Meet in the Middle attack | Double DES | Easy Explanation

preview_player
Показать описание
Meet in the Middle attack | Double DES | Easy Explanation

#MITM #Cryptography #NetworkSecurity #Encryption #Cipher #s-box #DoubleDES #BruteForce

Thanks for watching.
Do like , share and subscribe
------------------------------------------------------------------------------------------------------------
# To watch lecture videos on Cryptography:

# To watch lecture videos on 10th Maths:

# To watch lecture videos on Vedic Maths:

# To watch lecture videos on Digital Electronics:

# To watch lecture videos on Information Theory/Coding Theory:

#To watch lecture videos on Electronics:

# To watch lecture videos on 12th Maths:

# To Subscribe:

# Follow Naadopaasana channel - Classical Music, Spiritual discourse channel

---------------------------------------------------------------------------------------
Рекомендации по теме
Комментарии
Автор

My right ear has learnt everything
.
.
.
(jokes apart, good lesson)

commracA
Автор

Apart from the audio quality, you explained the concept very well sir! Thank you for your work!

flaviantanase
Автор

Wow, thank you sir for this easy explanation, you did it much much better than my professor!

LLNB
Автор

Great video! One clarification, does this mean that the security of triple-DES will be 2^112 and not 2^168 because of the same explanation (even though in triple DES we have E-D-E and not D-E-D)?

shivangitomar
Автор

Well done. You explained that really well.

martinsage
Автор

Is meet in the middle attack an attack on authentication or public- key encryption ? Thanks

mikejosh
Автор

explained well, the only problem is video and audio quality which is a little low.

kunwarprashant
Автор

This helped me so much, thank you sir for the great explanation!

ponypaw
Автор

Thanks for your valuable time. Much appreciated!!

anupshende
Автор

How does the attacker obtain the intermediate cipher-text which is X in this case?
How does it also obtain the plain-text which is PT in this case?

Do we assume that he/she already has at least one set of PT, X and CT?

By the way, thanks for your time :)

caglayandokme
Автор

Thank you sir, this is super clear :D !!

sharon
Автор

Could you please explain with example how to find the key when ciper text and plain text is know..
Eg :
Cipher text = Plain Text
BE5C90827BF5FAC7 = J

Can you explain this, how to find the key

MyWorldandHeaven