7 - Cryptography Basics - Diffie-Hellman Key Exchange

preview_player
Показать описание
In this video you'll learn about Diffie-Hellman key exchange method.
Рекомендации по теме
Комментарии
Автор

Bro just explained them better than my professor did in two lectures

gekobcint
Автор

Colossal explanation!! I wish YouTube could let me give this video a "like" infinitely!

worldwar_two
Автор

Beautifully condensed a dreary 1 hour lecture into 8 minutes. Fantastic!

devsaranga
Автор

very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing

AmmarMujtabaTariq-zvzp
Автор

Incredible. Best explanation of DH I have ever heard.

WikiSteve
Автор

came searching to understand for tomorrow's exam and this video has helped me 💯

Boobae_me
Автор

Thank you. This is very clear and to the point explaination. Very helpful.

scotth
Автор

Awesome thanks I was lost forever on this

paulofduty
Автор

Great video, great explanation, thanks a lot!

ricp
Автор

very very helpful explination, I love it.

unixguy
Автор

Thank you so much for such clean explaination!!!

Lilly_Angelin
Автор

Than you very much, may god bless you and guide you.

abdurrahmanyoosuff
Автор

only x, y and n need to be very large for this to be secure. g can be small.

yaweno
Автор

There is an issue, what if 'Tom' supposes z=7 then he'll be able to calculate the correct final key i.e. "10" like others do. So if someone chooses/assumes a prime number on his side as well then the game is over LOL ? What's your comment on this CBTVid?

Muhammad_Hannan
Автор

Thank You so much for this tutorial ❤❤❤

SALMANKHAN-lzmg
Автор

I'm not sure you need 2 prime numbers to start. A prime number and a generator is normally needed if not mistaken.

yves
Автор

I had a doubt....why was Tom not able to get the value of K right....he used the same g and n right??

shivrajpatil
Автор

Only makes sense and clear if you have a bit of background.

airbender
Автор

It is also a good thing to know that g is a primitive root modulo of n

achyuthvishwamithra
Автор

Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?

teddintersmith