0:05
Hi guys, in this video,
I wanted to tell you a little bit about a protocol called Diffie-Hellman Exchange.
But I want to preface it with just a few comments about the cryptographic
community, and cryptography in general.
And I bet a lot of you probably has some interest in this, this is fun like if you
like doing computer science, you like protocols, you like distributed systems
then you probably like cryptographic application protocols.
They're fun, they're like little puzzles on how you make
certain properties be respected as different entities are interacting.
Now, the guys that we've been talking about here,
Whit Diffie, Martin Hellman, wonderful people.
If you met Whit Diffie, you would like him immediately.
He sort of looks the part of cryptographer.
He's just, in my mind, one of the few heroes that we have in
cybersecurity did Martin Hellman and did other guys from MIT.
We live in a time right now when sometimes it's not so
easy to find heroes like sports figures maybe there are some,
it always seems like when they get into contract negotiations they don't
seem like such great heroes anymore who's asking for more money.
Or political figures a lot of times let us all down.
I don't have to go into too much detail on that.
But in technology, people like Whit Diffie and others, they really are heroes.
I mean these are people who are true to their discipline.
They're smart.
They've made contributions that change the world.
They're very modest.
If you ran into any of them at the mall or something, or at the store, or at
a conference, they're not wearing blinking lights attracting attention to themselves.
They're not that kind of person.
So as you, particularly some of the younger people here, as you get interested
in cryptography, there are a lot of really wonderful role models that you can
study their history, read about them, look them up on the Internet, see what kinds of
careers they've had that led them to making contributions such
as the sort of thing that we're looking at with Whit Diffie and Martin Hellman.
Now, let's get into it with them.
We said earlier that we wanted it to be the case that we have both secrecy and
authentication in a given protocol.
We knew that if I took a message and
I encrypt it with your public key then I can get it to you secretly,
if I take a message and I encrypt it with my secret key, I can authenticate.
But I couldn't do both or Diffie and Hellman went just do both.
[LAUGH] I know it sounds so obvious, but if only it were so obvious.
These amazing contributions seem so obvious afterwards, but
before not so much.
So here's what they said.
They said the first thing we want you to do, take the message and sign it.
3:31
So doing it twice gives you secrecy, gives you authentication, but guess what?
It still doesn't solve something.
This alone was not enough to kind of create the mystery and
the legend that's Diffie and Hellman.
The problem we have is it still doesn't preserve the efficiency of
conventional cryptography.
Do you follow?
Even with all this work if I can get a message them across and
I can get both secrecy and authentication, the kind of cryptography we were fooling
around with at the time required multiplying prime numbers together,
the RSA implementation and doing all these complex numbers.
The RSA algorithm involves two gigantic primes, like 100 decimal digits
long that you multiply together [LAUGH] and that's essentially your public key.
Computers in the 70s couldn't do that for a big giant file.
If the message m is a big long document, then what?
You see how a block cipher worked very nicely block by block.
This thing just uses a, quote unquote, message.
How are we going to fix all of this?
So stick with us, because in our next video, I'm going to explain that, but just
sort of as an additional considerations as you're thinking this through.
I want you to ponder the following question.
If this is so obvious, why didn't it pop up earlier?
Like, this is the mid 70s, why wasn't it the case in the 20s, 30s,
40s or even earlier in the 1800s, why didn't people come up with this idea?
It's an interesting thought to ponder because until Diffie and
Hellman made this public, for thousands of years people figured that the only way you
could really effectively exchange a secret and do it in an authenticated way,
is with the key distribution center is one of the basic presumptions of
human communication for thousands of years, 1970s they figure it out,
is it possible it could have come up sooner?
And we'll get to that as well.
So we'll see you in the next video and we'll look at how Diffie and
Hellman solved this problem resulting their winning of the Turing Award,
which is the greatest prize in computer science.
So I'll see you in the next one.