How Encryption Keys Work - with Chris Bishop

  Рет қаралды 28,734

The Royal Institution

The Royal Institution

6 жыл бұрын

What does the padlock icon on your internet browser mean and why is encryption important? In this clip from 2008 CHRISTMAS LECTURES "Hi-tech trek", Chris Bishop uses coloured water to demonstrate how information is transferred on the internet.
Subscribe for regular science videos: bit.ly/RiSubscRibe
This video is from our 2017 advent calendar. Watch the full series here: • Transmissions through ...
Or watch the full lecture here: www.rigb.org/christmas-lecture...
The Royal Institution 2017 advent calendar ‘Transmissions Through Time’ looks through the lens of CHRISTMAS LECTURES past to share the best demonstrations around the science of communication. From Attenborough and Sagan to Woollard and Fong, we revisit old favourites and find new gems to bring you a little gift of science every day in the lead up to Christmas. bit.ly/RiAdvent17
The Ri is on Twitter: / ri_science
and Facebook: / royalinstitution
and Tumblr: / ri-science
Our editorial policy: www.rigb.org/home/editorial-po...
Subscribe for the latest science videos: bit.ly/RiNewsletter

Пікірлер: 53
@WilliamJasonSherwood
@WilliamJasonSherwood 6 жыл бұрын
This is probably the best way I've seen this explained to non-computer people!
@WackyConundrum
@WackyConundrum 6 жыл бұрын
Non-computer people are the best people.
@ergohack
@ergohack 6 жыл бұрын
I was about to say exactly this.
@GuniMatthiasson
@GuniMatthiasson 6 жыл бұрын
+Genkaku Ishiki As a computer person I find this deeply offensive.
@spiroskatsas6888
@spiroskatsas6888 Жыл бұрын
@@WackyConundrum I personally think geeks are fun, in a way. Maybe some people are a bit awkward, but I think most are ethical and not manipulative. And interesting, if they can think a bit outside of the box.
@yushatak
@yushatak 6 жыл бұрын
I'm a developer, and have worked with encryption plenty, and that's a pretty impressively intuitive way of showing how handshaking to establish a key can work.
@NetAndyCz
@NetAndyCz 6 жыл бұрын
I think you should still be careful about entering credit card info even when you see green or yellow padlock in the browser. It means the connection is secured, but it does not say the other side is trustworthy, they are just who they say they are (that is the domain name is theirs).
@un2mensch
@un2mensch 6 жыл бұрын
Otherwise known as: Diffie-Hellman key exchange
@savvyshah
@savvyshah 6 жыл бұрын
He knows how too make science interesting
@chan.sorman
@chan.sorman 6 жыл бұрын
Brings back memories of the first Christmas lecture I saw.
@BobBogaert
@BobBogaert 6 жыл бұрын
This is the simplest explanation I ever found: Alice wants to send a locked box to Bob. Alice has a lock, so does Bob. Alice attaches her lock, so no-one but she can open the box, and sends it to Bob. Bob can't open the box, so he attaches his lock. He sends the doubly locked box back to Alice. Alice opens her lock with her key and sends back the box. Bob can now open the box with his own key.
@confuseatronica
@confuseatronica 6 жыл бұрын
I just like that the girls mask is almost exactly the same width as the stripes on her shirt. It's very stylish.
@HasekuraIsuna
@HasekuraIsuna 6 жыл бұрын
Wait, I think I get most of it. But Blue is the public key, right? While separating molecules sure is hard, simply computing BlueYellow divided by Blue to get person A's private key should be a cake walk right? Sure, they are enormous numbers, but a simple division should be impossible for someone who really wants that key? Is there any scrambling done to BY?
@MarkProffitt
@MarkProffitt 6 жыл бұрын
HasekuraIsuna They are combined using 1 directional algorithms. The video says you can easily add colors but subtracting takes a very long time, millions of years. The math used works in the one direction. There isn't a nice divide function.
@tpat90
@tpat90 6 жыл бұрын
It would be more easy to actually calculate every possible pair and just search for it if necessary. But nevertheless it is nearly impossible and to get a single one right will most likely take years of computing. In the meantime the transaction is done and a new secret key took it's place. PS Division with such large numbers will cause most computers to give up. Even just 308 random dez digits can't be digested by most calculating programs. The usual public key has around 4096 bits so around 1000 digits ~ in dezimal. Also there can be happening more than a multiplication, maybe some modulus, what kills every last hope of calculating the secret key.
@SUNSPYtm
@SUNSPYtm 6 жыл бұрын
Yes, the reason one way encryption works is you use very large prime numbers as halves of the key There is no way to FACTOR a number without brute force. A number like 12 is easy, 1 2 3 4 6 12.. a huge prime x a huge prime = a gigantic number with only two factors, apart from 1 and itself of course. No way to find these numbers.
@anarcho.pacifist
@anarcho.pacifist 6 жыл бұрын
There is modular arithmetic involved, where the modulo (part of the public key) is the product of two large prime numbers (typically 2048 bits each). Solving for an inverse to this operation requires factoring the modulo into its prime factors, and since no efficient integer factorization algorithm is known to exist, this process would take thousands of years on a classical computer (or even more), using the current best factorization algorithms. Therefore this method is considered secure in practice. See also the "RSA algorithm" to understand technically how this method works.
@buddymonster56
@buddymonster56 6 жыл бұрын
Disclaimer: I only took a course on this, so I'm not an expert. You might want to read up on the Diffie-Hellman Exchange if you're interested. It's not actually multiplying the two numbers, but modular exponentiation. Firstly, all calculations below will be done mod M, and this number M is known publicly. Let's assume the numbers are 'b' (for blue), 'y' (for yellow), and 'r' (for red). Both 'y' and 'r' are only known by the individual, and not by anyone else. On the other hand, 'b' and 'M' are public information, which means everyone (including the girl trying to steal their private information) knows them. Step 1: The first person calculates a number Y = b^y mod M, and sends it to the second person. The second person calculates a number R = b^r mod M, and sends it to the first person. So far, the girl can only get 'Y' and 'R' in this exchange. Step 2: The first person calculates a number K1 = R^y mod M, and the second person calculates K2 = R^b mod M. There is no exchange, so the girl did not get anything in this step. Firstly, how are the two men able to get the same number in the end? It can be seen that K1 = R^y = (b^r)^y = b^ry , while K2 = Y^r = (b^y)^r = b^yr = b^ry = K1 . So, they actually got to the same number, without actually exchanging their own private information! Secondly, why is the girl unable to steal their private information through this exchange? The information she knows is 'b', 'M', 'Y', and 'R'. Y = b^y mod M is relatively easy to calculate. And conventionally, one might think it easy as well to find 'y' using logarithms. However, this becomes computationally hard as this is done in modulo M. This is known as the Discrete Logarithm Problem, and is why the girl cannot calculate 'y' or 'r' easily if the numbers are very large. Tl;dr It is very hard to get private information using only public information.
@jojojorisjhjosef
@jojojorisjhjosef 6 жыл бұрын
best way of explaining encryption I've seen.
@AtlasReburdened
@AtlasReburdened 6 жыл бұрын
Yeah, it will be scrambled, unless your computer has an Intel remote management processor. Then it can glean info straight from the keyboard or even the display feed, before its ever encrypted. Isn't that just lovely?
@JamesMulvale
@JamesMulvale 6 жыл бұрын
Kevin spacey is hiding out at the RI while the dust settles
@BariumCobaltNitrog3n
@BariumCobaltNitrog3n 6 жыл бұрын
Wouldn't it be easier to just put up a fake green padlock?
@IngieKerr
@IngieKerr 6 жыл бұрын
logically, yes... but in practice, the analogy would be: it takes a very very long time to work out which shade of green you need - due to the time it takes to factor very large prime numbers
@tpat90
@tpat90 6 жыл бұрын
You would have to hack into the browser and install a plugin to do such a thing, good luck.
@UCCLdIk6R5ECGtaGm7oqO-TQ
@UCCLdIk6R5ECGtaGm7oqO-TQ 6 жыл бұрын
They can just do 'man-in-the-browser' attacks now where they'll install trojan software on your machine that infects your browser so that any action you take in the browser communicates with their systems first before the desired 'secure' site, or simultaneously whilst connected with the 'secure' site, and so have full access to the transaction outside of the secure connection. On your side you'll see that you're connected 'securely' to your bank/whatever server, and the bank/whatever server sees that they are connected to your browser 'securely', but in reality all your details are being intercepted outside of that secure connection.
@jimmboy93
@jimmboy93 6 жыл бұрын
The green padlock is in the browser bar of the web browser so unless you get the person to download and use a entirely fake web browser than won't work.
@BariumCobaltNitrog3n
@BariumCobaltNitrog3n 6 жыл бұрын
Thank you. I have no fear of asking stupid questions because I know eventually I'll get a good answer. So I take it that would be hard to do, a browser being a solid piece of secure software, right?
@AldoOjeda
@AldoOjeda 6 жыл бұрын
How lucky they where for the example, there was someone in the audience with a thief outfit!
@AxelWerner
@AxelWerner 6 жыл бұрын
NOT SO FAST, MATE!! That padlock just says that the transport way between your computer and the site is TLS encrypted and that its TLS Certificae is still trusted by your webbrowser. IT DOES NOT MEAN, THAT THE WEB-SERVER IS SAFE BY ANY MEANS!! The transport might be safe, but the sever might be hacked and your credit card credentials are fished or leaked. So please dont mix up this stuff. Padlock >> safe connection! NOT safe Server !!
@xaostek
@xaostek 6 жыл бұрын
Axel Werner yes, because the intricacies of TLS encryption is exactly what you want to be explainng to kids at a christmas lecture, right?
@SUNSPYtm
@SUNSPYtm 6 жыл бұрын
The important thing they don't say is DONT IGNORE WARNINGS ABOUT INVALID CERTIFICATES on a site !!
@lindhe
@lindhe 6 жыл бұрын
*Yellow* padlock??
@JohnDoe_1237
@JohnDoe_1237 6 жыл бұрын
but the internet thief don't have to give this "secret" color to the next person, could mix an own color (man in the middle attack).
@RWBHere
@RWBHere 6 жыл бұрын
The resulting 'colour' will be wrong, so any decent software will detect the attack, and reject the message.
@neddyladdy
@neddyladdy 6 жыл бұрын
But my credit card is blue and white with a splash of red. Now, what colour does my cedit card end up being ? Is it red because i am in debt ?
@fburton8
@fburton8 6 жыл бұрын
How is that even possible??
@ExcludedLayman
@ExcludedLayman 6 жыл бұрын
Because the 'pour' operation is associative: (Yellow + Blue) + Red = Yellow + (Blue + Red) Each side gets Blue-and-Something, then pours in their own colour to make a solution of all three. The result doesn't depend on which pair gets mixed first, so both sides have the same solution at the end.
@kstringer24
@kstringer24 6 жыл бұрын
They use food colouring in the water!
@fburton8
@fburton8 6 жыл бұрын
Even so, pretty mind-blowing.
@baganscissors7224
@baganscissors7224 6 жыл бұрын
is this top secret?
@mountainhobo
@mountainhobo 6 жыл бұрын
Unfortunately, 'Man-in-the-middle' breaks this scheme and more measures are required.
@RWBHere
@RWBHere 6 жыл бұрын
Be aware that this demonstration is aimed at children so that they can begin to grasp the concept of public key encryption. There's no point in trying to explain everything, because he's trying to give them something which is interesting and which they can understand and remember. Those who grasp the idea might then be moved to learn more about it.
@doubledoggo5668
@doubledoggo5668 6 жыл бұрын
you can stop there that's fine
@balumbibadumbi6089
@balumbibadumbi6089 6 жыл бұрын
But why would you need so send bowls of colored water over the internet?!
@NipapornP
@NipapornP 6 жыл бұрын
To make the internet more colorful!
@TheDdm1234
@TheDdm1234 4 жыл бұрын
Pointless.... As im colourblind
Key Exchange
3:29
ProfChrisBishop
Рет қаралды 190 М.
How Would We Communicate with Alien Life? - with Carl Sagan
8:17
The Royal Institution
Рет қаралды 274 М.
The day of the sea 🌊 🤣❤️ #demariki
00:22
Demariki
Рет қаралды 16 МЛН
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 11 МЛН
The Science of Fireworks - with Chris Bishop
1:09:30
The Royal Institution
Рет қаралды 1,5 МЛН
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 9 МЛН
How does encryption work? - Gary explains
20:30
Android Authority
Рет қаралды 108 М.
Science Experiments with Potassium Permanganate | Szydlo's At Home Science
44:45
Homochirality: Why Nature Never Makes Mirror Molecules
18:32
Steve Mould
Рет қаралды 1,5 МЛН
The Curious World of Springs | Szydlo's At Home Science
37:03
The Royal Institution
Рет қаралды 61 М.
How SSH Works
8:54
Mental Outlaw
Рет қаралды 476 М.
Reacting Fluorine with Caesium - First Time on Camera
4:37
The Royal Institution
Рет қаралды 771 М.
Public key cryptography - Diffie-Hellman Key Exchange (full version)
8:38
Art of the Problem
Рет қаралды 879 М.
Encryption and HUGE numbers - Numberphile
9:22
Numberphile
Рет қаралды 1,3 МЛН
Mi primera placa con dios
0:12
Eyal mewing
Рет қаралды 719 М.