Secret Key Exchange (Diffie-Hellman) - Computerphile

Поділитися
Вставка
  • Опубліковано 26 лис 2024

КОМЕНТАРІ • 621

  • @OscarAlsing
    @OscarAlsing 7 років тому +1530

    Poor Alice and Bob. Always exposed. Always out there. Never left alone. ❤️

    • @kduhtdkzrt
      @kduhtdkzrt 7 років тому +5

      To answer the question about the aggressive tone in advance, I'm drunk, not austistic. No harm meant.

    • @ragnkja
      @ragnkja 7 років тому +43

      Eve is always stalking them...

    • @kduhtdkzrt
      @kduhtdkzrt 7 років тому +1

      Damnit. You're right.

    • @malporveresto
      @malporveresto 7 років тому +9

      #Pray4AliceAndBob

    • @TruthNerds
      @TruthNerds 5 років тому +3

      Meh. What if Alice and Bob are just attention whores?

  • @ScottPlude
    @ScottPlude Рік тому +54

    5 years later and this is still done a million times a minute out there. Very well explained, thank you!

    • @nishantdalvi9470
      @nishantdalvi9470 Рік тому

      Hey can you please clear my doubt, Actually I am kind of bit confused about the ordering of the events which takes place while TLS handshake does the digital certificate part which server shoots to the client to tell the client it's integrity and provide client it's public key happens before Diffie Helman key exchange or after it or eventually during the key exchange

    • @ScottPlude
      @ScottPlude Рік тому

      @@nishantdalvi9470 why are you responding to me after 5 months? FIVE MONTHS!?!?!?!

  • @denisr5250
    @denisr5250 4 роки тому +260

    The analogy with colors in this video is pure genius! Thank you guys, this was an amazing introduction to Diffie-Hellman!

  • @RobertMilesAI
    @RobertMilesAI 7 років тому +63

    Nice! This is a subject I should have covered immediately after the Public Key Cryptography video, since that one lays out the problem of exchanging keys that Diffie-Hellman solves. Great to see such a clear explanation, I doubt I'd have gone to the effort to get coloured liquids!

    • @proloycodes
      @proloycodes 2 роки тому

      robert miles with only 4 likes and no replies?
      also, first!

    • @AyushMo
      @AyushMo 2 роки тому +1

      Your public key crypto video was amazing! So was this one !

    • @Democracy_Manifest
      @Democracy_Manifest 2 роки тому +1

      Is it a 'clear' explanation though, or a coloured one?

  • @nO_d3N1AL
    @nO_d3N1AL 7 років тому +5

    What I like most about this channel is the ability of the presenters to explain things simply without mathematics. That is real teaching, not reciting formal proofs and equations

    • @WofWca
      @WofWca 5 років тому +3

      Reciting formal proofs is also teaching, just for more advanced.

  • @CGoody564
    @CGoody564 7 років тому +42

    Watched the defcon presentation from years ago given by the creator of the diffie-helman key exchange... It was absolutely fascinating. Dude is an innovator and pure genius. Seems like a nice guy as well

  • @frenchify7506
    @frenchify7506 6 років тому +64

    I really like this guy. Been watching and rewatching his lessons for like 3 hours.

  • @ennis_w
    @ennis_w Рік тому +2

    Everytime I feel confused by e2ee or key exchange, I will come back and see these videos. Really helps.

  • @dmatuzo
    @dmatuzo 7 років тому +74

    How curious, PBS Infinite Series have been talking about encription in the last few days. Now I've got double the encryption bonanza! This has been a good week.

    • @smob0
      @smob0 7 років тому +5

      I think the next video in the series will be about this key exchange.

    • @remuladgryta
      @remuladgryta 7 років тому +2

      Further, one of the Royal Institution's recent videos used the same color mixing analogy to demonstrate key exchange.

    • @curtmack
      @curtmack 7 років тому +7

      The color mixing analogy has been used to describe Diffie Hellman key exchange for a couple of decades at least.

    • @heyraylux
      @heyraylux 7 років тому

      curious indeed.....

  • @goshisanniichi
    @goshisanniichi 7 років тому +372

    Random squirting of fluids... exactly what I wanted to see this early in the morning...

    • @therealquade
      @therealquade 7 років тому +80

      the random squirting of fluids, by alice and bob, out in public.

    • @troyjones9344
      @troyjones9344 7 років тому +7

      ohhhhhh myyyyyyyy

    • @TheWolfboy180
      @TheWolfboy180 6 років тому +11

      Thomas Carrel It’s ok, no one minds if it’s done by Dr. Mike Pound

    • @xxwaldi
      @xxwaldi 4 роки тому +1

      @@therealquade yeah they should rather put it in the privates

    • @mrsmith1097
      @mrsmith1097 4 роки тому

      Is that Super Sonico?

  • @CristiNeagu
    @CristiNeagu 7 років тому +346

    1:04 First rule of cryptography: Unless your job is to create cryptographic algorithms, *never* implement your own cryptographic algorithms. You *will* screw it up.

    • @paterfamiliasgeminusiv4623
      @paterfamiliasgeminusiv4623 6 років тому +23

      Nice advice because it is such a tempting prospect.

    • @baatar
      @baatar 6 років тому +3

      Why would you even want to implement your own in the first place?

    • @0ijm3409fiwrekj
      @0ijm3409fiwrekj 6 років тому +55

      @@baatar for funnnnnn

    • @paulzapodeanu9407
      @paulzapodeanu9407 5 років тому +41

      In high school I thought I was being clever and did this. Took my deskmate about 1/2 an hour to crack it. Despite many evidence to the contrary, I still think I'm clever.

    • @sir_slimestone3797
      @sir_slimestone3797 5 років тому

      @@paulzapodeanu9407 Let me guess, simple substitution

  • @ironman85000
    @ironman85000 7 років тому +51

    I'm a simple man. I see a computerphile video with Mike Pound, I click like

  • @StuffOffYouStuff
    @StuffOffYouStuff 4 роки тому +8

    Fantasticly simple and easy to understand explanation, thank you for this.
    I'm studying for the Sec+, so basics atm. But i've been getting very confused by some of the terms around encryption. I'm going to ask a completely naive question. I understand to encrypt there are two components, 1) the algorithm, 2) the key. I've seen Diffie-Hellman described as a) a public key encryption algorithm, b) a key exchange protocol, c) a public-key encryption protocol.
    RSA is also described as an asymmetric public key encryption algorithm.
    Diffie-Hellman only generates keys, it does not provide an algorithm for use with those keys to then encrypt data
    RSA also generates keys, but can also encrypt/decrypt data
    So, my questions/assertions:
    1) Is there general misuse of the term "encryption algorithm" or just "encrpytion" as to what that encompasses? What should it encompass?
    2) My current feeling is, Encryption = 1) the algorithm, 2) the key (but not the key generation). Encryption algorithm = 1) literally just the algorithm, not the key. EErr, i don't know what term to use that would also encompass the key generation bit. So yeah confused still.
    2) The process of Diffie-Hellman key generation/exchange is still considered an encryption algorithm because it outputs data (the shared public) that makes deciphering the input to create it practically impossible?
    3) Diffie-Hellman is considered asymmetric because it generates a private/public key pair first?
    4) Diffie-Hellman can also be used to generate asymmetric keys ONLY?
    5) So the private symmetric keys Diffie-Hellman creates would form the symmetric keys for one of the symmetric encryption algorithms like RC4/AES?
    4) Looking back at the above then, the term encryption looks like it should actually include the discrete phase of key generation/distribution?

    • @tudoralexandruienulescu2214
      @tudoralexandruienulescu2214 9 місяців тому

      I am also studying Sec+
      From what I (think I) know, here are my answers:
      1 - There is no misuse. Encryption describes the goal of the action, the algorithm is what any algorithm is. A chain of operations for a specific goal. "Encryption algorithm" is fine.
      2 - You are overthinking I guess. "Encryption" is a term used to describe the topic of the discussion (for example). The term "Encryption algorithm" is getting into details and explaining what is, why it's needed, how it works (each step of the process aka the algorithm), etc.
      3 - Diffie-Hellman is assymetric because the Bob and Alice don't have all the same keys in their own pockets. Alice does not have the "b" key and Bob does not have the "a" key.
      4 - From what I learned thus far, yes. DH is the general example for generating asymmetric keys.
      5 - YES
      6 (or maybe 4) - I don't think so. encrypting something using a cypher is one thing, using a handshake or other ways to communicate between parties is another (just like DH).
      The DH is the actual method used to sharing of a secret key between two people who have not contacted each other before. It does not refer to the cyphers at all.

  • @kingbran923
    @kingbran923 2 роки тому +8

    Sir, you have sincerely helped me with my homework far more than my textbook ever could. Thank you so much for making these videos! :D

  • @user-qf6yt3id3w
    @user-qf6yt3id3w 7 років тому +3

    One thing I liked about Hellman was that not only did he invent a clever way to distribute private keys he also invented a decent tasting mayonnaise with an enormous shelf life.
    It has been forecast that a jar or mayonnaise will still be more or less OK even after being stored at refrigerator temperatures for five thousand years.
    If the Ancient Egyptians had known about Hellman's mayonnaise recipe and had stored a few sealed jars in the pyramids we'd still be able to open them and make a decent tuna mayo sandwich.
    Probably long after the nuclear apocalypse we'll be eating Hellman's Mayonnaise probably with roach meat. Or maybe the roaches will win and eat Human Mayo sandwiches.

  • @phoenix2464
    @phoenix2464 7 років тому +552

    yessss him again

  • @daviaquino3625
    @daviaquino3625 11 місяців тому

    I am writing Javascript decryption libraries for Apple Pay, Google Pay and Shopify and came across this video trying to learn more about the theory. Fantastic!

  • @dasjucktmichnicht6727
    @dasjucktmichnicht6727 2 роки тому

    i love the style of the whole channel! proofs nobody really needs power point or laborious anmations.

  • @Seansaighdeoir
    @Seansaighdeoir 2 місяці тому

    The use of the coloured liquids is genius and perfectly illustrates the problem of understanding that despite the visible colour combination it in no way exposes the constituent components.

  • @jme_a
    @jme_a 7 років тому +132

    Great video, but surely the simpler method with the colours would have been to have ramekins with clear water and then add X drops of food colouring for the stages?! 😂

    • @AloisMahdal
      @AloisMahdal 7 років тому +21

      Apparently Mt.Dew vending machine was closer than a food coloring vending machine.

    • @AlexRasengan1337
      @AlexRasengan1337 6 років тому

      But that wouldn't work, the private keys are different.

    • @agentjeyjey9757
      @agentjeyjey9757 4 роки тому

      @@AlexRasengan1337 Not for the private keys, for the public key (g)

  • @Laurabeck329
    @Laurabeck329 7 років тому +187

    This demonstration was a classic Parker square.

  • @kigtod
    @kigtod 7 років тому +6

    A very clear explanation as usual, but it would have been nice for Mike to briefly mention that a trio at GCHQ - Ellis, Cocks and Williamson - came up with the idea first.

  • @quintencabo
    @quintencabo 17 днів тому

    This is such a great video! Honestly the most intuative explination I have seen. Even kids can understand this.

  • @giorgibakradze8734
    @giorgibakradze8734 2 роки тому +1

    Thank you. This video really made the concept of Diffie-Hellman key exchange clear for me.

  • @LHyoutube
    @LHyoutube 2 роки тому +7

    I would have understood a lot more mathematics had it been presented so intuitively!

  • @Deiwulf
    @Deiwulf 11 місяців тому

    Finally explanation of the main part that's missing like literally everywhere else. Good lord.

  • @realprathap4732
    @realprathap4732 4 місяці тому

    I studied Diffie-Hellman in college from a textbook, but after a few years, I forgot it because I shifted to a different field. And now I am watching this UA-cam videos random, and my reaction, Wooow, yeah, that makes sense now!
    😯

  • @chrisgsauce
    @chrisgsauce 2 роки тому

    I've never seen a clearer explanation of DH. Thanks guy!

  • @Ahmad-iu8dq
    @Ahmad-iu8dq 21 день тому

    Beautifully simplified, and great video. But, I am more impressed of this piece of editing 1:50

  • @tapewormerbinkosti3141
    @tapewormerbinkosti3141 Рік тому

    One of these mathematical functions is: Alice sends g to the power of a (modulo prime number p). Bob sends g to the power of b (modulo p). The shared key is then: g to the power of a (modulo p) to the power of b (modulo p) which is the same as g to the power of b (modulo p) to the power of a (modulo p).

  • @aciddraconian13
    @aciddraconian13 3 роки тому +1

    I have been so clueless with cryptography and cannot find one braincell to focus on most reading material (darn you ADHD) but stumbled along here and it made complete sense, wow.

  • @davidoconnor9167
    @davidoconnor9167 3 роки тому +1

    Excellent, clear explanation, and the colours really showed the process visually, thanks guys!

  • @unvergebeneid
    @unvergebeneid 7 років тому +19

    2:53 that sound though! =)

  • @kanskejonasidag1
    @kanskejonasidag1 7 років тому +35

    Mike Pound?? Instant like! :D

  • @dubonbiton1706
    @dubonbiton1706 4 роки тому +1

    What an incredible video! Fantastic way to understand how VPN key exchange works!! Thumbs up

  • @khawajaazfarasif4865
    @khawajaazfarasif4865 2 роки тому +3

    Beautifully explained.

  • @MrMamfbr
    @MrMamfbr 2 роки тому +1

    4:55 that's the most important part in my opinion, and the video kinda dismiss it as granted. If the yellow is public, I can calculate the difference to it. How do you make sure it cannot be reversed? this is the magic

  • @Crypto_Wiz
    @Crypto_Wiz Рік тому

    Brilliant. My professor could not even come close to such a great explanation.

  • @sachinpandeyatd
    @sachinpandeyatd 2 роки тому

    tomarrow I have new sec and cryptography exam, and this topic has high possibility of coming, this is the best explanation I found,

  • @programmercouple
    @programmercouple 3 роки тому

    Finally understood the Diffy-Hellman concept. Thanks

  • @BackWithTheBoom
    @BackWithTheBoom 4 роки тому +1

    Mathematical squirtings, LOVE THIS GUY XD, i follow this guy almost for a couple years, such a MVP

  • @almiskea
    @almiskea 9 місяців тому

    Great explanation, I have been searching and no one has explained it as well
    Thank you

  • @rezaghochkhani
    @rezaghochkhani 4 роки тому

    This is the greatest video I have watched on encryption, ever!
    Thanks a lot.

  • @fridric2916
    @fridric2916 3 роки тому +1

    Dr. Mike Pound is just a great great teacher

  • @trollflix
    @trollflix 3 роки тому

    This guy is a genius. The explanation method is high level. You must be a teacher. 😍😋

  • @lumanaughty1025
    @lumanaughty1025 4 роки тому +6

    This might be the quarantine talking, but I’m starting to get a crush on this dude

    • @ruijiebai7531
      @ruijiebai7531 4 роки тому

      lol,i feel you ,i wish my lecturer could have his face then i wont skip any lecture

  • @wiltonlawrence882
    @wiltonlawrence882 5 років тому

    This is the best explanation of key exchange i came across, thanks for uploading this

  • @syeduzairahmed
    @syeduzairahmed 2 роки тому

    Very simplified approach of teaching. Great video

  • @999999GALLADE
    @999999GALLADE 7 років тому

    I was actually looking for a good Diffie Hellman video a couple of days ago - how convenient!

  • @DaMaZa1234
    @DaMaZa1234 4 роки тому +1

    I would like to Thank you Dr.Mike Pound for this information. it make me understand what is Diffie-Hellman is and i would like to take this video to be your reference in my work i have been put credit for u i really appreciate what u have done for us this video is just 8min it fun and i love this video Thank you

  • @edmundderek
    @edmundderek 4 роки тому

    so glad that your video made it in the bibliographie of my PFE

  • @WilliamsLovesToLearn
    @WilliamsLovesToLearn Рік тому +1

    what was the purpose of n in this video?

    • @danielf.7151
      @danielf.7151 Рік тому

      It is used in the same steps as g. that only matters for the actual math, the rough principle is the same

  • @zeikjt
    @zeikjt 7 років тому

    The water with food coloring mixing is a subtraction (so it'll converge on a dark muddy color), but the computer generated mixing is an addition (it'll converge on white). Aka, paint vs light.

  • @1992Razvy
    @1992Razvy 7 років тому

    Great video and execution. Always I need to know how something in practice works to know if I really need it in my project and then I need to know the math behind to reproduce myself. I just got here again after watching the math video, beause I have to go back to solidify the knowledge.

  • @brboLikus
    @brboLikus 7 років тому +39

    But what does 'n' do?

    • @Computerphile
      @Computerphile  7 років тому +19

      +Vjekoslav-Leonard Prčić watch the extra bits

    • @brboLikus
      @brboLikus 7 років тому +2

      Oh.. Thanks!

    • @coolguy-dw5jq
      @coolguy-dw5jq 7 років тому +1

      N is your message

    • @NateROCKS112
      @NateROCKS112 4 роки тому +4

      @@coolguy-dw5jq no, n is your modulus. See the mathematical video for what it does

    • @srt-fw8nh
      @srt-fw8nh 4 роки тому +9

      If water in either of those bowls overflows, n's job is to clean it up.

  • @willk7184
    @willk7184 3 роки тому +1

    Neat, I finally understand the basics of something I was always curious about. But now I'm thirsty.

  • @eiver
    @eiver 7 років тому +1

    I would now anticipate another video explaining the problems with pure Diffie Hellman, MITM attack and how PKI works :D. They should teach that in primary schools today.

  • @akshaykkapoor
    @akshaykkapoor 6 років тому

    Best explanation of DH with such a simple example ..great work ..keep it up

  • @ronaik
    @ronaik 3 роки тому

    Great explanation to understand DH key exchange. Also, as food for thought, wouldn't a highly skilled painter (hacker) know what colours add up to form that final colour? He does and that's where we add more complexities and algorithms to make DH what it is!

  • @wakomike29
    @wakomike29 4 роки тому

    This helps soooo much with my university studies! Dr. Pound, your the best.

  • @42svb58
    @42svb58 3 роки тому +1

    Best breakdown ever

  • @hashansachintha546
    @hashansachintha546 6 років тому

    Finally I have understand it with this simple example. Big thanks.

  • @tehn00bpwn3r
    @tehn00bpwn3r 4 роки тому +1

    In the colour analogy we can basically tell what the private key is as we know what g is. I’m guessing with the mathematical function the end result is randomised.

  • @MakerTim
    @MakerTim 7 років тому

    Thanx!
    I got NOW my college about EXACT this
    and your explanation is way more clear

  • @mikewillis1592
    @mikewillis1592 7 років тому +1

    Good explanation. Might be worth explaining why the ag bg process is irreversible.

  • @salagisellenain
    @salagisellenain 4 роки тому

    I have never seen anyone using such a weird way to explain something. But it's so cool

  • @Flqmmable
    @Flqmmable Рік тому

    For the part where you mix the colors and you say that its hard to know what colours were put together to make the final color, I kind of think of it as if the color were in hex color code format; by itself, you have the hex value but theres not may you could definately know what two colors were 'put' together to make it.

  • @sunburststratocaster
    @sunburststratocaster 6 років тому

    That's just straight up brilliant. How does someone even come up with this?

  • @Dashrendar2507
    @Dashrendar2507 6 років тому +4

    Hey, thanks! I was still having issues with this but your visual representation really helped :)

  • @matteoagius-darrigo7632
    @matteoagius-darrigo7632 Рік тому

    my favorite video on youtube!

  • @grrr1351
    @grrr1351 7 років тому +1

    I just love this guy! Keep him comin'.

  • @westa1979
    @westa1979 2 роки тому

    This video makes so much sense. And I get that it would be used to exchange, say, an AES key. But I thought symmetric keys were exchanged with asymmetric encryption, such as RSA. When would one chose DH instead? (Answer probably in another video)

  • @endsleighplace
    @endsleighplace 2 роки тому +1

    Why is there a drain in the office floor? Now I'm just confused...

  • @GamingKing-jo9py
    @GamingKing-jo9py 4 роки тому +2

    divide abgg by g and you get abg, or is that also hard?

  • @tejasanvekar7367
    @tejasanvekar7367 4 роки тому

    Huge fan of u sir....started encryption watching ur videos.....love ur accent

  • @MuffyMuffins
    @MuffyMuffins 3 роки тому

    A bit of confusion: couldn't an attacker hijack ag and send (ag, attacker_message) to bob? Then bob will compute abg and verify YES, this attacker's message is accurate WHICH IT ISN'T!
    Edit: Had my question answered in the third video to this Diffie-Hellman series. My misconception was that the mixed key abg was used to verify identity; it's actually used to encrypt/decrypt whatever message is received. Alice encrypts a message with abg and sends it out to Bob through the public. Bob receives the message and decrypts it with abg. All the public sees is encrypted nonsense. Aah the beautiful moment of understanding!

  • @laurelineparis5407
    @laurelineparis5407 Рік тому

    Nice, fun and accessible way to explain it :)
    Really enjoyed the analogical explanation
    Thanks for sharing 🙌

  • @florianfanderl6674
    @florianfanderl6674 3 роки тому

    Recently discovered this channel and I love it ❤

  • @louisascott2483
    @louisascott2483 10 місяців тому

    you are singlehandedly saving my degree

  • @Darieee
    @Darieee 6 років тому

    Just a word for mac users, doing powers and module on the mac Spotlight Search doesn't (or at least didn't used to) work
    I had a friend over and wanted to show him how sexy DH key exchanges were (yeah we're the coolest kids in town), and ... the spotlight app gave wrong results, so at the end of half an hour of explanations, the whole thing didn't work at all ... wolframalpha saved the day in the end though

  • @benjohnson6251
    @benjohnson6251 7 років тому +4

    Such a good video! Really clever concept, and the colour analogy is great! Cheers! :D

  • @hamzamunir8180
    @hamzamunir8180 4 роки тому

    this guys saved my semester.

  • @bakeshonai9598
    @bakeshonai9598 2 роки тому

    Awesome explanation! But, what is the use of n? Why doet it not have any color?

  • @malporveresto
    @malporveresto 7 років тому

    This video is a great example to give when convincing people that banning cryptography (which sounds all hackerish and dangerous to the general public) is actually trying to ban mathematics, which is a really bad idea.

  • @blackhole7818
    @blackhole7818 2 роки тому +1

    But what does the n do?

  • @evarakovska3302
    @evarakovska3302 3 роки тому

    Thanks for whole serie of videos! I found something useful for my students and it is great!

  • @druidelf3
    @druidelf3 6 років тому

    Amazing video. I could not have found a better teacher. Thank you so much.

  • @DonMayfield
    @DonMayfield 6 років тому +1

    Along with the color mixing, use actual number, but not real large numbers, would help a lot.

  • @lukas.oppermann
    @lukas.oppermann 3 роки тому

    Great explanation. Makes this concept really easy and straight forward to understand. 👍Thank you

  • @techieSudhakar
    @techieSudhakar 2 роки тому

    Thanks for the video. How does Alice and Bob choose same g value?

  • @DouroFusion
    @DouroFusion Рік тому

    amazing video, thanks Dr Mike Pound!

  • @SirCutRy
    @SirCutRy 7 років тому

    This is so simple yet so effective. Very interesting.

  • @danieltjones01
    @danieltjones01 7 років тому

    It won't matter which order you put the colours in. It's only the ratios that make the difference. You can't say that because you put the blue in first it made that one darker.

  • @atadjs
    @atadjs 2 роки тому

    Diffie-Hellman explanation was good, however please explain why do you have dot matrix printing paper in 2020

  • @pun15h3r.
    @pun15h3r. Рік тому +3

    very nice video, plain and simple explanation ;D

  • @asherorourke6199
    @asherorourke6199 2 роки тому

    what a terrific explanation. Terrific, and thank you!

  • @Jordan-hz1wr
    @Jordan-hz1wr 2 роки тому +2

    I came here because it's 2022 and I still don't know what Diffie-Hellman is, and at this point I'm too afraid to ask.

  • @kennyethwong5214
    @kennyethwong5214 3 роки тому

    your presentation is so clear and understandable, thanks a lot

  • @GordonjSmith1
    @GordonjSmith1 2 роки тому

    What a wonderful demonstration!

  • @tomasxfranco
    @tomasxfranco 7 років тому +3

    I love Mike.