Menu
How Encryption and Key Exchange Works
Sponsored link:

A simple demonstration of how two people can agree on a secret key, even though all of their communications are carried out in public.

Sponsored link:
Please share:    E-Mail   Facebook  and   Subscribe!
In the electronic world, secret key exchange allows computers to communicate securely, and is used, for example, when you give your credit card information to an on-line shop.   But what if Pippa refused to pass the box along and impersonates the second lock with her own lock?  Eventually she removes her lock from the box and gets inside.  This is commonly referred to as a "Man in the Middle attack", and is a fairly common way of breaking this kind of key exchange.  The most common way around the problem is to essentially have a trusted third party verify a piece of information about both parties.  The information about the third party has to be agreed on ahead of time over a secure channel; in other words, you have to have an additional piece of information that both parties trust before you can exchange keys over the insecure network.  In the real world, the trusted third party is called a certificate authority.
Flixxy editors search the internet daily, to find the very best videos for you:   SELECTION:  From over 3 million videos uploaded to YouTube daily, we select only a few videos to be added to the site daily.   PG RATING:  Flixxy videos and comments are all PG rated. They are "Safe For All Ages" and "Safe For Work".  Our content is uplifting.   SELECTED START AND END POINTS: Many of Flixxy’s videos start late or end early. We skip lengthy introductions and get to the point.   CONCISE CAPTION AND DESCRIPTION: We don't use "click-bait."  Your time is valuable, so we distill the information down to what you want to know.
FREE DAILY NEWSLETTER: Get the latest videos delivered to your inbox by subscribing to the FREE "Video of the Day" newsletter.
Sponsored link: