Public Key Cryptography - Computerphile

  Переглядів 873,943

Computerphile

Computerphile

9 років тому

Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography
note1: Yes, it should have been 'Obi Wan' not 'Obi One' :)
note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use.
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: bit.ly/bradychannels

КОМЕНТАРІ: 1 200
@tobortine
@tobortine 9 років тому
You didn't mention Alice or Bob.
9 років тому
oh boy, *that* will upset cryptographers
@666Tomato666
@666Tomato666 9 років тому
Don't you think that Eve is misunderstood? She's there, working hard to show that your protocols are secure and we call her the bad person. Imaginary actors in cryptographic proofs have feelings too!
@Narutokunie5
@Narutokunie5 9 років тому
sent me on a laughing fit. Sorry for my shallow humor tolerance, but you sir, deserve a like. And a pat on the back. XD
@jmark1062
@jmark1062 9 років тому
Not to mention Eve, the Evil do-er.
@dante2k8
@dante2k8 9 років тому
Captain, please explain what is going on here.
@another-person-on-youtube
@another-person-on-youtube 8 років тому
Jeez, I wish this is how it was explained to me the first time. This was a brilliant video. And now I appreciate the brilliance of public key encryption. The idea of encrypting something twice, first with the other person's public key so only they can decrypt it, and then sign it with your own private key, so they know that you were legitimately the person sending it, is GENIUS. Thank you very, very much.
@ajayphilipsabu
@ajayphilipsabu 8 років тому
+Samuel Hobbs first encrypt using private key and then using public key. the same happens at decryption.
@lambertbrother1628
@lambertbrother1628 6 років тому
Wouldn't encrypting it with the public key as well mean that only the sender could decrypt it (using the private key)?
@jimswenson6131
@jimswenson6131 6 років тому
They don't encrypt with their public key--they encrypt with the public key of the recipient. That's the point you missed.
@hkr667
@hkr667 6 років тому
At this time 171 likes means 171 people had the same, including me! It always annoyed me that as an IT person I didn't understand this. But nobody ever explains the basics, they always make the explanation confusingly complex. Now I know!
@user-ol2gx6of4g
@user-ol2gx6of4g 6 років тому
Not really that brilliant. The whole idea relies on the belief that there exist one-way functions, i.e., it's very hard to calculate the inverse of such class of functions. Anyone can come up with the *idea* . It is the implementation that is hard as advanced mathematics is involved.
@BhargaviCN
@BhargaviCN 4 роки тому
Cryptographers are upset because you didn't mention "Alice or Bob or THE EVE!"
@ha-bf2xh
@ha-bf2xh 3 роки тому
Alice----------> Trudy ------------> Bob
@ltnlabs
@ltnlabs 3 роки тому
I am the Bob they speak of in the examples
@rajivramroop6848
@rajivramroop6848 9 років тому
You explained this better in 6 mins than my lecturer did in a whole semester. Thank you.
@suchitragulb184
@suchitragulb184 2 роки тому
Right. Professors waste time of time using outdated education methods.
@afr0z
@afr0z Рік тому
same here bro!
@tvtvvtvt8017
@tvtvvtvt8017 Рік тому
Phoenix College too?
@tbluebird1421
@tbluebird1421 Рік тому
I've did a 4 year university course on computer networking and cyber security, and I understand private/public key better now than I did after that 4 years 😂
@captplatonic
@captplatonic 4 роки тому
This was the first explanation in about 5 on public key cryptography where I had my lightbulb moment - thank you!
@harshrajjadeja7087
@harshrajjadeja7087 3 роки тому
never ever understood public private key encryption decryption in this way, coming from a non-coding background the epiphany I had at 5:00 was just amazing, great explanation!!
@TheMR-777
@TheMR-777 9 місяців тому
Same here man. I really paused the video there - locked the system - went for a walk - for 10min, to digest what I just heard. (It also happened some days ago, when I first heard about encryption with private key)
@krazyq00
@krazyq00 4 роки тому
It's crazy how after class and so many videos, only one of them finally makes sense (this one) and now when I start watching the other stuff it starts making sense. Every time I search for stuff now I hope I find a video from you guys with an explanation.
@RohitGupta-ms5jt
@RohitGupta-ms5jt 8 років тому
You made my day.I am a Commerce student who had no idea about Public key and I needed to understand it because of IT subject in my course curriculum. I was totally frustrated and was not able to understand the concept from my book however by watching you video I got a basic idea about Public Key which is more than sufficient for my purpose.Thanks for the video.Love from India.
@Noxbite
@Noxbite 8 років тому
I love listening to that guy. His use of examples and explaining is out of this world. Please more videos! Whatever it might be about
@afr0z
@afr0z Рік тому
yes, he makes videos about ai and ml on his channel
@deekshithathota5204
@deekshithathota5204 Рік тому
@@afr0z what's his channel..?
@Jacksaur_
@Jacksaur_ 2 роки тому
This was the first explanation I've seen that actually explained there was nothing special between the keys other than which one you personally made public or private. I never understood why anything done with your public key could only ever be undone with your private, but yet you could also sign emails with your private key to have them confirmed through the public without risking the private at all. Brilliant video.
@ankontini
@ankontini 7 років тому
Thank you! Finally a video that explains what public keys are!!
@foxdash
@foxdash 9 років тому
Wow this guy is really good on camera, would be nice to see him in more videos.
@magikarpusedsplash8881
@magikarpusedsplash8881 7 років тому
I was trying to get started on cryptography in my spare time and tried to understand the private/public key thing, but now it makes complete sense. Now I have to learn a bazillion more things and probably go to uni for computer science.
@arunkumaragasar1350
@arunkumaragasar1350 2 роки тому
This is a great explanation. I never understood the concept and it bothered me very much being an IT person. This is an exciting concept and I now understand the value of it.
@jordansean18
@jordansean18 4 роки тому
I must have heard dozens of different explanations of public key encryption, but this one is the first one that just makes sense for the big picture of it all!
@veloxsouth
@veloxsouth 9 років тому
This is the clearest explanation I've ever seen for asymmetric cryptography.
@ag4ve
@ag4ve 8 років тому
I think a numberphile on Fermat's little theorem and how the special primes are used to generate key pairs would be cool
@shayansec
@shayansec 2 роки тому
Really he has oversimplified it...no one can simplify it more than him in just 6 minutes. Great man!!
@puddingunderground
@puddingunderground 9 років тому
I would really enjoy seeing more videos like this. Privacy is in the spotlight right now and I can't explain things simply, so being able to link people to these videos is awesome.
@bhaaratsharma6023
@bhaaratsharma6023 3 роки тому
I just waste my time watching other channels for this kind of stuff when I know in the end this is where the real juice is. Impeccable.
@Yizak
@Yizak 9 років тому
Brilliant! I wish I'd picked this knowledge up earlier.
@raminmdn
@raminmdn 8 років тому
Thanks for the simple and thorough explanation, more videos from this guy please
@SuperWolfkin
@SuperWolfkin 9 років тому
this right here was my favorite part of the free to download book "little brother" it also does a great explanation of public/private keys
@brandonfrancey5592
@brandonfrancey5592 9 років тому
I'd like to see some simple algorithms on how exactly information is encrypted and decrypted with the keys.
@DarksteelPowerchord
@DarksteelPowerchord 9 років тому
lmgtfy.com/?q=simple+encryption+algorithm You're welcome
@kinositajona
@kinositajona 9 років тому
It's not exactly simple... but I am simplifying it and leaving out some of the more difficult parts. Encrypt R = kG mod p S = Px where P(x,y) = kQ mod p KDF(S) = ke || km Use ke in an asymmetric encryption scheme with the message, most of which xor information against a hash. This gives the encrypted message c. Run km and c through a message authentication code to get d. Encrypted message = R || c || d Decrypt S = Px where P(x,y) = qR mod p (because your private key times their random public key is equivalent to their random private key times your public key) Run S through KDF again to (hopefully) get the same ke || km. run c and km through the MAC and if it equals d then you can decrypt, if it doesn't, something went wrong. Run the inverse of the encryption scheme with ke and c to get the decrypted message m.
@frxstrem
@frxstrem 9 років тому
This is a very simple algorithm (that's somewhat similar to RSA, but way less secure): Pick any prime N. Then pick any two numbers P and Q such that when you multiply them together and subtract 1, the result will be divisible by N. For instance, we can let N = 19, P = 7, Q = 11. We see that this works because 7 × 11 - 1 = 76 = 4 × 19. Now to encrypt a message with the key P, we shall multiply it by P, divide by N and let the remainder be our encrypted message. For instance, if we want to encrypt the message M = 5, we would multiply 7 × 5 to get 35. Then we would divide by 19, which gives us 1 and 16 as the remainder. Therefore, our encrypted message is 16. To decrypt the message, we do the same thing again, only this time using our key Q. We multiply 16 by 11 to get 176, then divide this by 19, giving 9 and 5 as the remainder. Therefore, 5 is our decrypted result. This is our original message! Therefore, we have decrypted our message successfully. As the video mentioned, a message encrypted with P can only be decrypted with Q and vice versa. My example algorithm is pretty bad, though, as it is pretty easy to find Q given P and N, but other (more advanced) algorithms are much harder to crack, because you have to test every possible Q less than N (which is really hard if N is, say, 100 digits long).
@aizhol
@aizhol 9 років тому
watch?v=M7kEpw1tn50 RSA from Numberphile
@niilemak
@niilemak 9 років тому
A simple one is the cesar encryption that only consist on moving the letters around the alphabet by a certain key which is a number from 1 to 25. You get ABC transformed into a BCD with a key of 1 or the other way around i don't remember.
@johndunn8154
@johndunn8154 7 років тому
This video was soooooooo clear and helpful. That was FANTASTIC!
@RodneyDavis
@RodneyDavis Рік тому
Lol. You’re smarter than me for sure. Even this I couldn’t make sense from.
@ManeelxAkosAdor
@ManeelxAkosAdor Рік тому
@@RodneyDavis That's ok man. For me it was confusing at the beginning because I couldn't make my head around that a function can be capable of encrypting and decrypting with two different keys. that's thanks to RSA algorithm which it is used behind the scenes, which can make the magic. Just try another public-private key encryption video, it's gonna click eventually. Any doubts you have I can help, just bring them here.
@MiscDotGeek
@MiscDotGeek 2 роки тому
Where has this video been all my life. Thank you. Excellent explanation, oversimplifications and all. Regarding that, sometimes it takes oversimplifying something so that you can see the elegance of it more clearly. The details will come later.
@typo148
@typo148 9 років тому
Well done! You obviously understand public key stuff well. It is so obvious when people who don't understand it try to explain it, they always mess it up.
@TechXMarine
@TechXMarine 9 років тому
This guy is great Perfectly explained
@Wizardofgosz
@Wizardofgosz 8 років тому
Believe it or not, the movie SNEAKERS got me interested in the idea of crypto, and right around that time, Phil Zimmerman was becoming famous for having published pgp2.62 to the internet. That was illegal in the US at the time, which led to a lot of trouble for him (Google his name and ITAR and you will find it), and I have been encrypting my email to many friends, since then. Now I run GPG under linux, which is essentially an open source, more sophisticated implementation of PGP, and I highly recommend it. I also had the good fortune of meeting Phil at a lecture about 20 years ago and he signed my PGP users guide. I've also read most everything that Bruce Schneier has written on the subject, and subscribe to his newsletter. Something else I recommend. It's very entertaining and informative.
@rizwanudoy8280
@rizwanudoy8280 3 роки тому
Awesome! Very simply yet efficiently explained. So only asymmetric encryption (encrypting with other peer's public key) only ensures encryption, not authentication. But encryption with both own private key and other person's public key gives both authentication and encryption at the same time.
@liresto
@liresto 6 років тому
Studying for Security Fundamentals for Cisco's CyberOps and this video explained things very clearly. Thank you!
@dedwarmo
@dedwarmo 7 років тому
Let me see if I understand. The message is encrypted using the sender's private key and recipient's public key. The message is decrypted with the recipient's private key and sender's public key.
@CodeCommand
@CodeCommand 7 років тому
Yes.
@lixiaochen6
@lixiaochen6 7 років тому
Only if you want to "sign" your message.
@dedwarmo
@dedwarmo 7 років тому
Xiaochen Li If you encrypt a message without "signing" it. Which keys are needed to encrypt and decrypt the message?
@talhatariqyuluqatdis
@talhatariqyuluqatdis 7 років тому
XD
@goulougoulou1666
@goulougoulou1666 7 років тому
If you don't want to "sign" your message, you encrypt the message with the recipient's public key and he will decrypt it with his private key.
@sth128
@sth128 9 років тому
Yes, pan down and show us his private key...
@chrissavage4289
@chrissavage4289 5 років тому
Fantastic video -- I've not seen this explained so clearly anywhere.
@omegapointsingularity6504
@omegapointsingularity6504 9 років тому
Computerphile is love. Thank you! Im so happy because the thing in itself is awesome and the explanation was very awesome.
@isgdre
@isgdre 9 років тому
Does anyone else thing that this guy would do great at playing a young Wolverine?
@am-hm4oz
@am-hm4oz 3 роки тому
omg yessss
@eotikurac
@eotikurac 9 років тому
the message always says hello
@SocratesAth
@SocratesAth 9 років тому
One wonders why they even bother to encrypt it, everyone already knows what it says.
@tommysandal6930
@tommysandal6930 9 років тому
***** Possibly the amount of likes on there comment
@SocratesAth
@SocratesAth 9 років тому
***** Tommy Sandal Actually, a sense of humor is usually considered a sign of intelligence.
@Darkness93
@Darkness93 7 років тому
That's quite funny
@stefanoc49
@stefanoc49 4 роки тому
And probably the sender is Alice
@sameershahiddd
@sameershahiddd Рік тому
Well explained in a simple, easy to grasp format!
@CoLinearProductions
@CoLinearProductions 8 років тому
Hey! great video, a question though. If you already have the keys distributed, is there any other reason to use asymmetric keys over symmetric keys?
@HAWX4
@HAWX4 6 років тому
"look down in my trousers, where there's a lot of commenters" xD
@Lorryslorryss
@Lorryslorryss 9 років тому
Yes, good explanation. But what are Alice, Bob and Eve doing while this is going on?
@magno5157
@magno5157 5 років тому
Hunting down Carol.
@headcheese3
@headcheese3 7 років тому
Thank you for putting up this video. I was trying to explain to my roommate how PGP worked and I realized I had no idea how. So, I watched this video and I knew (at the basic level sure, but it's more than I knew before).
@gabrimatic
@gabrimatic 2 роки тому
It was the most simple and valuable explained video that I ever watched! Thanks man
@19kevva93
@19kevva93 9 років тому
You should do a follow up on DiffieHellman Key exchange. It's really simple to implement!
@KaiserSpherical
@KaiserSpherical 9 років тому
I second this!
@Palastanga
@Palastanga 9 років тому
They did it a while back!
@alafortinfoni
@alafortinfoni 9 років тому
does gnupg does this (DiffieHellman Key exchange)?
@thadeuluz
@thadeuluz 7 років тому
what I would really like to understand is how they get made and how the algorithm to encrypt/decrypt works.. it makes no sense to me that you can encrypt something with a public key and other people with de public key cannot decode it..
@MrRichiban
@MrRichiban 7 років тому
It's called a trapdoor function in mathematics, that is: a function that's relatively easy to do one way but very difficult (read: practically impossible) to to the reverse. The closest everyday situation I can come up with is to imagine a person with a pen and piece of paper. Ask that person to square the number 213. Given some time and providing they know long multiplication they could probably work that out. However, if you ask them to square root the number 45369 they'd probably give up and go home. This is how public/private keys work--given one of the keys in the pair you can encrypt, but the maths is too hard to decrypt without the other key. If you're interested the keys are basically very large prime numbers, and you raise your message (represented as a number) to the power of one prime and then mod the result (taking the remainder after division) by the other prime.
@marco4568
@marco4568 7 років тому
boss!
@sebastjansslavitis3898
@sebastjansslavitis3898 7 років тому
Simple example. You have two dictionaries, English - Chinese and Chinese - English. You can encrypt text with first book quite easy, but its very hard to decrypt something with same book, it just don't do the trick, for that you need second dictionary.
@kuradag
@kuradag 6 років тому
So what keeps someone from intercepting the public key so they can read the message? was it sent metaphorically separately?
@chloegantzel
@chloegantzel 6 років тому
A public key was never sent. Both public keys are available to anyone who looks for them. However, the private keys are never ever shared. So you encrypt your message with the OTHER person's public key, because that encryption can only be undone with the OTHER person's private key, which they already have and you don't need.
@Rutger5498
@Rutger5498 Рік тому
Thank you for this explanation. Really, really helpful, especially because the digital signing part is also clearly explained.
@doveshouse
@doveshouse 7 місяців тому
I understand that the more complicated explanation for this and yet fully appreciate your simplified description. Even when they full description of how it works is provided in chinhoyi start with your simplified description and then move on from there. Perfect perfect. Nice work!
@sheiladikshit5110
@sheiladikshit5110 11 місяців тому
absolutely brilliant presentation. a clear, concise overview of the technology anyone can understand, in just five minutes.
@Kantenkugel
@Kantenkugel 9 років тому
I didnt know that the system is bidirectional / you can encrypt with private key and decrypt with public... thought it was only the other way around
@totoritko
@totoritko 9 років тому
When used in reverse, it's called signing. When you hear cryptographers talk about digital signatures, this is what they're talking about. Just to clarify here, by "reverse" I don't mean public key being used to DEcrypt and the private to ENcrypt. They are always used for the same operation (public key for ENcryption, private key for DEcryption). What happens in reverse is the sequence of operations. When encipherment & concealment is desired, the plaintext is encrypted using the RECIPIENT'S public key, transmitted & decrypted by the private key. When signing is desired, the plaintext is DEcrypted using the SENDER'S private key, this is then transmitted & ENcrypted using the sender's public key to yield the original plain text. This works because public-key cryptographic algorithms have this property: D(E(plaintext) = E(D(plaintext)) = plaintext
@Kantenkugel
@Kantenkugel 9 років тому
totoritko ty... is this possible for all keypairs? or do they have to be generated specially to be able to do signing too? I have used public key encryption already but didnt know i could use them in reverse for signing
@kinositajona
@kinositajona 9 років тому
Kantenkugel All private keys can sign and decrypt and all public keys can verify and encrypt. Nothing special is required.
@denisdionigidelgrande7961
@denisdionigidelgrande7961 9 років тому
Kantenkugel keypairs have to be generated with an algorithm which involves prime numbers (big prime numbers, that's why there are super computers trying to calculate all the prime numbers)
@FrancescoBurato
@FrancescoBurato 9 років тому
Denis Dionigi Del Grande just for the record: (1) not every asymmetric cryptography system requires prime numbers (look for elliptic curve cryptoghraphy en.wikipedia.org/wiki/Elliptic_curve_cryptography) and (2) since prime numbers are infinite you can't compute *all* prime numbers (I know what you mean but it is just a clarification to be preciser).
@YumekuiNeru
@YumekuiNeru 9 років тому
I do not understand how you solved the problem of agreeing on the key to encrypt with at all, I feel you just added one more step. How do you get the public key from a person while knowing the public key has not been modified? Are there public keys all the way down?
@Niki_0001
@Niki_0001 9 років тому
I may be completely wrong or misundertood your question, but let's see: instead of having to meet in secrecy, you can give your public key to anyone and everyone to see and encrypt messages with, but only you (or anyone you've given the private key to) can decrypt the messages. This way two spies could simply share their public keys so that the other spy can encrypt the message using it, but only the spy with the private key can decrypt it.
@YumekuiNeru
@YumekuiNeru 9 років тому
how do they share their public keys?
@Niki_0001
@Niki_0001 9 років тому
YumekuiNeru Right, I guess that would be troublematic... If the spies were modern people, they could simply publish the key online anywhere (like a pastebin file) and the other person could simply copy it from there. It doesn't matter if other people copy the key because they can only use it to encrypt messages, not decrypt them. I don't think I've properly understood this myself, so someone please correct me if I'm wrong.
@KaiserSpherical
@KaiserSpherical 9 років тому
Rented Mule No, you've got it right. Since it doesn't matter who has the public key, you could simply e-mail me and I could send it to you. Or post it on a tiny url page. Or post it to a mailbox. Or on Facebook. Once you have the public key, you can use it to encrypt "shared secret" keys that're used for encrypting messages to each other. Which is part of the simplification here: Public Key or Asymmetric Cryptography is just one part of a grandiose system, designed to allow you privacy and safe passage in the tumultuous internet waters.
@YumekuiNeru
@YumekuiNeru 9 років тому
Rented Mule yes but how do you as a visitor of a pastebin file know that the person who published that key is the person you think, or how do you know that key is the same as the one the person published?
@liekna
@liekna 9 років тому
very nice and simple way to explain PKI. you dont need to go more into detail then you did! good work :)
@petersuvara
@petersuvara 5 років тому
I know cryptography, your explanation is wonderful. No need to go into technical details of the algorithms involved. Well done!!
@yungholocaust6990
@yungholocaust6990 9 років тому
>obi one
@U014B
@U014B 8 років тому
I know, right! His name is Obee-Juan!
@shazbots
@shazbots 9 років тому
So can any cryptographers tell me what was "overly simplified?" Can somebody direct me to a source, so I can learn more about this?
@blenderpanzi
@blenderpanzi 9 років тому
Nosey Nick And even that is a simplification when it comes to things like perfect forward secrecy. Because if someone records the communication you described and only later gets hold of the private key of one of the communication partner they can decrypt everything. If I understand it correctly this is fixed by another step where both communication partners generate yet another temporary asym. key pair, exchange the temp. public keys encrypted with the other public keys and use the temp. keys to exchange the symm. key and then immediately throw away the temp. asym. keys. Or something like that. Then the sym. key can never again be decrypted, even if the private key of both communication partners get leaked.
@codydv7388
@codydv7388 5 років тому
This is the most well constructed explanation I've seen yet.
@fluffykickflipper
@fluffykickflipper 3 роки тому
Thank you! This was by far the most helpful for me to understand this concept!
@am-hm4oz
@am-hm4oz 3 роки тому
i know riight
@ChosenOne41
@ChosenOne41 8 років тому
What I don't get is why you can't figure out someone's private key from their public key. If one undoes what the other does doesn't that mean they are opposites of each other? Can't you just sort of reverse the public key and you would have the private key? I mean, obviously not because then this whole system wouldn't work but then why doesn't it work? A bigger question would be what exactly is the contents of these keys, is it just a large jumble of numbers or something?
@mibblemerp
@mibblemerp 8 років тому
+Chosen One 41 A key looks something like this... -----BEGIN CERTIFICATE----- MIIDBzCCAe+gAwIBAgIJAL6xD+LpwcWhMA0GCSqGSIb3DQEBBQUAMBoxGDAWBgNV BAMMD3d3dy5leGFtcGxlLmNvbTAeFw0xNjAxMDYxNDIwNDZaFw0yNjAxMDMxNDIw NDZaMBoxGDAWBgNVBAMMD3d3dy5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAM1YVdJj10e/4pkXo9I029HrxWTR6TDN9sc82KkxggeX 5e33bSTwtxI6f7e0dO07bjPvrN/tTebdKRTK83wu62mdjuajVWgWecUp0AtP7GYs 9WfLfecWRlydKpaUh2gyVL7oM/jnMKFi49YeRxpYPwqX+D/C5QB4I8yAiwolcosN 9amL6E7JT3vIR8Gne5xit0lpaW86uw92dyB1WHkFUQkj3ny5MEhXYOIc4anlgDWC vL2LhpwCpgLagKE+3/wTAWjLgFAB75xKqfYbb3FZSUzz6xUBhQ1XsgoBTbcGhvc8 UeQ0Ok6w1XDm41DxEUvB3FqJt76W0YW4cSob2X+Rf+MCAwEAAaNQME4wHQYDVR0O BBYEFG8cYrrtLs8Sc4RJgc8hsxiwUoSAMB8GA1UdIwQYMBaAFG8cYrrtLs8Sc4RJ gc8hsxiwUoSAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAHxX9Q1b WxLC10ZrIAkArULUwOmjTRfUZ+Ty+6hw6SJ+2W39iDRpacN+IguNos/f1opYfz6b lTkIH7OMyuTGQ0HeoUO7h37jxE9qNABtZAVWz93WZvqYtC0PH1cXVRhIlQB5W7fd +89gBI1ptFmhGS2SOlOt4pa4G4XSMqsYoDk69pvg5v6egs1kBcmdC1MvLAb9SFBz /OEWSlaIA1dpJxmV4VKQPKMcNAouAbgWIareCOQcGjEnS5o5lp/U3HFhqigWGnGB NsLMrZeGdnEwXlx6uoYIU9W5Z/F+ji8RkY8jOugvYybQth35B3PuTluNUYMviEJE b+fCWkRdkh7CBm0= -----END CERTIFICATE-----
@TylerDehan
@TylerDehan 8 років тому
You can, but that's like having "f(x) = y" and deriving x from y. If you have x, you just run the function to get y. But if you have y, you'll have to go through all possible x values to see which one ends as y. If you take the example of 1024-bit keys, that's 2^1024 possible values to check. It would just take too long to go through them all.
@kriptonis
@kriptonis 8 років тому
+Chosen One 41 the quick answer is: Yes it is possible but the time it would take to guess the very large random prime numbers used to generate the keys is so big, it would take millions of years to guess them. So this technique works because current computer processing is limited. And even if it didn't take 1million years, even if it only took 10 years to decrypt a communication based on public/private key. Would it be useful to find that facebook password or credit card number used today in 10 years? For all communication that is not "government secret" level this would mean you can't do anything useful with the info you get.
@anthonydevellis6708
@anthonydevellis6708 8 років тому
+Chosen One 41 the last layer you encrypted is the first layer you need to decrypt. Let's say there's p1, p2, s1, s2, (public key 1, public key 2, secret key 1, secret key 2). If you encrypt with p1, it must be decrypted by s1, and vice versa. Same for the second pair. So if you encrypt with s1 then p2, the other person first needs to decrypt the text using s2, then must decrypt the ciphertext generated by your private key, s1. The order matters. Rigorously (yes, I know I am using a key to mean cipher function but this is simpler to explain): Given a message M, the intermediate ciphertext becomes C = s1(M). The cipher text that the other person actually received is encrypted with their public key, p2: C' = p2(C). This means that C' = p2(s1(M) ) (by substitution). To decrypt, we apply the inverse functions in reverse order, M = p1( s2( p2( s1( M ) ) ) ), since s2 is the inverse of p2 and p1 is the inverse of s1,. First we get back to C by applying s2(C') to get C (since p2 ( s2 ( s1 ( M) ) ) ) = s1(M). Then we apply p1 ( C ) = p1( s1( M ) = M. The order is what makes this secure.
@300096586
@300096586 8 років тому
If anyone asks, just say "lots of math" and big numbers rendering infeasibility unless you possess a super computer.
@FlyingTurtleLP
@FlyingTurtleLP 9 років тому
More Crypto-Stuff, please!
@theupthere9989
@theupthere9989 6 років тому
I visualize 256 bit encryption like 2^256 railroads arranged in a circle so that they all point towards the middle (sort of like a clock with 2^256 positions), and they are also stacked 2^256 high. There is a rotatable platform in the middle that has a straight piece of railroad that can only connect two railroad-pieces at a time, to make a connection from one side to the other. At which position your track is on "the clock" is your public key. At which level your track is (height wise) is the private key. Combine them and you get the only possible way to connect the railroad for passage.
@dushyantm9579
@dushyantm9579 2 роки тому
Loved it. Finally someone who can understand and also explain.
@g4bone
@g4bone 8 років тому
oh god, that marker on paper noise is killing me!!!
@iAmTheSquidThing
@iAmTheSquidThing 8 років тому
Yeah. It does put my teeth on edge a bit. They should try taking it out with a de-esser or something.
@MrHarsh3600
@MrHarsh3600 7 років тому
Allan Meters it's ASMR for me. Very relaxing
@Mariscos420
@Mariscos420 6 років тому
Using the pointy end of the marker is worse to me.
@kennys1881
@kennys1881 5 років тому
I always write like that xD even when I have normal pen
@Anonymous-vh6kp
@Anonymous-vh6kp 5 років тому
Sends shivers across my body
@scbtripwire
@scbtripwire 9 років тому
What I would really be interested in watching is a video from Computerphile about what recently happened with TrueCrypt with respect to the author suddenly ending its development and suggesting what are clearly very poor alternatives. :)
@magdalenawalczak8725
@magdalenawalczak8725 2 роки тому
The idea is brilliant and the explanation is great too! Thank you!
@TimmahDee
@TimmahDee 9 років тому
This is the most interesting stuff on Computerphile. Requesting a Cryptography/ Info security video series on this channel (like the postfix-notation stuff) please! You can talk about Diffie-Hellman key exchange + The maths behind key generation Data Integrity (checksums) Authenticity (digital signatures) Non-repudiation (signatures + public/private keys) Differences between Identification / Authentication / Authorization and the method that can be used to get them
@SyphistPrime
@SyphistPrime 7 років тому
That is clever. Granted now there are bigger fish to fry because this is only the beginning.
@subvind
@subvind 7 років тому
0:38 *paranoid look*
@waqaskamal4428
@waqaskamal4428 4 роки тому
Excellent explanation. Has clarified the confusion I had on how it works. Thanks
@Mischala
@Mischala 9 років тому
Please consider releasing a video of the process. I would love a video of the How it works, now I have the general idea :D keep up the great work guys.
@stensoft
@stensoft 8 років тому
One important thing: the key pair for decrypting incoming messages should never be the same as the key pair for signing outgoing messages. There are some clever attacks that allow someone to impersonate you or read your messages if you use the same pair for both ways. So you should have two key pairs.
@kickthejetengine
@kickthejetengine 8 років тому
+Jan Sten Adámek Why and how? I'm interested to know.
@GtaRockt
@GtaRockt 8 років тому
+Jan Sten Adámek can you explain those attacks or forward me a link please?
@GtaRockt
@GtaRockt 8 років тому
Jan Sten Adámek thx I'll look at it :)
@davetherave112
@davetherave112 8 років тому
+Lobster with Mustard and Rice Was there a link sent? I'm also interested in this example, can you forward to me?
@the1exnay
@the1exnay 8 років тому
+David Engelhardt if it got forwarded to you can you just post it publicly. pls
@dsarti1
@dsarti1 8 років тому
Amazing how many preppers are to lazy to use this
@3nertia
@3nertia 7 років тому
Operational security eludes many
@mrtoad1408
@mrtoad1408 3 роки тому
Thank you for the oversimplification. As you say some things are simple at concept and then layers are built on top as they become more complex. To explain to a complete novice you need only make sure they understand the core concept. It reminds me of an ancient system used when there were only physical messengers running long distances with lockboxes to communicate. Person 1 would send the box with their padlock (A) to person 2. Person 2 would add their padlock (B) and send it back to person 1. Person 1 would then unlock padlock A and send it back to person 2 who would then unlock padlock B.
@yashsolanki069
@yashsolanki069 2 роки тому
This is the Best explanation I've ever come across on public cryptography key.🔥🔥
@AsbjornGrandt
@AsbjornGrandt 9 років тому
For this to work for "the masses", we'd need companies like Google, Apple and Microsoft to put their heads together, and provide a universal public key server/service across their respective platforms, and integrate its use into their products. The problem is, do we trust them enough to handle even the public keys?
@RaminHonary
@RaminHonary 9 років тому
You mean like this? developers.google.com/accounts/docs/OAuth2Login
@AsbjornGrandt
@AsbjornGrandt 9 років тому
***** That's for authentications. I'm thinking more about encryption, and getting that technology into the public sphere. Even with PGP and similar tools, meant to make this easy, it's really only used by the few, because it's not easy, and it requires the recipient to install special software as well. What if Google, Apple, Microsoft and other providers were tied into the public key services, and would automatically handle for instance authentication of incoming messages, should they have been signed, and in turn help you to generate the private key needed, and get its public key exported to the servers, in a nearly seamless manner.
@RaminHonary
@RaminHonary 9 років тому
Asbjørn Grandt you mean, so people could share encrypted and signed files with their friends? So for example if you circle someone on Google+ you get a copy of their public key and you can send files intended for them only?
@AsbjornGrandt
@AsbjornGrandt 9 років тому
***** That's not a bad idea. But also if someone sends you a signed message on for instance Gmail, it'll ask if you want to verify it. I know there are plug-ins (probably) and other email clients can do this. I would just like it to be built in, and active by default.
@KimNilsson
@KimNilsson 9 років тому
Most email software support encryption with S/MIME, but for webmail the user needs to install addons.
@MrBenMcLean
@MrBenMcLean 5 років тому
Sometimes just knowing the size of a message, when it was sent, from where and to where is enough to effectively guess the significance of an encrypted message. One encrypted message in a sea of unencrypted messages stands out. I guess the only solution is for everyone to be sending lots of encrypted garbage to each other all the time.
@Another_Look
@Another_Look 3 роки тому
Well, you might now it is significant, but the problem is actually decrypting it. Sending lots of garbage to each other fills the system with unnecessary data and reduces efficiency/availability and so on.
@DarkFall01
@DarkFall01 7 років тому
Best explanation I could find. Simple and to the point. Thank you.
@efeincir3254
@efeincir3254 Місяць тому
He's style of telling is perfect. Simplicity of his sentences shows how great his knowledge
@larax222
@larax222 6 років тому
I want the complicated version :D
@prana6854
@prana6854 2 роки тому
3 years passed and I hope you dont need it :)
@larax222
@larax222 2 роки тому
@@prana6854 not need just want
@eroorefulufoo6625
@eroorefulufoo6625 2 роки тому
@@larax222 i would honestly like to see it too, i'm scrolling through the comments not finding anything
@palmomki
@palmomki 9 років тому
This is kinda cool, but I'd be much more interested in understanding how this key-pair works, I don't understand how can it.
@jorl17
@jorl17 9 років тому
Not sure if this helps, but here goes. This is the most widely used assymetric crypto system out there en.wikipedia.org/wiki/RSA_(cryptosystem)
@joealias2594
@joealias2594 9 років тому
Math.
@palmomki
@palmomki 9 років тому
Joe Alias Ok XD I'm not saying "I can't believe it works", I'm just saying I don't understand it.
@joealias2594
@joealias2594 9 років тому
palmomki Yeah I just gave you the super super short version.
@palmomki
@palmomki 9 років тому
Joe Alias I had a feeling you meant that. By the way, ***** the page is a bit too far for me, but I think I can see that the point I didn't understand isn't explained there (or maybe it's just not said explicitly). What I actually didn't understand is how can the two keys be interchangeable without being compromised. (How can it be that the private key decrypts a public encryption and the public key decrypts a private encryption avoiding that the private key is reachable) I would guess that in this case you could somehow obtain the private key by analyzing how both the encryption and decryption with the public key work, because if they can decrypt each other it means that both the public encryption and decryption processes are strictly related to the private key. In brief, it seems to me that there are actually many data about the private key in the public key itself.
@ramprasath219
@ramprasath219 5 років тому
You explained very clearly that a normal person without the knowledge of cryptography can also understand 👌
@KulasangarGowrisangar
@KulasangarGowrisangar 6 років тому
This is an absolute peach, and kudos to the explainer. This is the only vid which explains, what happens when you encrypt a message with a sender's private key and the receiver's public key. +1
@mphomathabathe8558
@mphomathabathe8558 4 роки тому
"..everyone and his dog" XD
@rajshrisukhani6318
@rajshrisukhani6318 3 роки тому
i wasn't doing Ceasar cipher when I was a kid...
@justtoleavecomments3755
@justtoleavecomments3755 3 роки тому
Great video, quick intuitive explanation that was easy to understand!
@stevensmith5626
@stevensmith5626 2 роки тому
U hooked me with the Greenbar!!! I'm a programmer from the 70's and that was what we used. thanks for your great explanation
@thrillscience
@thrillscience 9 років тому
I think he goes to the same hairstylist as Martyn Poliakoff!
@thevoidreturnsnull62
@thevoidreturnsnull62 8 років тому
"obi one" -- welp, now we know who isn't a Star Wars nerd!
@U014B
@U014B 8 років тому
I know, right? They didn't even mention Captain Kirk!
@mistercochella1044
@mistercochella1044 3 роки тому
Just learned about public key cryptography from Mungo Jerry and I love it! Seriously, with your help, I was able to pass my Security+ (first attempt)!
@hung216mc
@hung216mc 2 роки тому
I know this concept long time ago, this is the first time I understand it, thanks so much friend
@kisaposti
@kisaposti 7 років тому
i didnt know that wolverine was a crypto expert when he was young.
@j.richie3352
@j.richie3352 2 роки тому
Very well explained but I keep on finding it difficult to learn or become and expert trader by watching tutorials here on UKposts until I was introduced to a licenced investor a great tutor and a mentor ,I must say Sir Brown is nothing but a genius.
@jamiel8385
@jamiel8385 2 роки тому
Oh that's awesome to know you also let Mr Brown trade for you ...he is such a genius in crypto market ..
@clayty8689
@clayty8689 2 роки тому
I used to make loss trading crypto until I found people talking about the expertise of sir brown when it comes to the crypto market ...meeting sir Brown changed my life ..I no longer have to worry about debts because I invest another so I make huge profit trading with him
@AVRoy-nt2yk
@AVRoy-nt2yk 2 роки тому
Please does anyone have an Idea how I can reach out to sir brown..its urgent ..
@clayty8689
@clayty8689 2 роки тому
OK that's easy..all you need to do is connect with him on LinkedIn as
@clayty8689
@clayty8689 2 роки тому
Sir Obrowne
@dhwanilthakkar9398
@dhwanilthakkar9398 4 роки тому
The last part was really intresting , i hvae never thought of it in such a way. thanks man.
@jn01996
@jn01996 3 роки тому
Hi, thanks for the video. You said that with a symmetric key the information about the key itself would have to be first sent as a clear text for the other machine to know what the key actually is before they can both start using encryption. I was wondering what would be the process for asymmetric keys? I assume that the Diffie-Hellman technique is used for that?
@sghost128
@sghost128 8 років тому
His hair reminds me of Guy Martin.
@thevoidreturnsnull62
@thevoidreturnsnull62 8 років тому
+sghost128 If you speed it up to 1.5x, it almost sounds like him too! ;) Only with clear enunciation.
@sghost128
@sghost128 8 років тому
TheVoidReturnsNull And less motorcycles.
@xanokothe
@xanokothe 9 років тому
You know why so people use it? Because it can cost hundreds of dollars per year! The cheap ones: 100$ for a domain, 300$ for all company domains, 500$ for subdomain of one domain. Dafuck? It's like 1kb of data (public key, private key, company info, domain). This is the expensive storage system on the Internet.
@TheFerdi265
@TheFerdi265 9 років тому
workaround: Put a folder for public keys on an ftp server and just en/decrypt messages yourself (using software like OpenPGP), afterwards, paste the messages whereever you wanna send them to
@xanokothe
@xanokothe 9 років тому
I'm talking about domain verification (https). Self Signed Certificate triggers on browser "a not secured website".
@TheFerdi265
@TheFerdi265 9 років тому
oh, that's what you mean. Yeah, that stuff sure is expensive
@xanokothe
@xanokothe 9 років тому
yeah and piss me off really hard too
@DFPercush
@DFPercush 9 років тому
There's a limited supply of prime numbers (edit: within a given finite range which can be stored on the computer), and a very large demand. That's why it costs money.
@dhruvsinghal6451
@dhruvsinghal6451 2 роки тому
Just need your easiest explaination to understand most difficult concepts out there, thank you very much
@ajaxSAF
@ajaxSAF 4 роки тому
Wow... Thanks a lot! I was really having a tough time with understanding digital signatures until the second half of this video
@nunyabiznez4408
@nunyabiznez4408 9 років тому
secrets are for evil doers.
@JonathanJardine
@JonathanJardine 9 років тому
nunya biznez What... Did you read the whole thing and realize there isn't anything you could do but complain about it's length? Or is this another misdirection trick? Are you saying you don't have the mental fortitude to understand and reply appropriately? Do you ever think that maybe anger isn't the driving force in the universe? Why do you feel the need to project your anger issues onto everyone?
@nunyabiznez4408
@nunyabiznez4408 9 років тому
Jonathan Jardine
@phesterful
@phesterful 8 років тому
+nunya biznez nice nick. no, you're not trolling at all... OK (for the audience), not just evildoers (even though law enforcement knows their identity *because* they encrypted a message...), but also people installing software, publishing official documents, talking with attorneys, discussing trade secrets over the internet like before software is public, self-defense against terrorists and other criminals, talking with their bank, logging into any sites on the internet, buying anything on the internet, thwarting spies, checking for viruses... the list just goes on & on.
@student99bg
@student99bg 9 місяців тому
This is so clever and a very nice explanation as well
@ArturGrigio
@ArturGrigio 9 років тому
A very clear explanation of cryptography! Great video!!!
@sacrome
@sacrome 9 років тому
Very interesting, I'd really like to see the more in-depth version of this explaination! I like to learn a lot more about this subject!
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Переглядів 925 тис.
What are Digital Signatures? - Computerphile
10:17
Computerphile
Переглядів 315 тис.
😱СНЯЛ СУПЕР КОТА НА КАМЕРУ⁉
00:37
OMG DEN
Переглядів 1,7 млн
Man in the Middle Attacks & Superfish - Computerphile
13:29
Computerphile
Переглядів 1 млн
TLS Handshake Explained - Computerphile
16:59
Computerphile
Переглядів 539 тис.
Has Generative AI Already Peaked? - Computerphile
12:48
Computerphile
Переглядів 246 тис.
Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
12:33
How secure is 256 bit security?
5:06
3Blue1Brown
Переглядів 3,1 млн
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Переглядів 2,4 млн
Lambda Calculus - Computerphile
12:40
Computerphile
Переглядів 996 тис.
Breaking RSA - Computerphile
14:50
Computerphile
Переглядів 349 тис.
Prime Numbers & RSA Encryption Algorithm - Computerphile
15:06
Computerphile
Переглядів 168 тис.
Key Exchange Problems - Computerphile
9:18
Computerphile
Переглядів 349 тис.