1
00:00:00,160 --> 00:00:06,140
now, pgp is one of the more important topics when it comes to cybersecurity, anonymity or privacy online.

2
00:00:06,280 --> 00:00:13,890
pgp is sort of a set of tools and methodologies and software that allows you to encrypt communications securely.

3
00:00:13,890 --> 00:00:17,720
it is not a specific type of encryption algorithm or cipher.

4
00:00:17,860 --> 00:00:26,800
instead, it's a suite of software used to actually go about encrypting and decrypting files, folders, messages, and even signing things securely.

5
00:00:26,900 --> 00:00:31,570
so throughout the encryption course, we learn a lot about pgp and how to actually use it.

6
00:00:31,570 --> 00:00:35,010
but for now, it's good to understand the basics of what pgp is.

7
00:00:35,010 --> 00:00:46,040
pgp stands for pretty good privacy and was invented back in the nineties as a set of standards and programs where you could use these sort of encryption methods to encrypt and decrypt things securely.

8
00:00:46,620 --> 00:00:48,790
it's again, it's more of an encryption program.

9
00:00:48,790 --> 00:00:51,430
it's not a standalone way to encrypt.

10
00:00:51,430 --> 00:01:04,280
it uses both asymmetric and symmetric key methods and includes the ability for hashing and signing and validation, key importing and exporting, key publishing for sharing it right to the internet.

11
00:01:04,340 --> 00:01:08,680
it has a lot of great things built into it that we'll come to learn about throughout this course.

12
00:01:09,420 --> 00:01:16,430
and it's important to note that when you're doing things like creating a key, you can actually choose the different ways you want to create that sort of key.

13
00:01:16,430 --> 00:01:23,930
so an example screenshot here from cleopatra, we're creating a new key and we can actually select the method of encryption type we want for the key.

14
00:01:23,930 --> 00:01:27,210
do we want to use rsa or dsa or ecdsa?

15
00:01:27,210 --> 00:01:31,120
do we want the certificate to be able to be used for signing, authentication?

16
00:01:31,380 --> 00:01:33,560
how long do we want the certificate to be valid?

17
00:01:33,660 --> 00:01:38,120
all of these are available in a tool called cleopatra, which is a tool we'll use later in this course.

18
00:01:38,340 --> 00:01:48,830
so the most basic example of pgp would be a sort of asymmetric encryption flow where you have a message like this that somebody wants to send me, for example, they want to send me their email address, but they want to make sure it's secure.

19
00:01:48,830 --> 00:01:58,960
in this case, i would need to have a public and private key and they would take my public key or i could send them my public key and then they would encrypt the message they want with my public key.

20
00:01:59,180 --> 00:02:05,330
then all i would need to do is take my private key with that message and i can decrypt the message to find out what it means.

21
00:02:05,330 --> 00:02:12,600
so before they send the message, they take my public key, they encrypt the message with my public key, and then they send that message to me.

22
00:02:12,620 --> 00:02:17,590
and then once i receive the message, i can take my private key and decrypt the message to read it again.

23
00:02:17,590 --> 00:02:22,370
it's a very basic flow, very easy to understand public key for encrypting.

24
00:02:22,370 --> 00:02:25,190
if they want to send it to you and private key for decrypting.

25
00:02:25,190 --> 00:02:36,320
if i wanted to send a message back to the person who sent me this message, i would need their public key to then encrypt my return message back to them, which they would then use their private key to decrypt that message.

26
00:02:37,460 --> 00:02:39,750
again, this is just the fundamentals of pgp.

27
00:02:39,750 --> 00:02:47,050
we'll keep diving in more as we learn about how to use pgp and especially when it comes to the different types of keys, how to create keys and all of that.

28
00:02:47,050 --> 00:02:49,080
so continue on to learn more about that.