Messaging layer security: Encrypting a group chat

  Рет қаралды 15,215

Chalk Talk

Chalk Talk

Күн бұрын

Пікірлер: 22
@oncedidactic
@oncedidactic Жыл бұрын
So easy to understand the concepts and see deeper into the space of problems and solutions. Awesome!! Thanks!
@Der_Stille_Zuschauer
@Der_Stille_Zuschauer Жыл бұрын
00:00 - Introduction and the Challenge 00:54 - some Ideas how to solve it 00:54 - Parallelized Conversation 01:40 - Key Systems 02:17 - Messaging Layer Security (MLS) (Tree System) 03:37 - Key System 05:00 - Key Schedule 06:50 - Root Key change 09:53 - Remove Group Member 11:13 - Conclusion
@ericdanielski4802
@ericdanielski4802 5 ай бұрын
This comment should be pinned at the top.
@fusionsid
@fusionsid 2 жыл бұрын
Thank you for this and the other video, Im currently making a chat app and couldnt find any good videos explaining group encryption
@hashtag9990
@hashtag9990 2 жыл бұрын
hey gentleman, would you like to share your wisdom? we want to implement encryption in our app too, and we are not knowledgeable enough, ofcourse you don't have to share your wisdom for nothing.
@eapiii
@eapiii 2 жыл бұрын
Great set of videos
@rhoumarhouma9714
@rhoumarhouma9714 3 ай бұрын
brilliant and smooth presenration tghank you
@charleskhenry
@charleskhenry Жыл бұрын
Amazing.
@devobern
@devobern Ай бұрын
Great explanation of MLS! I have a question about how a single message is encrypted in the protocol: Is the same message encryption key used by all group members during an epoch, or does each sender derive their own encryption key (e.g., from the root secret or another source)? Could you clarify how message keys are derived and managed for individual senders?
@tonpa
@tonpa Жыл бұрын
Perfection!
@guzh
@guzh 9 ай бұрын
It is unclear how F gets its private key at 6'16''. It is also unclear why the rachet can go up the tree as well as down the tree.
@sojn4
@sojn4 7 ай бұрын
It’s a bit confusing in the graphics but F must derive its own Public Private key pairs itself first, give Alice the public key, then Alice will wrap the group secrets (tree private keys) with Franks public key so that F can join the group chat. F gets its welcome message directly from Alice. Basically you can use any method to give F the welcome message.
@sojn4
@sojn4 7 ай бұрын
Also think of the ratchet as the “propagation path” for a new key. The ratchet doesn’t HAVE to go unidirectional on the tree. The ratchet is in the direction of any new key that’s being propagated.
@alexipeck4201
@alexipeck4201 Ай бұрын
I have never heard the word epoch pronounced as you did. It sounds like you are saying "epic"
@markcuello5
@markcuello5 2 жыл бұрын
HELP
@leesweets4110
@leesweets4110 Жыл бұрын
Epic? Quit saying epic. Its clearly the other pronunciation. Because your way of doing it is ambiguous with another word.
@PrecariousPosition
@PrecariousPosition Жыл бұрын
I've never heard it aloud that way. How bizarre. I wouldn't have thought it was a controversial word
@StevenAkinyemi
@StevenAkinyemi Жыл бұрын
Ikr. If pronouncing it as epic is ambigous, why not save us the confusion?
@erikb3799
@erikb3799 Ай бұрын
I've heard ep-awk, ep-uck, and ee-pawk. It seems like she doesn't like ee-pawk, but there are other pronunciations that are less confusing than ep-ick.
@mooseyard
@mooseyard Ай бұрын
There’s nothing wrong with homonyms; English is full of them. And English is full of words with multiple valid pronunciations. Arguing about the “right” pronunciation is pointless.
@beeble2003
@beeble2003 Ай бұрын
@@PrecariousPosition It's only controversial to her because she mispronounces it, so people argue with her about it! The two accepted pronunciations are EE-pock and EPP@k, where I'm writing "@" for schwa, as in the second vowel of "lemon".
Post-quantum cryptography: Security after Shor’s algorithm
7:17
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
Why I Trust Signal: My Go-To for Secure Messaging
17:12
Lawrence Systems
Рет қаралды 28 М.
Ranking Paradoxes, From Least to Most Paradoxical
25:05
Chalk Talk
Рет қаралды 87 М.
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 514 М.
one year of studying (it was a mistake)
12:51
Jeffrey Codes
Рет қаралды 323 М.
Why The Government Shouldn't Break WhatsApp
11:11
Tom Scott
Рет қаралды 3,7 МЛН
Double Ratchet Messaging Encryption - Computerphile
11:39
Computerphile
Рет қаралды 164 М.
Lattice-based cryptography: The tricky math of dots
8:39
Chalk Talk
Рет қаралды 183 М.
Transport Layer Security (TLS) - Computerphile
15:33
Computerphile
Рет қаралды 494 М.
AI Laptops: Exposing the Truth
14:29
Just Josh
Рет қаралды 3,4 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН