full transcript

From the Ted Talk by Andy Yen: Think your email's private? Think again

Unscramble the Blue Letters

So let's have a look and see how this wkros when mtplulie people communicate. So here we have Bob and Alice, who want to communicate privately. So the key challenge is to take Bob's message and to get it to Alice in such a way that the server cannot read that message. So what we have to do is we have to epnryct it before it even leaves Bob's computer, and one of the tricks is, we encrypt it using the pbulic key from Alice. Now this encrypted data is sent through the server to Alice, and because the message was eecptnryd using Alice's public key, the only key that can now dyrcept it is a prvtaie key that belongs to Alice, and it turns out Alice is the only person that actually has this key. So we've now accomplished the objective, which is to get the message from Bob to Alice without the server being able to read what's going on.

Open Cloze

So let's have a look and see how this _____ when ________ people communicate. So here we have Bob and Alice, who want to communicate privately. So the key challenge is to take Bob's message and to get it to Alice in such a way that the server cannot read that message. So what we have to do is we have to _______ it before it even leaves Bob's computer, and one of the tricks is, we encrypt it using the ______ key from Alice. Now this encrypted data is sent through the server to Alice, and because the message was _________ using Alice's public key, the only key that can now _______ it is a _______ key that belongs to Alice, and it turns out Alice is the only person that actually has this key. So we've now accomplished the objective, which is to get the message from Bob to Alice without the server being able to read what's going on.

Solution

  1. works
  2. public
  3. encrypt
  4. encrypted
  5. private
  6. multiple
  7. decrypt

Original Text

So let's have a look and see how this works when multiple people communicate. So here we have Bob and Alice, who want to communicate privately. So the key challenge is to take Bob's message and to get it to Alice in such a way that the server cannot read that message. So what we have to do is we have to encrypt it before it even leaves Bob's computer, and one of the tricks is, we encrypt it using the public key from Alice. Now this encrypted data is sent through the server to Alice, and because the message was encrypted using Alice's public key, the only key that can now decrypt it is a private key that belongs to Alice, and it turns out Alice is the only person that actually has this key. So we've now accomplished the objective, which is to get the message from Bob to Alice without the server being able to read what's going on.

Frequently Occurring Word Combinations

ngrams of length 2

collocation frequency
business model 2
communicate privately 2
key challenge 2
private key 2

Important Words

  1. accomplished
  2. alice
  3. belongs
  4. bob
  5. challenge
  6. communicate
  7. computer
  8. data
  9. decrypt
  10. encrypt
  11. encrypted
  12. key
  13. leaves
  14. message
  15. multiple
  16. objective
  17. people
  18. person
  19. private
  20. privately
  21. public
  22. read
  23. server
  24. tricks
  25. turns
  26. works