Cryptography (part 3 of 3)

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

A great series of posts: solid content, clear, interesting and well paced - thanks. YouTube Gold.

Benjuthulo
Автор

1:22 Weird that's called an "avalanche effect" in cryptography. Normally, that's called the "butterfly effect", and having this property is the what makes a system chaotic. according to the mathematical definition. I guess there might be a technical difference; for instance, chaos is usually talked about in systems that are assumed to have a continuum of states evolving over continuous time, with the analogy to the output of a hash being the state at some point far in the future. Cryptographic hashes obviously work on discrete data, with a discrete and "immediate" change from input to output, so the "avalanche effect" does not require any infinities to be in it's definition in this context.

Mr.Nichan
Автор

I notice that the idea that public-key private-key encryption allows the receiver to know they've received a message from who they thought they did relies on the assumption that they can be sure they have the correct public key, e.g., that a "man in the middle" can't change the public key they see. Thus, the security of the connection to the place where public keys are stored in very important, and you run into a problem of infinite recursion if you try to use a public-key private-key method to secure that channel itself. I wonder how this problem is solved?

Mr.Nichan
Автор

Great job! 80% is very useful to me, 20% goes too deep and thus of no immediate use for me, that's when I start to look somewhere else.

PS. I am a ruby craftsman.

happypeter
Автор

I missed diffie hifflemen for exchange

nwodon