Hey can you please clear my doubt, Actually I am kind of bit confused about the ordering of the events which takes place while TLS handshake does the digital certificate part which server shoots to the client to tell the client it's integrity and provide client it's public key happens before Diffie Helman key exchange or after it or eventually during the key exchange
Nice! This is a subject I should have covered immediately after the Public Key Cryptography video, since that one lays out the problem of exchanging keys that Diffie-Hellman solves. Great to see such a clear explanation, I doubt I'd have gone to the effort to get coloured liquids!
What I like most about this channel is the ability of the presenters to explain things simply without mathematics. That is real teaching, not reciting formal proofs and equations
Watched the defcon presentation from years ago given by the creator of the diffie-helman key exchange... It was absolutely fascinating. Dude is an innovator and pure genius. Seems like a nice guy as well
How curious, PBS Infinite Series have been talking about encription in the last few days. Now I've got double the encryption bonanza! This has been a good week.
1:04 First rule of cryptography: Unless your job is to create cryptographic algorithms, *never* implement your own cryptographic algorithms. You *will* screw it up.
In high school I thought I was being clever and did this. Took my deskmate about 1/2 an hour to crack it. Despite many evidence to the contrary, I still think I'm clever.
Fantasticly simple and easy to understand explanation, thank you for this. I'm studying for the Sec+, so basics atm. But i've been getting very confused by some of the terms around encryption. I'm going to ask a completely naive question. I understand to encrypt there are two components, 1) the algorithm, 2) the key. I've seen Diffie-Hellman described as a) a public key encryption algorithm, b) a key exchange protocol, c) a public-key encryption protocol. RSA is also described as an asymmetric public key encryption algorithm. Diffie-Hellman only generates keys, it does not provide an algorithm for use with those keys to then encrypt data RSA also generates keys, but can also encrypt/decrypt data So, my questions/assertions: 1) Is there general misuse of the term "encryption algorithm" or just "encrpytion" as to what that encompasses? What should it encompass? 2) My current feeling is, Encryption = 1) the algorithm, 2) the key (but not the key generation). Encryption algorithm = 1) literally just the algorithm, not the key. EErr, i don't know what term to use that would also encompass the key generation bit. So yeah confused still. 2) The process of Diffie-Hellman key generation/exchange is still considered an encryption algorithm because it outputs data (the shared public) that makes deciphering the input to create it practically impossible? 3) Diffie-Hellman is considered asymmetric because it generates a private/public key pair first? 4) Diffie-Hellman can also be used to generate asymmetric keys ONLY? 5) So the private symmetric keys Diffie-Hellman creates would form the symmetric keys for one of the symmetric encryption algorithms like RC4/AES? 4) Looking back at the above then, the term encryption looks like it should actually include the discrete phase of key generation/distribution?
I am also studying Sec+ From what I (think I) know, here are my answers: 1 - There is no misuse. Encryption describes the goal of the action, the algorithm is what any algorithm is. A chain of operations for a specific goal. "Encryption algorithm" is fine. 2 - You are overthinking I guess. "Encryption" is a term used to describe the topic of the discussion (for example). The term "Encryption algorithm" is getting into details and explaining what is, why it's needed, how it works (each step of the process aka the algorithm), etc. 3 - Diffie-Hellman is assymetric because the Bob and Alice don't have all the same keys in their own pockets. Alice does not have the "b" key and Bob does not have the "a" key. 4 - From what I learned thus far, yes. DH is the general example for generating asymmetric keys. 5 - YES 6 (or maybe 4) - I don't think so. encrypting something using a cypher is one thing, using a handshake or other ways to communicate between parties is another (just like DH). The DH is the actual method used to sharing of a secret key between two people who have not contacted each other before. It does not refer to the cyphers at all.
One thing I liked about Hellman was that not only did he invent a clever way to distribute private keys he also invented a decent tasting mayonnaise with an enormous shelf life. It has been forecast that a jar or mayonnaise will still be more or less OK even after being stored at refrigerator temperatures for five thousand years. If the Ancient Egyptians had known about Hellman's mayonnaise recipe and had stored a few sealed jars in the pyramids we'd still be able to open them and make a decent tuna mayo sandwich. Probably long after the nuclear apocalypse we'll be eating Hellman's Mayonnaise probably with roach meat. Or maybe the roaches will win and eat Human Mayo sandwiches.
I am writing Javascript decryption libraries for Apple Pay, Google Pay and Shopify and came across this video trying to learn more about the theory. Fantastic!
The use of the coloured liquids is genius and perfectly illustrates the problem of understanding that despite the visible colour combination it in no way exposes the constituent components.
Great video, but surely the simpler method with the colours would have been to have ramekins with clear water and then add X drops of food colouring for the stages?! 😂
A very clear explanation as usual, but it would have been nice for Mike to briefly mention that a trio at GCHQ - Ellis, Cocks and Williamson - came up with the idea first.
I studied Diffie-Hellman in college from a textbook, but after a few years, I forgot it because I shifted to a different field. And now I am watching this UA-cam videos random, and my reaction, Wooow, yeah, that makes sense now! 😯
One of these mathematical functions is: Alice sends g to the power of a (modulo prime number p). Bob sends g to the power of b (modulo p). The shared key is then: g to the power of a (modulo p) to the power of b (modulo p) which is the same as g to the power of b (modulo p) to the power of a (modulo p).
I have been so clueless with cryptography and cannot find one braincell to focus on most reading material (darn you ADHD) but stumbled along here and it made complete sense, wow.
4:55 that's the most important part in my opinion, and the video kinda dismiss it as granted. If the yellow is public, I can calculate the difference to it. How do you make sure it cannot be reversed? this is the magic
I would like to Thank you Dr.Mike Pound for this information. it make me understand what is Diffie-Hellman is and i would like to take this video to be your reference in my work i have been put credit for u i really appreciate what u have done for us this video is just 8min it fun and i love this video Thank you
The water with food coloring mixing is a subtraction (so it'll converge on a dark muddy color), but the computer generated mixing is an addition (it'll converge on white). Aka, paint vs light.
Great video and execution. Always I need to know how something in practice works to know if I really need it in my project and then I need to know the math behind to reproduce myself. I just got here again after watching the math video, beause I have to go back to solidify the knowledge.
I would now anticipate another video explaining the problems with pure Diffie Hellman, MITM attack and how PKI works :D. They should teach that in primary schools today.
Great explanation to understand DH key exchange. Also, as food for thought, wouldn't a highly skilled painter (hacker) know what colours add up to form that final colour? He does and that's where we add more complexities and algorithms to make DH what it is!
In the colour analogy we can basically tell what the private key is as we know what g is. I’m guessing with the mathematical function the end result is randomised.
For the part where you mix the colors and you say that its hard to know what colours were put together to make the final color, I kind of think of it as if the color were in hex color code format; by itself, you have the hex value but theres not may you could definately know what two colors were 'put' together to make it.
This video makes so much sense. And I get that it would be used to exchange, say, an AES key. But I thought symmetric keys were exchanged with asymmetric encryption, such as RSA. When would one chose DH instead? (Answer probably in another video)
A bit of confusion: couldn't an attacker hijack ag and send (ag, attacker_message) to bob? Then bob will compute abg and verify YES, this attacker's message is accurate WHICH IT ISN'T! Edit: Had my question answered in the third video to this Diffie-Hellman series. My misconception was that the mixed key abg was used to verify identity; it's actually used to encrypt/decrypt whatever message is received. Alice encrypts a message with abg and sends it out to Bob through the public. Bob receives the message and decrypts it with abg. All the public sees is encrypted nonsense. Aah the beautiful moment of understanding!
Just a word for mac users, doing powers and module on the mac Spotlight Search doesn't (or at least didn't used to) work I had a friend over and wanted to show him how sexy DH key exchanges were (yeah we're the coolest kids in town), and ... the spotlight app gave wrong results, so at the end of half an hour of explanations, the whole thing didn't work at all ... wolframalpha saved the day in the end though
This video is a great example to give when convincing people that banning cryptography (which sounds all hackerish and dangerous to the general public) is actually trying to ban mathematics, which is a really bad idea.
It won't matter which order you put the colours in. It's only the ratios that make the difference. You can't say that because you put the blue in first it made that one darker.
Poor Alice and Bob. Always exposed. Always out there. Never left alone. ❤️
To answer the question about the aggressive tone in advance, I'm drunk, not austistic. No harm meant.
Eve is always stalking them...
Damnit. You're right.
#Pray4AliceAndBob
Meh. What if Alice and Bob are just attention whores?
5 years later and this is still done a million times a minute out there. Very well explained, thank you!
Hey can you please clear my doubt, Actually I am kind of bit confused about the ordering of the events which takes place while TLS handshake does the digital certificate part which server shoots to the client to tell the client it's integrity and provide client it's public key happens before Diffie Helman key exchange or after it or eventually during the key exchange
@@nishantdalvi9470 why are you responding to me after 5 months? FIVE MONTHS!?!?!?!
The analogy with colors in this video is pure genius! Thank you guys, this was an amazing introduction to Diffie-Hellman!
I agree.
Diffie-Hellman's original paper will drive you up the wall.
Nice! This is a subject I should have covered immediately after the Public Key Cryptography video, since that one lays out the problem of exchanging keys that Diffie-Hellman solves. Great to see such a clear explanation, I doubt I'd have gone to the effort to get coloured liquids!
robert miles with only 4 likes and no replies?
also, first!
Your public key crypto video was amazing! So was this one !
Is it a 'clear' explanation though, or a coloured one?
What I like most about this channel is the ability of the presenters to explain things simply without mathematics. That is real teaching, not reciting formal proofs and equations
Reciting formal proofs is also teaching, just for more advanced.
Watched the defcon presentation from years ago given by the creator of the diffie-helman key exchange... It was absolutely fascinating. Dude is an innovator and pure genius. Seems like a nice guy as well
I really like this guy. Been watching and rewatching his lessons for like 3 hours.
Everytime I feel confused by e2ee or key exchange, I will come back and see these videos. Really helps.
How curious, PBS Infinite Series have been talking about encription in the last few days. Now I've got double the encryption bonanza! This has been a good week.
I think the next video in the series will be about this key exchange.
Further, one of the Royal Institution's recent videos used the same color mixing analogy to demonstrate key exchange.
The color mixing analogy has been used to describe Diffie Hellman key exchange for a couple of decades at least.
curious indeed.....
Random squirting of fluids... exactly what I wanted to see this early in the morning...
the random squirting of fluids, by alice and bob, out in public.
ohhhhhh myyyyyyyy
Thomas Carrel It’s ok, no one minds if it’s done by Dr. Mike Pound
@@therealquade yeah they should rather put it in the privates
Is that Super Sonico?
1:04 First rule of cryptography: Unless your job is to create cryptographic algorithms, *never* implement your own cryptographic algorithms. You *will* screw it up.
Nice advice because it is such a tempting prospect.
Why would you even want to implement your own in the first place?
@@baatar for funnnnnn
In high school I thought I was being clever and did this. Took my deskmate about 1/2 an hour to crack it. Despite many evidence to the contrary, I still think I'm clever.
@@paulzapodeanu9407 Let me guess, simple substitution
I'm a simple man. I see a computerphile video with Mike Pound, I click like
Fantasticly simple and easy to understand explanation, thank you for this.
I'm studying for the Sec+, so basics atm. But i've been getting very confused by some of the terms around encryption. I'm going to ask a completely naive question. I understand to encrypt there are two components, 1) the algorithm, 2) the key. I've seen Diffie-Hellman described as a) a public key encryption algorithm, b) a key exchange protocol, c) a public-key encryption protocol.
RSA is also described as an asymmetric public key encryption algorithm.
Diffie-Hellman only generates keys, it does not provide an algorithm for use with those keys to then encrypt data
RSA also generates keys, but can also encrypt/decrypt data
So, my questions/assertions:
1) Is there general misuse of the term "encryption algorithm" or just "encrpytion" as to what that encompasses? What should it encompass?
2) My current feeling is, Encryption = 1) the algorithm, 2) the key (but not the key generation). Encryption algorithm = 1) literally just the algorithm, not the key. EErr, i don't know what term to use that would also encompass the key generation bit. So yeah confused still.
2) The process of Diffie-Hellman key generation/exchange is still considered an encryption algorithm because it outputs data (the shared public) that makes deciphering the input to create it practically impossible?
3) Diffie-Hellman is considered asymmetric because it generates a private/public key pair first?
4) Diffie-Hellman can also be used to generate asymmetric keys ONLY?
5) So the private symmetric keys Diffie-Hellman creates would form the symmetric keys for one of the symmetric encryption algorithms like RC4/AES?
4) Looking back at the above then, the term encryption looks like it should actually include the discrete phase of key generation/distribution?
I am also studying Sec+
From what I (think I) know, here are my answers:
1 - There is no misuse. Encryption describes the goal of the action, the algorithm is what any algorithm is. A chain of operations for a specific goal. "Encryption algorithm" is fine.
2 - You are overthinking I guess. "Encryption" is a term used to describe the topic of the discussion (for example). The term "Encryption algorithm" is getting into details and explaining what is, why it's needed, how it works (each step of the process aka the algorithm), etc.
3 - Diffie-Hellman is assymetric because the Bob and Alice don't have all the same keys in their own pockets. Alice does not have the "b" key and Bob does not have the "a" key.
4 - From what I learned thus far, yes. DH is the general example for generating asymmetric keys.
5 - YES
6 (or maybe 4) - I don't think so. encrypting something using a cypher is one thing, using a handshake or other ways to communicate between parties is another (just like DH).
The DH is the actual method used to sharing of a secret key between two people who have not contacted each other before. It does not refer to the cyphers at all.
Sir, you have sincerely helped me with my homework far more than my textbook ever could. Thank you so much for making these videos! :D
One thing I liked about Hellman was that not only did he invent a clever way to distribute private keys he also invented a decent tasting mayonnaise with an enormous shelf life.
It has been forecast that a jar or mayonnaise will still be more or less OK even after being stored at refrigerator temperatures for five thousand years.
If the Ancient Egyptians had known about Hellman's mayonnaise recipe and had stored a few sealed jars in the pyramids we'd still be able to open them and make a decent tuna mayo sandwich.
Probably long after the nuclear apocalypse we'll be eating Hellman's Mayonnaise probably with roach meat. Or maybe the roaches will win and eat Human Mayo sandwiches.
yessss him again
maxwell,cpp sexy, right?
komma cpp ?!
in for a penny, in for (Dr.) Mike Pound
wtf?!!
Mike is the best. Except for maybe Parker.
I am writing Javascript decryption libraries for Apple Pay, Google Pay and Shopify and came across this video trying to learn more about the theory. Fantastic!
i love the style of the whole channel! proofs nobody really needs power point or laborious anmations.
The use of the coloured liquids is genius and perfectly illustrates the problem of understanding that despite the visible colour combination it in no way exposes the constituent components.
Great video, but surely the simpler method with the colours would have been to have ramekins with clear water and then add X drops of food colouring for the stages?! 😂
Apparently Mt.Dew vending machine was closer than a food coloring vending machine.
But that wouldn't work, the private keys are different.
@@AlexRasengan1337 Not for the private keys, for the public key (g)
This demonstration was a classic Parker square.
Matt Parker says "No."
A very clear explanation as usual, but it would have been nice for Mike to briefly mention that a trio at GCHQ - Ellis, Cocks and Williamson - came up with the idea first.
Shut up
This is such a great video! Honestly the most intuative explination I have seen. Even kids can understand this.
Thank you. This video really made the concept of Diffie-Hellman key exchange clear for me.
I would have understood a lot more mathematics had it been presented so intuitively!
Finally explanation of the main part that's missing like literally everywhere else. Good lord.
I studied Diffie-Hellman in college from a textbook, but after a few years, I forgot it because I shifted to a different field. And now I am watching this UA-cam videos random, and my reaction, Wooow, yeah, that makes sense now!
😯
I've never seen a clearer explanation of DH. Thanks guy!
Beautifully simplified, and great video. But, I am more impressed of this piece of editing 1:50 ♥
One of these mathematical functions is: Alice sends g to the power of a (modulo prime number p). Bob sends g to the power of b (modulo p). The shared key is then: g to the power of a (modulo p) to the power of b (modulo p) which is the same as g to the power of b (modulo p) to the power of a (modulo p).
I have been so clueless with cryptography and cannot find one braincell to focus on most reading material (darn you ADHD) but stumbled along here and it made complete sense, wow.
Excellent, clear explanation, and the colours really showed the process visually, thanks guys!
2:53 that sound though! =)
Mike Pound?? Instant like! :D
What an incredible video! Fantastic way to understand how VPN key exchange works!! Thumbs up
Beautifully explained.
4:55 that's the most important part in my opinion, and the video kinda dismiss it as granted. If the yellow is public, I can calculate the difference to it. How do you make sure it cannot be reversed? this is the magic
Brilliant. My professor could not even come close to such a great explanation.
tomarrow I have new sec and cryptography exam, and this topic has high possibility of coming, this is the best explanation I found,
Finally understood the Diffy-Hellman concept. Thanks
Mathematical squirtings, LOVE THIS GUY XD, i follow this guy almost for a couple years, such a MVP
Great explanation, I have been searching and no one has explained it as well
Thank you
This is the greatest video I have watched on encryption, ever!
Thanks a lot.
Dr. Mike Pound is just a great great teacher
This guy is a genius. The explanation method is high level. You must be a teacher. 😍😋
This might be the quarantine talking, but I’m starting to get a crush on this dude
lol,i feel you ,i wish my lecturer could have his face then i wont skip any lecture
This is the best explanation of key exchange i came across, thanks for uploading this
Very simplified approach of teaching. Great video
I was actually looking for a good Diffie Hellman video a couple of days ago - how convenient!
I would like to Thank you Dr.Mike Pound for this information. it make me understand what is Diffie-Hellman is and i would like to take this video to be your reference in my work i have been put credit for u i really appreciate what u have done for us this video is just 8min it fun and i love this video Thank you
so glad that your video made it in the bibliographie of my PFE
what was the purpose of n in this video?
It is used in the same steps as g. that only matters for the actual math, the rough principle is the same
The water with food coloring mixing is a subtraction (so it'll converge on a dark muddy color), but the computer generated mixing is an addition (it'll converge on white). Aka, paint vs light.
Great video and execution. Always I need to know how something in practice works to know if I really need it in my project and then I need to know the math behind to reproduce myself. I just got here again after watching the math video, beause I have to go back to solidify the knowledge.
But what does 'n' do?
+Vjekoslav-Leonard Prčić watch the extra bits
Oh.. Thanks!
N is your message
@@coolguy-dw5jq no, n is your modulus. See the mathematical video for what it does
If water in either of those bowls overflows, n's job is to clean it up.
Neat, I finally understand the basics of something I was always curious about. But now I'm thirsty.
I would now anticipate another video explaining the problems with pure Diffie Hellman, MITM attack and how PKI works :D. They should teach that in primary schools today.
Best explanation of DH with such a simple example ..great work ..keep it up
Great explanation to understand DH key exchange. Also, as food for thought, wouldn't a highly skilled painter (hacker) know what colours add up to form that final colour? He does and that's where we add more complexities and algorithms to make DH what it is!
This helps soooo much with my university studies! Dr. Pound, your the best.
Best breakdown ever
Finally I have understand it with this simple example. Big thanks.
In the colour analogy we can basically tell what the private key is as we know what g is. I’m guessing with the mathematical function the end result is randomised.
Thanx!
I got NOW my college about EXACT this
and your explanation is way more clear
Good explanation. Might be worth explaining why the ag bg process is irreversible.
I have never seen anyone using such a weird way to explain something. But it's so cool
For the part where you mix the colors and you say that its hard to know what colours were put together to make the final color, I kind of think of it as if the color were in hex color code format; by itself, you have the hex value but theres not may you could definately know what two colors were 'put' together to make it.
That's just straight up brilliant. How does someone even come up with this?
Just cos
Hey, thanks! I was still having issues with this but your visual representation really helped :)
my favorite video on youtube!
I just love this guy! Keep him comin'.
This video makes so much sense. And I get that it would be used to exchange, say, an AES key. But I thought symmetric keys were exchanged with asymmetric encryption, such as RSA. When would one chose DH instead? (Answer probably in another video)
Why is there a drain in the office floor? Now I'm just confused...
divide abgg by g and you get abg, or is that also hard?
Huge fan of u sir....started encryption watching ur videos.....love ur accent
A bit of confusion: couldn't an attacker hijack ag and send (ag, attacker_message) to bob? Then bob will compute abg and verify YES, this attacker's message is accurate WHICH IT ISN'T!
Edit: Had my question answered in the third video to this Diffie-Hellman series. My misconception was that the mixed key abg was used to verify identity; it's actually used to encrypt/decrypt whatever message is received. Alice encrypts a message with abg and sends it out to Bob through the public. Bob receives the message and decrypts it with abg. All the public sees is encrypted nonsense. Aah the beautiful moment of understanding!
Nice, fun and accessible way to explain it :)
Really enjoyed the analogical explanation
Thanks for sharing 🙌
Recently discovered this channel and I love it ❤
you are singlehandedly saving my degree
Just a word for mac users, doing powers and module on the mac Spotlight Search doesn't (or at least didn't used to) work
I had a friend over and wanted to show him how sexy DH key exchanges were (yeah we're the coolest kids in town), and ... the spotlight app gave wrong results, so at the end of half an hour of explanations, the whole thing didn't work at all ... wolframalpha saved the day in the end though
Such a good video! Really clever concept, and the colour analogy is great! Cheers! :D
this guys saved my semester.
Awesome explanation! But, what is the use of n? Why doet it not have any color?
This video is a great example to give when convincing people that banning cryptography (which sounds all hackerish and dangerous to the general public) is actually trying to ban mathematics, which is a really bad idea.
But what does the n do?
Thanks for whole serie of videos! I found something useful for my students and it is great!
Amazing video. I could not have found a better teacher. Thank you so much.
Along with the color mixing, use actual number, but not real large numbers, would help a lot.
Great explanation. Makes this concept really easy and straight forward to understand. 👍Thank you
Thanks for the video. How does Alice and Bob choose same g value?
amazing video, thanks Dr Mike Pound!
This is so simple yet so effective. Very interesting.
It won't matter which order you put the colours in. It's only the ratios that make the difference. You can't say that because you put the blue in first it made that one darker.
Diffie-Hellman explanation was good, however please explain why do you have dot matrix printing paper in 2020
very nice video, plain and simple explanation ;D
what a terrific explanation. Terrific, and thank you!
I came here because it's 2022 and I still don't know what Diffie-Hellman is, and at this point I'm too afraid to ask.
your presentation is so clear and understandable, thanks a lot
What a wonderful demonstration!
I love Mike.