YouTube

Got a YouTube account?

New: enable viewer-created translations and captions on your YouTube channel!

English subtitles

← Onion Routing - Applied Cryptography

Get Embed Code
1 Language

Showing Revision 3 created 05/24/2016 by Udacity Robot.

  1. And the answer is the first message is the only
  2. valid message. The message is no good because
  3. it’s encrypted using the public key of node 5 and
  4. so node 1 won't be able to decrypt it. The rest of
  5. this, all use the public key of node 1. The third
  6. option won't work because there is only one hub.
  7. And because there is only one hub, node 1 can
  8. see that the message came from Alice and is
  9. going to Bob and this is what we don’t want to
  10. know it to be able to learn.
  11. The second option won't work because after node
  12. 1, message is directed to go to node 3 which is
  13. encrypted using a public key of node 4. And so
  14. node 3 won't be able to decrypt the rest of this
  15. message. The first option works, it’s encrypted
  16. using the public key of node 1, so node 1 can
  17. decrypt it. It’s directed to send it to node 2 and it’s
  18. encrypted using the public key of node 2 and so
  19. that hub work. Node 2 is then directed to send the
  20. message to Bob which is encrypted with the public
  21. key of Bob, so Bob will be able to decrypt the
  22. message and receive Onions Galore.