Diffie-Hellman Key Exchange - the MAGIC that makes it possible - Cryptography - Practical TLS

Поделиться
HTML-код
  • Опубликовано: 22 дек 2024

Комментарии • 99

  • @PracticalNetworking
    @PracticalNetworking  3 года назад +5

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

  • @iicekingak47
    @iicekingak47 2 года назад +37

    This was by far the easiest example on RUclips for understanding Diffie-Hellman. Thanks!

  • @ilariacorda
    @ilariacorda Год назад +3

    Probably the best video on Diffie-Hellman algorithm, so well done!

  • @wassim-akkari
    @wassim-akkari 3 года назад +10

    Thank you for this series, It's really well made. I would probably reference each time I forget a concept.

  • @llandarek1
    @llandarek1 Год назад +1

    That is exactly what I was looking for a while. I also signed up for the TLS course. Well done for the great content.

  • @CyberTronics
    @CyberTronics 3 года назад +2

    Ohh yesssss. Whilst going through your TLS series got notification of this video and oh boy am I ready for Diffi. It’s not easy to understand but I can almost be certain you’ll have broke it down in such a way my 80 year old grandma will make sense of it!

  • @renujain8911
    @renujain8911 Год назад +2

    I dont know how to say thankyou to this channel as it made me to understand all these complicated concepts in very simple explanation.... Good work & keep doing it 🙂

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Renu! I've rather enjoyed seeing your kind comments on all the videos. Thank you for the positive energies! Truly happy you are learning so much from the channel. Cheers, friend. Happy (continued) learning! =)

  • @PubgPeaks
    @PubgPeaks Год назад +1

    Perfect simplest explanation found on youtube

  • @wwolfram33
    @wwolfram33 Год назад +1

    Thanks!

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Hey Ward, I just wanted to say a huge thank you for the Super Thanks donation! Your support truly brightens my day and motivates me to create even more content. Thank you!

  • @catalyticcentaur5835
    @catalyticcentaur5835 8 месяцев назад

    Hey Ed,
    as I['ve ]read through them: You really earn these praises here. Thank you!
    Best regards,
    CC.

  • @altanadamdintsyrenova4449
    @altanadamdintsyrenova4449 Год назад

    Hey hey, tried with Private key =2 and Private key =7, ending up with Public key =10 and Public key =7. And Shared one is 10. Thank you for your work! You are the best 😎🤓

  • @peterchmelar8886
    @peterchmelar8886 3 года назад +1

    Another great monday. Thanks for the upload

  • @Unauc6
    @Unauc6 4 месяца назад +1

    I have to subscribe to this channel. Thank you.

  • @rafay1708
    @rafay1708 3 года назад +1

    Just liked it before watching, we all know it's gonna be a great Video

  • @robpowell9162
    @robpowell9162 Год назад +2

    These videos are life changing, I appreciate your teaching style and notes!
    Question: Do you think we will go to elliptic curve crypto, away from DH and RSA due to key sizes etc, at least for key exchange?
    I would love to see you do a 101 video on ECC, as it's blowing my head around the maths and how it works!

    • @PracticalNetworking
      @PracticalNetworking  Год назад +2

      Yes, it's on my list!
      EC crypto is just using a different set of "numbers" than what we are used to. IT's still the same algorithms, just using points on a curve instead of real numbers (1, 2, 5, 100, 9999, etc...).
      So yes, we will always be using DH, RSA, DSA, etc... just sometimes on a curve (hence ECDH, ECRSA, ECDSA).
      Well, at least until quantum safe algorithms take over, I suppose.

    • @robpowell9162
      @robpowell9162 Год назад +1

      @@PracticalNetworking I'd love to see ECSDSA!
      Thankyou for making it so much easier to learn, I appreciate you so much.
      Do you think we will have quantum safe? Or "safe for now"? I wonder if that's measured in years, decades, or more?

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Everything in crypto is always a "safe for now" gamble ;p

  • @fastrobreetus
    @fastrobreetus 7 месяцев назад

    You are a great teacher!

  • @PixelDevPro
    @PixelDevPro Год назад +4

    How did they agree on two numbers, 13 and 6, at the beginning of their conversation? Let's say Bob doesn't know Alice and wants to send her a message. How will their first exchange happen? I am still confuse about it

    • @PracticalNetworking
      @PracticalNetworking  Год назад +1

      The peers have to do a handshake before they can do DH, and in that handshake they "agree" on a DH Group (which contains the two numbers, P and G).

    • @rotorfpv4117
      @rotorfpv4117 9 месяцев назад +1

      no one will overhear this?

    • @dustcore
      @dustcore 5 месяцев назад +1

      ​@rotorfpv4117 They will, but without knowing either peers private key, it's safe.

    • @SouMorse
      @SouMorse Месяц назад +1

      ​​@@rotorfpv4117anyone can overhear, but they won't be able to calculate the shared key cause it depends on the secret keys, which are secret

  • @karthikbm1587
    @karthikbm1587 3 года назад +1

    Thank you for Teaching very easily understand difficult concept.

  • @pretbadha
    @pretbadha 8 месяцев назад +1

    CA certificates contain publicPrivate keyPairs stamped by a trusted authority.......Great Course ED.... well done

  • @AJ-jm6zp
    @AJ-jm6zp 3 года назад +1

    As always, very great lecture, very useful, thank you so much brother

  • @adedejiemmanuel1
    @adedejiemmanuel1 3 года назад +1

    Like always, you make it look easy. Thanks

  • @nguyendinhthai3486
    @nguyendinhthai3486 Год назад

    so damn good course. I am registering the course. Keep good work, Ed!

  • @jayak3768
    @jayak3768 Год назад

    In standard tls, a separate secret key is generated by the client and encrypted with servers public key is sent to the server. That is only the servers public/private key pair is used to exchange the symmetric key.
    Is that different than the secret key generation and sharing discussed here.

  • @Don-Carillo
    @Don-Carillo 3 года назад +2

    Cheers , made that a lot easier than most do . not an easy one to explain and welcome back Alice and Bob :) . These Martin Helman and Whitfield Diffie guys have some brain capacity don't they .

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Yea, it's incredible that these algorithms were developed 30~ years ago and are still the foundation of the crypto we use today. Cheers Don!

  • @srb1855
    @srb1855 3 года назад +1

    Excellent explanation. 👍

  • @Sneguro4ka
    @Sneguro4ka 7 месяцев назад

    Perfect explanation.

  • @MidheimOfficial
    @MidheimOfficial Год назад +1

    OK, nice explanation. What i can never find is how the keys are used to crypt and decrypt messages! Do you have some ressources on that by a chance?

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Yes, I have a video on my channel about RSA. It shows the math which creates keys, and the math which uses them to encrypt and decrypt messages.

  • @alimajdn
    @alimajdn Год назад

    Many Thanks for your Amazing topics, keep it up

  • @hosseinshourabi398
    @hosseinshourabi398 2 года назад +1

    Thank you so much :)
    As Always, Great!

  • @matiashuartamendia7977
    @matiashuartamendia7977 Год назад

    so DH negotiates session key to encrypt data symmetric. However, RSA generates key pairs that are used to encrypt the session key when exchanged? then that session key is used symmetric to encrypt bulk data?

  • @TCinT
    @TCinT 3 года назад +1

    The math in this one is very cool :)

  • @IliyaDamyanov
    @IliyaDamyanov Год назад

    Thanks for the excellent video.

  • @rids22
    @rids22 2 года назад +2

    Hi, what if the public key which Alice and Bob shares with each other is modified by hackers in public network? Both Alice and Bob would never be able to create same shared secret.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +4

      Yes! Correct. Hence, when sharing the Public Key, it's good to also implement something that also provides Integrity. This is why when you download a website's certificate (which includes a public key), the certificate also includes a Signature (providing Integrity and Authentication).
      More details on signatures here:
      ruclips.net/video/_zyKvPvh808/видео.html

    • @burgundyhome7492
      @burgundyhome7492 2 года назад

      So by this "integrity" mechanism they will both know IF the public key they received was tampered or not? Cool!

  • @rojenshrestha4371
    @rojenshrestha4371 Год назад

    hello how are the agreed number defined to be used bu both parties?

  • @TaneemMazumder-q4l
    @TaneemMazumder-q4l 10 месяцев назад

    So if hacker get to know what the shared numbers are meant for (i:e maybe hacker manages to read an email which have them listed), then hacker will also end up generating the same secret key, right?

  • @saoodkhan5251
    @saoodkhan5251 3 года назад +1

    Thank you sir,, best video.

  • @wolvie008
    @wolvie008 2 месяца назад

    Thank you !

  • @elementsoflightandmusic
    @elementsoflightandmusic 2 года назад +1

    Thank you, this helped a lot!

  • @HbAli-s7q
    @HbAli-s7q 2 месяца назад

    Well done... Thanks a lot..

  • @cgrinseo7752
    @cgrinseo7752 2 года назад +1

    But what exactly is Generator of P? Is it randomly generating Prime numbers or just random numbers? In this case 6 is not a Prime number

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Good question... I should write an article about it. Reach out to me on Discord and I can explain it to you briefly.
      But you are correct to point out Generator != Prime number. =)

  • @tharuntej1019
    @tharuntej1019 10 дней назад

    is this algorithm refers to the hybrid key cryptography

  • @kleinpca
    @kleinpca 6 месяцев назад

    6 being a generator of 13 in this context means that any number from 1 to 12 can be written as 6^k (mod 13) for some k between 1 and 12. Not only does the speaker not define what "generator" means, he then goes on to say that Alice and Bob each "generate" a private number without defining what that means. Indeed the private numbers can be "generated" in the sense above because a and b are constrained to be whole numbers between 1 and 12, and we have just seen that all such numbers can be "generated" by writing them as 6^k (mod 13). But surely it would have been simpler to say that Alice and Bob each choose an arbitrary whole number between 1 and 12.

  • @nikolqy
    @nikolqy Год назад

    Very cool, thank you!

  • @ayradizem2770
    @ayradizem2770 3 года назад +1

    Thank you man for the video :)

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      You're welcome, Ayrad!

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Congrats Ayrad. You won the random course giveaway =). Reach out to me on Discord to claim your prize: pracnet.net/discord
      (I just realized that I never picked a Winner for this video, sorry for the long delay)

    • @ayradizem2770
      @ayradizem2770 3 года назад +1

      @@PracticalNetworking thank you very much :)

    • @ayradizem2770
      @ayradizem2770 3 года назад +1

      @@PracticalNetworking I'm in your groupe in discord but I don't know how to get what I have won :D

  • @TheMrNatoShow
    @TheMrNatoShow 3 года назад +1

    SpongeBob and cryptography 🔐 are a FANTASTIC pair!

  • @maxmaster9908
    @maxmaster9908 3 года назад +1

    Super!!

  • @adrianopace9967
    @adrianopace9967 Год назад

    Thank you :)

  • @burgundyhome7492
    @burgundyhome7492 2 года назад +1

    Aha! So they exchange each other's public but they don't see each other's private! Got it!

  • @studio48nl
    @studio48nl Год назад

    +1 for the 'why' it is difficult te reverse engineer!

  • @safwanumer3997
    @safwanumer3997 2 года назад +1

    Am I the only one to feel this topic is just a piece of cake after hearing this explanation?

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      That tells me I did my job correctly =).

    • @safwanumer3997
      @safwanumer3997 2 года назад +1

      @@PracticalNetworking absolutely, just love your videos.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      @@safwanumer3997 If you're willing, sharing this content online would be a great help. =) Glad you enjoyed these either way. Cheers, Safwan.

  • @ericzuckerburg6292
    @ericzuckerburg6292 2 года назад +1

    Sanks q very much

  • @soanzin
    @soanzin Год назад

    Que vídeo do caralho.. nunca encontrei um vídeo no RUclips com tamanha qualidade de detalhes..

  • @mfondesmondiwok690
    @mfondesmondiwok690 Год назад +1

    sometimes i just wish i can give u a thousand likes with one account. #Simplified learning

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Thanks for the kind note =). I appreciate even the single like! Cheers.

  • @admin_e
    @admin_e 3 года назад +1

    👍👍👍

  • @santoshkumar-dr4qg
    @santoshkumar-dr4qg 3 года назад +1

    👏👏👏✅

  • @TebogoMotlhale
    @TebogoMotlhale 7 месяцев назад

    the ENTIRE so-called Security of Diffie Hellman, is dependent on the premise that an attacker would need THOUSANDS of years to brute force matching keys 🤔🤔🤔 And we HAVE lottery winners who can PERFECTLY pick a sequence of 7 numbers OUT of a staggering 60-number ball RANDOMIZING machine 🙄🙄 i hope these numbers of Mr Diffie are BIG enough to **prevent** this sort of LUCKY matches 🙄🙄 Now watch out for that word again . . . do big numbers (being RANDOM themselves 😟🧐😳) actually **PREVENT** random LUCKY matches from attackers 😰😰 ?

  • @motiondesign2501
    @motiondesign2501 Год назад

    So, to bob and alice decrypte the message first, it must alice and bob accept the public key both side witch A=(G x mod n) the result is the public key must be accepted both side and we called this digital certificate.