Did anybody else think this demonstration should have been used with Spongebob, Patrick, and squidward when they were sending voice messages through bubbles and squidward would hijack the moment with hate bubbles XD
So the exchange of keys is the really important part, right? You can steal the information, but you cannot do nothing with that information unless you have the 'key'. So how do you get your hands on this 'key', that is what i want to know
Hi I enjoyed your video. I was trying to find someone that could possibly make an encryption and decryption program using an old method that ive used on paper.
Alice creates a session key to encrypt the message, and she uses Bob's public key to encrypt this session key. Bob uses his private key to retrieve the session key. He now has the same session key that Alice used, as in symmetric cryptography. He uses this key to finally decrypt the message.
If I use Bob's public key to encrypt a message to him, couldn't an adversary just apply Bob's public key to unlock it? How does Alice effectively obscure the message encrypted to bob with his public key, so that an adversary can't open it while Bob can?
Ok I will try to explain. Bob has 2 keys, public and private. Public key can do encryption and is given to everyone. Private key can do decryption and is kept with bob only. So when alice wants to encrypt the message she uses bob's public. Even though eve can eavesdrop the message, she cannot decrypt it because she does not have the private key needed to decrypt it, only bob has that key. So only bob can decrypt alice's message because he has private key with him. Hope this makes you clear. Also remember when you go deeper into subject, you will come to know that these keys can be used alternatively, that is data encrypted with public key is decrypted using private key and that is data encrypted with private key is decrypted using public key.
Yeah I understand it now. What I didn't understand, and I think is conceptually hard to figure out until you delve into the actual math of public key/private key encryption, is *how* the public key can have properties that make it only possible to be decoded by the private key. Namely, that a *public key* is a number that is a factor of two prime numbers, and that knowing *which two prime numbers* were used to generate this number is critical to figuring out the actual private key. Since it is very mathematically difficult to figure out which prime numbers were used if you only know the public key, encryption works.
Spuds7er Bob will generate two keys based on some mathematical operation which is easy to apply in one direction but next to impossible in the other direction. For example, Bob can generate two very large prime numbers and compute the product of those two numbers (easy) but if Bob asks Alice to factor the two prime numbers giving Alice only the product she will need a very, very long time to figure it out. It's not quite impossible but the time involved would be prohibitive. Now, Bob could use this very large number to generate two keys, one public and one private. The public key will be sent to Alice and she can encrypt her message with it. Bob's private key is never disclosed to Alice and it is the only key that is able to decrypt the message. The relationship between the public key and the private key (only known to Bob) allows Bob, and only Bob, to decrypt the message. Of course, anybody can get Bob's public key so this particular scenario only ensures confidentiality and not non-repudiation since Alice can never prove that the message came from her (or not).
***** How does one get the Private key? Is it sent through the first public message. Or is it given to the other party even before communication begins?
If you give a man with an understanding of calculus/algebra 3 months to create his own cipher for mobile phone numbers what would be the best way to do it? Ciphering text is one thing but to be able to look down at your own mobile phone and in 10 seconds to be able to change a phone book full of 'jibberish' into something that will take a computer a few months to crack... What's the best method? As reward I will link you all to the best XKCD cartoon ever made(most of you will have read it already).
Adam Webster I came up with a vignere cipher. The 'one-time' pad is not something that given a short amount of time a (smart) person would be able to do fairly quickly in their head I think. I'm quick at this Vignere cipher now and it has only been two weeks and about four hours of practice. A mobile phone number is eleven numbers so by coming up with a 11 letter phrase I have been able to commit quickly to doing it but only on paper and I think in a year I will be able to do it without any real cognitive thinking. I think a Vignere is pretty badass and would delay a computer quite a long time. I don't mind even mentioning it here on youtube because without the key nobody can really have a crack at it. A dictionary attack proof type of vignere is nigh invincible I think? My pre-frontal cortex will always outperform a computers GPU huh!
Adam Webster My favourite thing to do it use mnemonics to memorise number plates. I'm interested in joining the police force you see and anything like this I can do in my spare time not only proves useful but absolutely fascinating. What is it about the spy stuff that makes it so much fun? I always wanted to be James Bond as a kid but until now the only thing I've had in common with him is his ability with women... I have to work at the math! :)