain file contains this horrible text. 15 00:01:35,030 --> 00:01:43,550 So what we're going to do is we are going to say open and Sissel and we need to Switchfoot and Yansi. 16 00:01:43,550 --> 00:01:48,420 And afterwards we will discuss further encryption algorithm that's be 64. 17 00:01:48,470 --> 00:01:57,440 You need to switch for hyphen to indicate this as an option like argument and encryption base64. 18 00:01:57,740 --> 00:02:03,490 And we need to switch with the input so sane and take the plain text file the display. 19 00:02:04,820 --> 00:02:07,250 No, we have got this output. 20 00:02:07,710 --> 00:02:09,350 This is the basis for output. 21 00:02:09,830 --> 00:02:15,350 Now you can sell this with the out option out to cipher. 22 00:02:17,090 --> 00:02:20,210 Now, if you take a look at this, conditions are the same for. 23 00:02:21,930 --> 00:02:24,990 You will have this same ciphertext. 24 00:02:27,080 --> 00:02:29,090 Now, let me go and decode this. 25 00:02:29,390 --> 00:02:36,630 Oh, base64, uh, text that's open SSL and encryption matter. 26 00:02:36,650 --> 00:02:42,750 I want to use this basically for what I need to specify the way that is the Modeste. 27 00:02:42,920 --> 00:02:50,050 I want to know right now if I stay in and I want to listen for the input, but now I'm going to switch 28 00:02:50,120 --> 00:02:54,800 the encryption with each and I would decrypt from the input cipher. 29 00:02:55,820 --> 00:02:58,240 And as you can see, we got the output as well. 30 00:02:58,880 --> 00:03:01,490 No, let's go ahead and try one of these. 31 00:03:01,610 --> 00:03:02,130 Uh, yeah. 32 00:03:02,180 --> 00:03:02,450 Yes. 33 00:03:02,450 --> 00:03:02,920 Algorithm. 34 00:03:03,230 --> 00:03:05,390 Let's say you want to do it with CBC. 35 00:03:05,400 --> 00:03:08,210 More open. 36 00:03:10,800 --> 00:03:13,020 So the issue here. 37 00:03:15,330 --> 00:03:22,420 So I'm going to use this encryption method you want to deal with on the plane takes the control. 38 00:03:23,400 --> 00:03:25,690 Now it's going to ask for the password. 39 00:03:25,710 --> 00:03:29,120 So this is yes, we need to do the password. 40 00:03:29,190 --> 00:03:33,030 Senechal and we need to interrogate. 41 00:03:36,480 --> 00:03:44,700 So if you take a look at this, uh, so far, you'll get some random characters, it says it started 42 00:03:45,000 --> 00:03:51,480 so random value has been added to the encryption to make sure that the decryption is somewhat difficult 43 00:03:51,480 --> 00:03:52,470 for attackers. 44 00:03:53,820 --> 00:04:03,690 So now what we're going to do is we are going to encrypt this whole in 64, you can pass multiple encryption. 45 00:04:03,700 --> 00:04:10,050 So after this one so fast, it will take the text and it will apply the algorithm and then it will apply 46 00:04:10,060 --> 00:04:12,110 the basic algorithm. 47 00:04:12,170 --> 00:04:16,910 Now, if you hit enter, tell the password again at the. 48 00:04:18,900 --> 00:04:28,380 So if you take a look at the server, you have this base64 and so on, you'll get this one and you need 49 00:04:28,380 --> 00:04:30,160 to decrypt this user. 50 00:04:31,830 --> 00:04:35,740 So this is the basic user of using the algorithm, Sylvanus. 51 00:04:36,450 --> 00:04:40,580 Now let's go ahead and generate our second page. 52 00:04:40,770 --> 00:04:46,810 So we run this RSA from the cryptography fundamentals and now we are going to generate the public and 53 00:04:46,810 --> 00:04:47,580 the private key. 54 00:04:48,980 --> 00:04:58,400 And I want to open, as I said, janoris it to join Dieser and say our protests keep. 55 00:05:01,670 --> 00:05:11,720 So this KEEPON file contains both private and public and to specify the keirin letter to 048, which. 56 00:05:14,630 --> 00:05:20,930 So as you can see, generating RSA, private key Pajero for a week long mudras to Prem's, so we have 57 00:05:20,960 --> 00:05:27,920 already know that there will be two Pym's PNU in this area and the evalu 650 Tresa. 58 00:05:28,790 --> 00:05:33,880 And remember, we are certain some basic are sensitive and we have solved it. 59 00:05:34,940 --> 00:05:44,750 So if you take a look at this people and you can see there is only the private key, so by default we 60 00:05:44,750 --> 00:05:45,710 cannot see the public. 61 00:05:45,830 --> 00:05:48,510 We need to extract the public key from this one. 62 00:05:49,310 --> 00:06:01,630 So you need to do open SSL, you need to say RSA and then Adesina to specify in the input for this Kieber 63 00:06:02,270 --> 00:06:05,390 file and then you need to set up about. 64 00:06:09,580 --> 00:06:13,460 So we are just extracting this from this keep it. 65 00:06:14,200 --> 00:06:16,590 So this is the private key and this is the public. 66 00:06:16,840 --> 00:06:20,890 So one important thing to remember is this. 67 00:06:20,890 --> 00:06:29,440 Arissa is used in, as I said to his generation, and then you will see some private key that is stored 68 00:06:29,440 --> 00:06:36,400 in this home for the DOD is a directory in that if you find any private key of any other user of the 69 00:06:36,400 --> 00:06:42,400 router user, you can just if you have the right access, then you can just copy it into the file and 70 00:06:42,400 --> 00:06:47,680 you can use that as a search command to interact with these private key without entering the password. 71 00:06:47,980 --> 00:06:53,010 So that is one of these misconfiguration you see in this next section. 72 00:06:53,710 --> 00:06:56,210 So we have just excited the public. 73 00:06:56,980 --> 00:07:05,110 So one thing I want to show you in this kitchen is I want to say so on this text, I get the ah the 74 00:07:05,110 --> 00:07:07,800 detailed information about this, uh, file. 75 00:07:09,700 --> 00:07:15,850 So as you can see, there is a modulus and we have already seen this in our research and public experience. 76 00:07:15,970 --> 00:07:21,100 So it is on and private explorer, which is the right B? 77 00:07:21,130 --> 00:07:22,850 I think so, yes, I think so. 78 00:07:22,900 --> 00:07:23,440 It should be. 79 00:07:23,680 --> 00:07:26,410 And this is called a C no, I don't know. 80 00:07:26,560 --> 00:07:28,210 It's just a modulus. 81 00:07:28,210 --> 00:07:35,410 And after the private exponent is B and the prime, I want to be and do and this exponent one and two 82 00:07:36,100 --> 00:07:37,030 and the coefficient. 83 00:07:37,510 --> 00:07:46,690 So these are the parameters that are involved in Adisa and corruption and the crucial public and private 84 00:07:46,690 --> 00:07:47,100 keeper. 85 00:07:48,880 --> 00:07:51,470 So this is what this is. 86 00:07:52,000 --> 00:07:57,150 And you can also, uh, encrypt here. 87 00:07:57,160 --> 00:08:01,060 You can say and trip and you can specify that any other. 88 00:08:01,060 --> 00:08:01,460 Idato. 89 00:08:01,480 --> 00:08:06,950 You can, uh, even encrypt this private key to some years or this format. 90 00:08:09,640 --> 00:08:16,270 So the thought about this openness and lastly, I want to show you the open SSL, so we have learned 91 00:08:16,270 --> 00:08:25,930 about this 80 percent default rate so we can generate the encrypted password and we can edit that is 92 00:08:25,930 --> 00:08:28,000 suitable for the possibility encryption. 93 00:08:28,990 --> 00:08:34,020 And this possibility uses the best algorithm for encrypting the passwords. 94 00:08:34,510 --> 00:08:39,020 I didn't know Tuesdays open as a possibility and indiscernible. 95 00:08:40,480 --> 00:08:44,100 So the password, Nikil, will be encrypted. 96 00:08:45,250 --> 00:08:51,610 So now you can push this in a two party preferred username, then you can put this in group. 97 00:08:53,170 --> 00:09:02,590 So if you want to specify some sort for this, so it will be like only for this username and password 98 00:09:04,030 --> 00:09:06,070 or to make it secure. 99 00:09:08,220 --> 00:09:14,970 And you can just I have added the salt for this username and password, this encrypted possibility for 100 00:09:14,970 --> 00:09:23,810 the username and password, and you can see the username here and this can be copied into the Tea Party. 101 00:09:24,240 --> 00:09:31,170 When you have the right access, you can just add another user with this password hash so that what 102 00:09:31,230 --> 00:09:32,540 this openness is available. 103 00:09:33,000 --> 00:09:34,200 I hope you have understood.