Тёмный

7 - Cryptography Basics - Diffie-Hellman Key Exchange 

CBTVid
Подписаться 5 тыс.
Просмотров 73 тыс.
50% 1

In this video you'll learn about Diffie-Hellman key exchange method.

Опубликовано:

 

18 янв 2021

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 44   
@gekobcint4973
@gekobcint4973 6 месяцев назад
Bro just explained them better than my professor did in two lectures
@worldwar_two2894
@worldwar_two2894 Год назад
Colossal explanation!! I wish RU-vid could let me give this video a "like" infinitely!
@AmmarMujtabaTariq-zv8zp
@AmmarMujtabaTariq-zv8zp 4 месяца назад
very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing
@devsaranga
@devsaranga Год назад
Beautifully condensed a dreary 1 hour lecture into 8 minutes. Fantastic!
@Lilly_Angelin
@Lilly_Angelin Год назад
I know right!!!!
@WikiSteve
@WikiSteve Год назад
Incredible. Best explanation of DH I have ever heard.
@scotth8083
@scotth8083 Год назад
Thank you. This is very clear and to the point explaination. Very helpful.
@giovannipollo
@giovannipollo Год назад
Amazing video. Great explanation!
@Lilly_Angelin
@Lilly_Angelin Год назад
Thank you so much for such clean explaination!!!
@ricp
@ricp Год назад
Great video, great explanation, thanks a lot!
@luiMallia
@luiMallia 2 года назад
Great explanation !
@paulofduty9790
@paulofduty9790 6 месяцев назад
Awesome thanks I was lost forever on this
@hassanhashemi6478
@hassanhashemi6478 Год назад
Just fell in love with it!
@unixguy1396
@unixguy1396 Год назад
very very helpful explination, I love it.
@tarirocoffee5026
@tarirocoffee5026 Год назад
Simple. Direct. Thank you.
@MuhammadNaveed-xl7wq
@MuhammadNaveed-xl7wq Год назад
Excellent explanation.
@chathekamangazi3913
@chathekamangazi3913 2 года назад
Very good explanation
@crawf78
@crawf78 Год назад
Awesome explanation
@abdurrahmanyoosuff4284
@abdurrahmanyoosuff4284 4 месяца назад
Than you very much, may god bless you and guide you.
@SALMANKHAN-lz4mg
@SALMANKHAN-lz4mg 10 месяцев назад
Thank You so much for this tutorial ❤❤❤
@JoJoYte
@JoJoYte 2 года назад
Amazing , on point!
@6e0eH732
@6e0eH732 4 месяца назад
Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!
@sunethsandaruwan392
@sunethsandaruwan392 7 месяцев назад
Thank Youu ❤ 🎉 its very clear sir
@teddintersmith9683
@teddintersmith9683 9 месяцев назад
Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?
@yves4360
@yves4360 Год назад
I'm not sure you need 2 prime numbers to start. A prime number and a generator is normally needed if not mistaken.
@sarakavinsky288
@sarakavinsky288 2 года назад
Thank you dude
@aleixfalguerascasals3329
@aleixfalguerascasals3329 11 месяцев назад
Thanks man!
@yaweno9555
@yaweno9555 Год назад
only x, y and n need to be very large for this to be secure. g can be small.
@achyuthvishwamithra
@achyuthvishwamithra 8 месяцев назад
It is also a good thing to know that g is a primitive root modulo of n
@reyzapermanas4859
@reyzapermanas4859 Год назад
Mantap bos
@airbender9593
@airbender9593 2 года назад
Only makes sense and clear if you have a bit of background.
@genatto
@genatto 2 месяца назад
Thanks
@Datcomgaming
@Datcomgaming Год назад
An example of an even higher prime number would be more useful to see and the anology on it. something like n = 101 or something like that and g be like 27
@ethanbrehin220
@ethanbrehin220 4 месяца назад
But what's the point of getting uncrypting k = 10 on the receiving end ? When and who decided that the uncrypted message would be 10 ?
@babthooka
@babthooka 3 месяца назад
Tom's number ( z=4 ) is not prime. Should it not be?
@shivrajpatil1612
@shivrajpatil1612 Год назад
I had a doubt....why was Tom not able to get the value of K right....he used the same g and n right??
@peekaboo6026
@peekaboo6026 3 месяца назад
Because he used a different Z... He'd get the value right if he could guess the X and Y Alice and Bob were using. but they're private.
@seabiscuitthechallenger6899
With the four public numbers and some algebra the key can be uncovered 😈
@marthalubacha9861
@marthalubacha9861 9 месяцев назад
How to find the remainder
@avinashchaubey4958
@avinashchaubey4958 Год назад
Hlo
@goldenIdeas08
@goldenIdeas08 Год назад
I think the hacker needs to get the larger exchanged result in this case 10, 2 are obtained and the hacker going to select 10 and can find the secrete key by having his/her own key starting from 7 like 7,11,13,17..... just use the formula as bob and alliance 10pow7,11,13,...., mod 11 is always 10! so, the exchanged key also keep as a secret. the tutorial is so amazing and wonderful!
@avinashchaubey4958
@avinashchaubey4958 Год назад
U want your video views are more people seen then u can speak with me and i will grow your view on channel
@cherinpiyumantha961
@cherinpiyumantha961 Год назад
thanx .you really saved my day🫡
Далее
8 - Cryptography Basics - SSL TLS Protocol Explained
13:38
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Tragic Moments 😥 #2
00:30
Просмотров 4 млн
1 - Cryptography Basics
15:23
Просмотров 12 тыс.
Elliptic Curve Diffie Hellman
17:48
Просмотров 247 тыс.
Diffie Hellman -the Mathematics bit- Computerphile
7:05
Diffie Hellman problem in CNS in Tamil
10:22
Просмотров 51 тыс.
Intro to the ElGamal Cryptosystem
8:21
Просмотров 10 тыс.