[ad_1]

A non-technical physical visualization of internet encryption key exchange [3:28]
[ad_2]
View Reddit by Tbone139 – View Source
[ad_1]

A non-technical physical visualization of internet encryption key exchange [3:28]
[ad_2]
View Reddit by Tbone139 – View Source
Brilliant
OK so what’s the mathy equivalent of the blue, red, and green keys?
Wow so impressive! Simple and brilliant
Jokes on him. He showed us the key.
How does the sender know that the recipient applied the green padlock and not the delivery person?
And how Encryption Keys work at all, even when/if copied in the middle (same presenter): https://www.youtube.com/watch?v=EDTx3meIeT0&t=4s
Pretty neat.
I always preferred the color mixing analogy, as it’s much closer to how diffie-hellman works: https://www.youtube.com/watch?v=YEBfamv-_do&t=145s
The hilariously British names of the kids had me giggling
all fun and games until randall shows up with his $5 wrench
So no Alice among the volunteers?
I think it’s awesome that kids are learning these concepts and hopefully some of them will be inspired to create the next amazing technology!
1:16 “what’s your name? Hitler.”
Did I hear that right?
That’s not diffie-hellman.
I’m not sure if they still make the Royal Institute Christmas Lectures, but they were always great for explaining topics with simple demonstrations. I loved it as a kid.
This is not explanation about how encryption works, this is [Diffie-Hellman](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) key exchange process. It is used initially to exchange keys before encryption to establish common secret key which will be used to actually protect the data.
It does have its own faults but for the most part it’s very secure.
And before someone says “Why do they have to send it back with the green padlock, they could have just sent it locked like the first time!”, the entire point is that doing it this way the red key and green key never get exposed to the delivery people at all. You never have to send the keys themselves to the other person, and the other person doesn’t even know what your key is (so red-key guy never knows what the green-key was and vice-versa).
Whoa! Although, I think the lockpicking lawyer would have a thing or two say about those locks…
​
Still probably better than a master lock, though.
To tag onto this, Tor (browser) does a similar thing, but additionally hides the full chain of communication. Not only is the message “encrypted”, no one passing the suitcase knows both where it came from or where it’s going to end up.
[Here’s a good explanation](https://www.youtube.com/watch?v=QRYzre4bf7I), but in short… The three kids passing the suitcase along only know who to take it from and who to give it to. Their instructions for that were initially delivered via the same kind of double key encryption you just saw demonstrated.
Kid in black only knows “I take suitcase from Orange podium and hand it to tall girl”. Tall girl in middle only knows “I take suitcase from boy in black and hand it to girl in grey”.
When you start up Tor, you initiate this kind of communication chain with other Tor users, and you can essentially browse anonymously. You also “pay it back” by acting as the middleman in someone else’s chain of communication. This is how the service can be free and decentralized (unlike a VPN)
Computers are neat.
Wtf I’m a professional software developer with a Master’s degree and I didn’t know this.
And I took courses in cyber security and I know about encryption, even implemented a web backend with encryption and salt and stuff. But I never really understood why it works even if I somewhat reasoned it makes sense.
But no one ever told me of key exchange. Stupid maggots.
3 minutes is way too long for this concept. If you can’t get it after spending 30 seconds reading a simple definition, honestly go back to turnip farming.
That being said this is a genius demonstration, and this was for kids, so I hope my show of arrogance hasn’t made you too angry at me 😉
Wow
Yeah that’s cool and all but did you see that kids Afro at 32 seconds? My god what beautiful hair.
for those of you who don’t understand what they are explaining, it’s how end-to-end encryption works.
this is how websites make sure nobody in the middle can “decrypt” your https:// information, or end-to-end encrypted messages, etc.
Most disappointing audience volunteering opportunity ever. Could’ve just been one kid and you’re still sad since you’re just passing a box back and forth between presenters. ^__^
Yea nice for kids. But this is a concept you could tell an adult in 30 seconds instead of 3minutes.
I’m going to need help with this. It doesn’t seem right.
It works OK with keys, locks and boxes. But how can it work with encryption? You can encrypt something twice, but I don’t see how you can remove the first round of encryption without first removing the second.
I feel like this calls into question something that’s not addressed: How can an encryption scheme be “parallel”? That is, after the information is double-encrypted, how can the inner layer of encryption be decrypted while still being encrypted with the outer layer?