>>Hi, everyone, Ed Amoroso here. So, you remember in our last video, we learned how to send a secret message from Alice to Bob using public key cryptography and it was kind of fun. We send a credit card or something and Eve can't read it. Well, what's another possibility? We weren't happy that we didn't have authenticity, we wouldn't have the ability to authenticate. So, another possibility is maybe that message m, we might encrypt with your own secret key and in cyber security, when you use your own secret key for something, we call that digitally signing it, okay? Just create a message m, I'm going to encrypt it with secret key of A, me, Alice and we send it over to Bob, okay? So, you guys with me? And you know Bob will be able to decrypt that because Bob has a public key of me. But, Eve is sitting down there watching all of this, and what did we say Eve had? She has everybody's public key. So, she got my public key. If I'm Alice, which means that when I send a digitally signed message using my secret key to Bob, Eve can read the thing. So, that's not good. Now, the good news is if I ask you whether Eve could create or craft or spoof that message, remember we learned the term spoofing? Can she do that? No, because she doesn't have my secret key. So, we have this weird set up here, don't we? Where previously, I had secrecy but I didn't have authentication. Now, I have authentication and I don't have secrecy, and I don't like either of those cases. They're both somehow, missing an important property. How are we going to solve this thing? How are we going to figure out how to solve it? Now, before I give you the answer, which we'll do in the next video, there's still one more thing here that we didn't test. I didn't try encrypting with my own public key, just for completeness sake. If you encrypt with your own public key and send it somewhere, then in theory, nobody can read it except you. So, you can imagine some weird kind of thing where you're storing sensitive stuff, maybe your important intellectual property or pictures you don't want, family photos and things you don't want your cloud provider to see. I don't know, I could imagine that, but it tends not to be as important in a case, the idea of using your own public key. Turns out in public key cryptography, the two important cases are, using the public key of a recipient and using the secret key of you. Meaning, when I see you, I use your public key to laser focus something to you in a secret manner. And when I want you to know who I am, I use my secret key to sign it in a way that you can be certain it came from me. Those are the two important building blocks. But we've seen [inaudible] two pretty obvious protocols so far that we haven't gotten the properties that we're really looking for. So, we're going to get to that in the next video. Stick with us and you'll see how we put these things together into one of the most important and fundamental protocols built by Diffie and Hellman. We'll see that in a moment.