1 00:00:00,810 --> 00:00:09,660 All right, so the main idea behind the Fidelman exchange algorithm was the question of how to exactly 2 00:00:09,660 --> 00:00:17,460 share the key, because as we all know, that symmetric encryption uses only one key to encrypt and 3 00:00:17,460 --> 00:00:19,050 then decrypt the document. 4 00:00:19,380 --> 00:00:25,380 So how exactly people will share the key because the key is not shared securely. 5 00:00:25,410 --> 00:00:29,810 There is no point in having encryption system at the first place. 6 00:00:30,330 --> 00:00:36,300 So these two people, Diffie and Helmond, outstanding people, outstanding brain and excellent thinking. 7 00:00:36,990 --> 00:00:46,170 They came up with an exchange of algorithm in such a way using generators and prime numbers that it 8 00:00:46,170 --> 00:00:53,050 was possible to generate the exact same security at the both parties. 9 00:00:53,070 --> 00:00:59,570 And so let us say we have Bob here and then we have Alice over here. 10 00:01:00,870 --> 00:01:04,260 So now we can see that is. 11 00:01:05,020 --> 00:01:05,290 Yeah. 12 00:01:06,150 --> 00:01:10,070 So this is Bob's private key, which is with Bob. 13 00:01:10,650 --> 00:01:17,090 And this is let's say now we have Alice's private key with her. 14 00:01:17,430 --> 00:01:18,870 So we have Alice. 15 00:01:19,230 --> 00:01:24,090 So this is Bob's private key and then this is Alice Private. 16 00:01:24,330 --> 00:01:27,910 So they have their own private keys with them. 17 00:01:28,800 --> 00:01:33,930 Now, the next step is we have this cloud, which has the generator. 18 00:01:33,930 --> 00:01:35,010 That is the algorithm. 19 00:01:35,340 --> 00:01:37,690 And this we have the prime number. 20 00:01:37,980 --> 00:01:40,590 Now, all these things are known to public. 21 00:01:40,600 --> 00:01:44,900 So whatever you see here, whatever you see here, it's public. 22 00:01:44,910 --> 00:01:50,610 So anyone, even the attacker can see the generator algorithm and the prime number. 23 00:01:50,970 --> 00:01:56,010 But attacker cannot see Bob's private key and bolt analysis, private key. 24 00:01:57,390 --> 00:02:01,400 So what they do is they take the generator here. 25 00:02:01,410 --> 00:02:03,640 So just let me take my pen. 26 00:02:04,140 --> 00:02:06,420 So what they do is they take generator. 27 00:02:06,450 --> 00:02:14,220 So Bob takes the generator and as well as Alice takes the generator algorithm, they combine. 28 00:02:15,000 --> 00:02:22,980 So what Bob does at his end is he uses one algorithm to combine and form this color to form this. 29 00:02:23,400 --> 00:02:26,440 You can see this key or you can see this output. 30 00:02:26,880 --> 00:02:33,030 Similarly, Alice takes the generator and her private key to form this output at Horwitt. 31 00:02:34,200 --> 00:02:44,160 Now, what do they do is since this has the Bob's private key and what do they do is they share these 32 00:02:44,160 --> 00:02:47,140 two outputs to respective each other. 33 00:02:47,160 --> 00:02:52,790 So even if the attacker sees this orange color, he will only find out the generator. 34 00:02:52,800 --> 00:02:55,710 He won't find out the output. 35 00:02:55,710 --> 00:03:02,640 Because now you may say that if Bob sees the red color and Bob sees orange, obviously the next element 36 00:03:02,820 --> 00:03:03,780 is going to be yellow. 37 00:03:03,900 --> 00:03:04,920 It's not like that. 38 00:03:05,250 --> 00:03:09,080 Output is a string is a number, is a hash value. 39 00:03:09,390 --> 00:03:17,430 So even if Tacker gets to see these two values and the generator, he is not able to guess he he won't 40 00:03:17,430 --> 00:03:20,350 be able to guess their private keys. 41 00:03:20,940 --> 00:03:21,750 Consider this. 42 00:03:21,990 --> 00:03:30,180 I may see that I have taken 5min of red color and Danimal of yellow color, but I can see that what 43 00:03:30,240 --> 00:03:35,780 I have got is I've got orange color and I've known five red color. 44 00:03:35,790 --> 00:03:37,050 But what about the yellow color? 45 00:03:37,500 --> 00:03:38,690 It can be 10. 46 00:03:38,700 --> 00:03:42,120 It can be ten point one, nine point eight anything. 47 00:03:43,110 --> 00:03:45,090 So in that way, what exactly? 48 00:03:45,090 --> 00:03:49,950 Once you mix two colors, it's very difficult to get those colors back. 49 00:03:50,280 --> 00:03:50,620 Right. 50 00:03:50,640 --> 00:03:59,340 You may try yourself a gondek of water in two balls in one block and big yellow water and then another 51 00:03:59,340 --> 00:03:59,520 ball. 52 00:03:59,520 --> 00:04:04,380 You can take red water and mix those two waters and you get a uniform color. 53 00:04:04,800 --> 00:04:07,280 After that, try separating out those colors. 54 00:04:07,290 --> 00:04:10,430 It's impossible to get the original colors. 55 00:04:11,010 --> 00:04:14,350 So this step after this step now both of them. 56 00:04:14,370 --> 00:04:19,530 Now, Bob has Alice's output and Alice has Bob's output. 57 00:04:19,920 --> 00:04:27,330 So, again, what Bob does is Bob takes his private key analysers output and Alice takes Bob's output 58 00:04:27,330 --> 00:04:28,420 and her private key. 59 00:04:29,160 --> 00:04:32,840 Together, they do again do the same procedure here. 60 00:04:33,270 --> 00:04:37,470 And in this way, they get the same shared secret. 61 00:04:38,160 --> 00:04:43,830 This output is always going to be same at both the ends. 62 00:04:43,830 --> 00:04:48,910 In this way, the Diffie Helmund key exchange algorithm was designed. 63 00:04:48,930 --> 00:04:55,290 Now, both of them have the same shared secret key, and that is why they can do this. 64 00:04:55,290 --> 00:04:57,830 Symmetric encryption, right? 65 00:04:59,130 --> 00:04:59,580 This. 66 00:04:59,850 --> 00:05:08,880 This was the most simplest explanation anyone can give you using the color theory, because don't visualize 67 00:05:08,880 --> 00:05:12,430 these colors, don't think as actual colors. 68 00:05:12,450 --> 00:05:16,920 The main reason behind this is you have to take these values. 69 00:05:17,470 --> 00:05:21,790 Again, I can't see, let's say generator stands for G. 70 00:05:22,620 --> 00:05:29,630 Bopp's private key stands for Y, so y and ah will give you Y are OK. 71 00:05:30,000 --> 00:05:38,510 So now Alice will have y r and this is R and G, so this is G. 72 00:05:38,820 --> 00:05:43,980 That is why Bob will have to G now vi. 73 00:05:44,130 --> 00:05:53,760 So this Shirkey is why are G and this is again why are G. 74 00:05:54,360 --> 00:06:01,320 So both these things are seen in this way you get the same shared secret. 75 00:06:01,540 --> 00:06:06,730 Now once you have the same shared secret G you can carry out symmetric encryption. 76 00:06:07,110 --> 00:06:09,990 This was the algorithm proposed by Diffie Hellman. 77 00:06:09,990 --> 00:06:17,700 It's a really outstanding algorithm and therefore this algorithm and Ezzy, along with symmetric encryption 78 00:06:17,700 --> 00:06:21,680 overtones, the processing power of asymmetric encryption. 79 00:06:22,170 --> 00:06:29,070 So even if you want to get your asymmetric encryption, symmetric, encryption can be used along with 80 00:06:29,070 --> 00:06:30,480 the development algorithm. 81 00:06:31,140 --> 00:06:34,650 And that is why this secret secret key can be used. 82 00:06:35,970 --> 00:06:39,720 This was the working of the film, the exchange algorithm. 83 00:06:40,140 --> 00:06:40,650 All right. 84 00:06:40,800 --> 00:06:45,380 In the next lecture, we are going to talk about a new tome known as Harshing. 85 00:06:45,780 --> 00:06:46,770 So stay tuned. 86 00:06:47,010 --> 00:06:48,570 Keep moving forward.