Тёмный

Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack 

Chirag Bhalodia
Подписаться 19 тыс.
Просмотров 51 тыс.
50% 1

Опубликовано:

 

24 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 40   
@n8tjake
@n8tjake 2 месяца назад
bless your heart, you have saved me. Thank you, I pray for many generations of your family good fortune.
@ChiragBhalodia
@ChiragBhalodia Месяц назад
Thank you! You too!... Please share with others... Please subscribe my channel... Please follow my blog: chiragbhalodia.com
@jded1346
@jded1346 3 месяца назад
you should explain why/how Alice and Bob are both aware of (a, q) -> these need to be publicly exchanged first before they can compute Ya and Yb
@ChiragBhalodia
@ChiragBhalodia 2 месяца назад
Before Alice and Bob can start calculating Ya and Yb, they need to have a public "exchange of secrets" session with (a, q) to ensure they're both on the same page.
@aditichavan3427
@aditichavan3427 4 месяца назад
Ur A Channel covers almost Every Important topics of Cryptography And Network systems 💯...helped Me a lot to pass ...Thank You very Much Sir 👌👏👏👏
@ChiragBhalodia
@ChiragBhalodia 3 месяца назад
Thank you so much....!!!! I am very glad to hear that.... Your words motivate me lots... Please share with others.... Please susbcribe my channel.... Please follow my blog: chiragbhalodia.com
@chrisloeffler4528
@chrisloeffler4528 23 дня назад
I love the fact, that you suggest using HTTPS as a solution to savely generate a shared key, with Diffie-Hellmann. Because in essence HTTPS uses RSA to generate a shared key, wich is then used to encrypt the Messages between Alice and Bob so that they can communicate, without a 3rd Party interfering the messages. And over this secure connection, you would then calculate an other key with Diffie-Hellmann wich is your second shared secret (after the RSA key for HTTPS). So why simply dont use Diffie-Hellmann and use RSA for key Exchange?
@ananyasolanki7476
@ananyasolanki7476 3 месяца назад
understood everything clearly 👍
@ChiragBhalodia
@ChiragBhalodia 3 месяца назад
Thank u.... Please share with your friends... Please subscribe my channel... follow my blog and check the imp of final exam: www.chiragbhalodia.com/p/network-security.html
@yashadake1456
@yashadake1456 Год назад
thanks for diagram!
@ChiragBhalodia
@ChiragBhalodia Год назад
You are welcome!... Please share with others.... Please subscribe my channel... Please follow my blog: chiragbhalodia.com
@AliyahandMommyLDR
@AliyahandMommyLDR 3 года назад
Very informative video. Thanks for sharing
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Glad it was helpful!....Share with others.... Subscribe my channel...
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@siddhi1993
@siddhi1993 3 года назад
nicely explained. : )
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Glad you liked it...!!! Share with others... Subscribe my channel.... Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@anjanaksubash762
@anjanaksubash762 3 года назад
Very helpfull.. Thanku sir🙏
@ChiragBhalodia
@ChiragBhalodia 3 года назад
Most welcome..... Share with others.....Subscribe my channel...
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@washingtonmugo2253
@washingtonmugo2253 2 года назад
was expecting for ways of Preventing MITMA in Diffie-Hellman to have been more on how to advance the protocol eg by use of authentication certificates or something.
@washingtonmugo2253
@washingtonmugo2253 2 года назад
good recap though
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Yeah... Difie-Hellman is not protect against MITM... Some authentication protocols is required to exchange the key....else use kerberos scenario or needham schroeder protocols... Please subscribe my channel.... Please follow my blog: www.chiragbhalodia.com/p/network-security.html
@RAVI22ize
@RAVI22ize 11 месяцев назад
Difference with RSA algorithm pls explain
@ChiragBhalodia
@ChiragBhalodia 8 месяцев назад
RSA is used in encrypt the text and diffie hellman mostly used fo key generation... Sorry for late reply... Please sshare with others... Please subscribe my channel... Please follow my blog: chiragbhalodia.com
@ravikantmishra3271
@ravikantmishra3271 Год назад
nice
@ChiragBhalodia
@ChiragBhalodia Год назад
Thanks...Sorry for late response... Please share with others.... Please subscribe my channel.... Please follow my blog: www.chiragbhalodia.com/p/network-security.html
@ShopperPlug
@ShopperPlug 3 года назад
WTF... this means diffe hellman key exchange is completely useless. I thought diffe hellman key exchange sole purpose was to prevent a man in the meddle attack even when there is one occurring. The secret key is what makes the data un readable by the attacker. from my understanding the attacker takes both parties' public key and provides them the with an attacker public key... that is just slick and scary...
@ChiragBhalodia
@ChiragBhalodia 3 года назад
You are right...its vulnerable..
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@ayushantre2331
@ayushantre2331 2 года назад
how do they calculate k without private key
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Dear Ayush, Watch video properly, step by step. You can get your answer. Still you cannot get answer then ask me again.... Its very easy.... Darth is capture messages from both sides .... For example, Alice think that she is communicate with bob (but actually he is darth) and same way at bob side.
@DeRizzlo
@DeRizzlo 5 месяцев назад
Ok but how does the attacker knows the initial agreed upon values of a and q to generate his own public key
@ibrahimalmalki8406
@ibrahimalmalki8406 5 месяцев назад
the values are agreed upon in public
@ChiragBhalodia
@ChiragBhalodia 3 месяца назад
Yeah exactly
@DeRizzlo
@DeRizzlo 3 месяца назад
@@ChiragBhalodia yeah i figured it out, it can be sniffed since its public info and no encryption XD
@ChiragBhalodia
@ChiragBhalodia 2 месяца назад
Yeah exactly
@ChiragBhalodia
@ChiragBhalodia 2 года назад
Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
@hirenmer2279
@hirenmer2279 2 года назад
Sir Link is not working
@ChiragBhalodia
@ChiragBhalodia 2 года назад
@@hirenmer2279 Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html
Далее
#JasonStatham being iconic
00:38
Просмотров 379 тыс.
Cristiano ronaldo VS Tibo Inshape ! 😱😱
00:20
Просмотров 3,1 млн
Key Exchange Problems - Computerphile
9:18
Просмотров 355 тыс.
Diffie-Hellman Key Exchange: How to Share a Secret
9:09
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
#JasonStatham being iconic
00:38
Просмотров 379 тыс.