Secret Key Exchange (Diffie-Hellman) - Computerphile
HTML-код
- Опубликовано: 14 дек 2017
- How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
Mathematics bit: • Diffie Hellman -the Ma...
Computing Limit: • Computing Limit - Comp...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com
Poor Alice and Bob. Always exposed. Always out there. Never left alone. ❤️
To answer the question about the aggressive tone in advance, I'm drunk, not austistic. No harm meant.
Eve is always stalking them...
Damnit. You're right.
#Pray4AliceAndBob
Meh. What if Alice and Bob are just attention whores?
The analogy with colors in this video is pure genius! Thank you guys, this was an amazing introduction to Diffie-Hellman!
Diffie-Hellman's original paper will drive you up the wall.
5 years later and this is still done a million times a minute out there. Very well explained, thank you!
Hey can you please clear my doubt, Actually I am kind of bit confused about the ordering of the events which takes place while TLS handshake does the digital certificate part which server shoots to the client to tell the client it's integrity and provide client it's public key happens before Diffie Helman key exchange or after it or eventually during the key exchange
@@nishantdalvi9470 why are you responding to me after 5 months? FIVE MONTHS!?!?!?!
Random squirting of fluids... exactly what I wanted to see this early in the morning...
the random squirting of fluids, by alice and bob, out in public.
ohhhhhh myyyyyyyy
Thomas Carrel It’s ok, no one minds if it’s done by Dr. Mike Pound
@@therealquade yeah they should rather put it in the privates
Is that Super Sonico?
Nice! This is a subject I should have covered immediately after the Public Key Cryptography video, since that one lays out the problem of exchanging keys that Diffie-Hellman solves. Great to see such a clear explanation, I doubt I'd have gone to the effort to get coloured liquids!
robert miles with only 4 likes and no replies?
also, first!
Your public key crypto video was amazing! So was this one !
Is it a 'clear' explanation though, or a coloured one?
yessss him again
maxwell,cpp sexy, right?
komma cpp ?!
in for a penny, in for (Dr.) Mike Pound
wtf?!!
Mike is the best. Except for maybe Parker.
Watched the defcon presentation from years ago given by the creator of the diffie-helman key exchange... It was absolutely fascinating. Dude is an innovator and pure genius. Seems like a nice guy as well
I really like this guy. Been watching and rewatching his lessons for like 3 hours.
How curious, PBS Infinite Series have been talking about encription in the last few days. Now I've got double the encryption bonanza! This has been a good week.
I think the next video in the series will be about this key exchange.
Further, one of the Royal Institution's recent videos used the same color mixing analogy to demonstrate key exchange.
The color mixing analogy has been used to describe Diffie Hellman key exchange for a couple of decades at least.
curious indeed.....
1:04 First rule of cryptography: Unless your job is to create cryptographic algorithms, *never* implement your own cryptographic algorithms. You *will* screw it up.
Nice advice because it is such a tempting prospect.
Why would you even want to implement your own in the first place?
@@baatar for funnnnnn
In high school I thought I was being clever and did this. Took my deskmate about 1/2 an hour to crack it. Despite many evidence to the contrary, I still think I'm clever.
@@paulzapodeanu9407 Let me guess, simple substitution
This demonstration was a classic Parker square.
Matt Parker says "No."
What I like most about this channel is the ability of the presenters to explain things simply without mathematics. That is real teaching, not reciting formal proofs and equations
Reciting formal proofs is also teaching, just for more advanced.
Everytime I feel confused by e2ee or key exchange, I will come back and see these videos. Really helps.
I'm a simple man. I see a computerphile video with Mike Pound, I click like
Sir, you have sincerely helped me with my homework far more than my textbook ever could. Thank you so much for making these videos! :D
Excellent, clear explanation, and the colours really showed the process visually, thanks guys!
Beautifully explained.
i love the style of the whole channel! proofs nobody really needs power point or laborious anmations.
This helps soooo much with my university studies! Dr. Pound, your the best.
I've never seen a clearer explanation of DH. Thanks guy!
Thank you. This video really made the concept of Diffie-Hellman key exchange clear for me.
This is the best explanation of key exchange i came across, thanks for uploading this
This might be the quarantine talking, but I’m starting to get a crush on this dude
lol,i feel you ,i wish my lecturer could have his face then i wont skip any lecture
Amazing video. I could not have found a better teacher. Thank you so much.
Great explanation. Makes this concept really easy and straight forward to understand. 👍Thank you
Recently discovered this channel and I love it ❤
Thanks for whole serie of videos! I found something useful for my students and it is great!
Such a good video! Really clever concept, and the colour analogy is great! Cheers! :D
Very simplified approach of teaching. Great video
I was actually looking for a good Diffie Hellman video a couple of days ago - how convenient!
your presentation is so clear and understandable, thanks a lot
I would have understood a lot more mathematics had it been presented so intuitively!
2:53 that sound though! =)
Best explanation of DH with such a simple example ..great work ..keep it up
This is the greatest video I have watched on encryption, ever!
Thanks a lot.
I just love this guy! Keep him comin'.
Great video, but surely the simpler method with the colours would have been to have ramekins with clear water and then add X drops of food colouring for the stages?! 😂
Apparently Mt.Dew vending machine was closer than a food coloring vending machine.
But that wouldn't work, the private keys are different.
@@AlexRasengan1337 Not for the private keys, for the public key (g)
What an incredible video! Fantastic way to understand how VPN key exchange works!! Thumbs up
Hey, thanks! I was still having issues with this but your visual representation really helped :)
This is so simple yet so effective. Very interesting.
I am writing Javascript decryption libraries for Apple Pay, Google Pay and Shopify and came across this video trying to learn more about the theory. Fantastic!
so glad that your video made it in the bibliographie of my PFE
Dr. Mike Pound is just a great great teacher
Thanx!
I got NOW my college about EXACT this
and your explanation is way more clear
Great explanation, I have been searching and no one has explained it as well
Thank you
Great video and execution. Always I need to know how something in practice works to know if I really need it in my project and then I need to know the math behind to reproduce myself. I just got here again after watching the math video, beause I have to go back to solidify the knowledge.
What a wonderful demonstration!
Finally understood the Diffy-Hellman concept. Thanks
Mathematical squirtings, LOVE THIS GUY XD, i follow this guy almost for a couple years, such a MVP
Mike Pound?? Instant like! :D
Nice, fun and accessible way to explain it :)
Really enjoyed the analogical explanation
Thanks for sharing 🙌
Finally explanation of the main part that's missing like literally everywhere else. Good lord.
amazing video, thanks Dr Mike Pound!
A very clear explanation as usual, but it would have been nice for Mike to briefly mention that a trio at GCHQ - Ellis, Cocks and Williamson - came up with the idea first.
Shut up
One thing I liked about Hellman was that not only did he invent a clever way to distribute private keys he also invented a decent tasting mayonnaise with an enormous shelf life.
It has been forecast that a jar or mayonnaise will still be more or less OK even after being stored at refrigerator temperatures for five thousand years.
If the Ancient Egyptians had known about Hellman's mayonnaise recipe and had stored a few sealed jars in the pyramids we'd still be able to open them and make a decent tuna mayo sandwich.
Probably long after the nuclear apocalypse we'll be eating Hellman's Mayonnaise probably with roach meat. Or maybe the roaches will win and eat Human Mayo sandwiches.
Brilliant. My professor could not even come close to such a great explanation.
Great visual analogy. Thank you!
i always wanted to know how was the very first aproach! now i know! thank you! great video, keep up with your excelent work!
Excellent explanation. Loved it
Awesome explanation!!!
Excellent explanation. THANK YOU!
A very clear explanation - many thanks!
Finally I have understand it with this simple example. Big thanks.
what a terrific explanation. Terrific, and thank you!
Fantasticly simple and easy to understand explanation, thank you for this.
I'm studying for the Sec+, so basics atm. But i've been getting very confused by some of the terms around encryption. I'm going to ask a completely naive question. I understand to encrypt there are two components, 1) the algorithm, 2) the key. I've seen Diffie-Hellman described as a) a public key encryption algorithm, b) a key exchange protocol, c) a public-key encryption protocol.
RSA is also described as an asymmetric public key encryption algorithm.
Diffie-Hellman only generates keys, it does not provide an algorithm for use with those keys to then encrypt data
RSA also generates keys, but can also encrypt/decrypt data
So, my questions/assertions:
1) Is there general misuse of the term "encryption algorithm" or just "encrpytion" as to what that encompasses? What should it encompass?
2) My current feeling is, Encryption = 1) the algorithm, 2) the key (but not the key generation). Encryption algorithm = 1) literally just the algorithm, not the key. EErr, i don't know what term to use that would also encompass the key generation bit. So yeah confused still.
2) The process of Diffie-Hellman key generation/exchange is still considered an encryption algorithm because it outputs data (the shared public) that makes deciphering the input to create it practically impossible?
3) Diffie-Hellman is considered asymmetric because it generates a private/public key pair first?
4) Diffie-Hellman can also be used to generate asymmetric keys ONLY?
5) So the private symmetric keys Diffie-Hellman creates would form the symmetric keys for one of the symmetric encryption algorithms like RC4/AES?
4) Looking back at the above then, the term encryption looks like it should actually include the discrete phase of key generation/distribution?
I am also studying Sec+
From what I (think I) know, here are my answers:
1 - There is no misuse. Encryption describes the goal of the action, the algorithm is what any algorithm is. A chain of operations for a specific goal. "Encryption algorithm" is fine.
2 - You are overthinking I guess. "Encryption" is a term used to describe the topic of the discussion (for example). The term "Encryption algorithm" is getting into details and explaining what is, why it's needed, how it works (each step of the process aka the algorithm), etc.
3 - Diffie-Hellman is assymetric because the Bob and Alice don't have all the same keys in their own pockets. Alice does not have the "b" key and Bob does not have the "a" key.
4 - From what I learned thus far, yes. DH is the general example for generating asymmetric keys.
5 - YES
6 (or maybe 4) - I don't think so. encrypting something using a cypher is one thing, using a handshake or other ways to communicate between parties is another (just like DH).
The DH is the actual method used to sharing of a secret key between two people who have not contacted each other before. It does not refer to the cyphers at all.
this is so well explained. Thank you!
Superb video!!!
Great job 👍👏
my favorite video on youtube!
I would like to Thank you Dr.Mike Pound for this information. it make me understand what is Diffie-Hellman is and i would like to take this video to be your reference in my work i have been put credit for u i really appreciate what u have done for us this video is just 8min it fun and i love this video Thank you
tomarrow I have new sec and cryptography exam, and this topic has high possibility of coming, this is the best explanation I found,
Very well explained and elaboration are very clear.
This is an excellent explanation, thanks a bunch!!
You just got a new subscriber. Excellent content mate.
this guys saved my semester.
This guy is a genius. The explanation method is high level. You must be a teacher. 😍😋
Amazing explanation.
FINALLY. Love your videos
Awesome explanation. 👌👌
Stellar explanation.
Fantastic content!
This guy is absolutely awesome. Thanks a lot.
thanks for the wonderful explanation
👍
Just love this guy !!!!! Great explanation!!
Best breakdown ever
Great explanation!
very nice video, plain and simple explanation ;D
Neat, I finally understand the basics of something I was always curious about. But now I'm thirsty.
Great explanation! Thanks!
I have been so clueless with cryptography and cannot find one braincell to focus on most reading material (darn you ADHD) but stumbled along here and it made complete sense, wow.
Huge fan of u sir....started encryption watching ur videos.....love ur accent
Splendid video
Very well explained!
very well explained. thx
I love Mike.
Dr. Mike is the best!
very well explained:- Thanks
amazing video. thank you
I have never seen anyone using such a weird way to explain something. But it's so cool
Wow that's really neat. Now I wanna try doing this.
One of these mathematical functions is: Alice sends g to the power of a (modulo prime number p). Bob sends g to the power of b (modulo p). The shared key is then: g to the power of a (modulo p) to the power of b (modulo p) which is the same as g to the power of b (modulo p) to the power of a (modulo p).