0

0

0

0

0

0

0

0

0

This video introduces when and why the problems of modern cryptography emerged. We are introduced to the concept behind the Diffie-Hellman public key exchange – the first step towards RSA encryption.

*Sorry if you notice some content showing up twice. I had tested part of this video out, and re-did the math part based on youtube feedback.

I still can understand this and Ive tried so hard to grasp it. Watching the paint analogy and I thought I understood it but alas…..

….and this is probably one of the better explanations. I was fine with the first 6 videos and even got half way through this one… I'll get there one day.

I feel by an erection in my brain.

While it is considered 'hard' to reverse the process of finding each partner's seed number it can be done. If you take the two messages sent (6 and 12) and take powers of each number until it repeats the position of 10 in each sequence will be the starting seed for the other person.

I do realize as I am typing this that this would require Eve to need to know the number 10 initially, but given that information it would be easy for Eve to impersonate either person.

all integer numbers are equalli likely between 0 and 16 and not 17 as told

http://youtu.be/6NcDVERzMGw?t=5m29s

What constitutes the generator number 3 to be efficient for the modulus 17?

3 can only get close to 17 by multiplying it by 8, of which the remainder might be fairly long like say pi. (To my judgment.) But, is this experiment proven true by the pseudorandom-ness of this number generating itself by law of 17 clockwise?

Given 3 an exponent mystifies this even more away from my understanding. The reason behind this is to ultimately have a long key right? (I'm sure.)

Mind your own business, Eve…

Diffie Hellman Key Exchange explained with colors

Diffie Hellman Key Exchange explained with colors

Her voice is so lovely

This video is good.. but anyone who pronounces "Nuclear" as "Nuke-u-lar" automatically makes me feel like you lose all credibility.

My brain hurts.

Not really as the effects cancel each other out. More computational power digital computers get the easier it get to break older codes, but it also means we'll be able to calculate even larger prime numbers making new keys.

All music is done by my friend Cam Murray. On the main page there is a link "AOP music" with more details and downloads

I wish I knew who created the background music.

By far the best popular explanation of asymmetric keys via analogy – and directly – at 2:38 mark. Their whole #cryptography series are great.

Beware. Moore's Law is the enemy of all cryptography (except one-time pads).

This makes zero sense.

please rearrange the english subtitles and thats really good job.

Excelente explicacion de un algoritmo de encriptacion asimetrica

Gambling with Secrets: Part 7/8 (Diffie-Hellman Key Exchange)