Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack

preview_player
Показать описание
Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack

In this video, I have explained "Man-in-the-middle Attack during Diffie- Hellman Key Exchange Algorithm". Also covered Introduction of Man-in-the Middle Attack and Prevention techniques against Man-in-the-Middle attack.

Topic Covered in this video:
1. What is Man in the middle attack?
2. Purpose of man in the middle attack
3. Purpose of Diffie-hallman Key exchange algorithm
4. How man in the middle attack take place in diffie-hellman key exchange algorithm

0:00 Introduction
0:14 Purpose of man in the middle attack
3:09 Purpose of diffie-hellman key exchange algorithm
3:35 How man in the middle attack take place in diffie-hellman key exchange algorithm
10:28 Prevention against man in the middle attack

#Man_in_the_middle_attack
#Man_in_the_middle_attack_in_Diffie_Hellman_Key_Exchange
#Prevention_against_man_in_the_middle_attack
#chiragbhalodia
#chirag_bhalodia
Рекомендации по теме
Комментарии
Автор

bless your heart, you have saved me. Thank you, I pray for many generations of your family good fortune.

ntjake
Автор

Ur A Channel covers almost Every Important topics of Cryptography And Network systems 💯...helped Me a lot to pass ...Thank You very Much Sir 👌👏👏👏

aditichavan
Автор

you should explain why/how Alice and Bob are both aware of (a, q) -> these need to be publicly exchanged first before they can compute Ya and Yb

jded
Автор

Very informative video. Thanks for sharing

AliyahandMommyLDR
Автор

I love the fact, that you suggest using HTTPS as a solution to savely generate a shared key, with Diffie-Hellmann.
Because in essence HTTPS uses RSA to generate a shared key, wich is then used to encrypt the Messages between Alice and Bob so that they can communicate, without a 3rd Party interfering the messages. And over this secure connection, you would then calculate an other key with Diffie-Hellmann wich is your second shared secret (after the RSA key for HTTPS).

So why simply dont use Diffie-Hellmann and use RSA for key Exchange?

chrisloeffler
Автор

was expecting for ways of Preventing MITMA in Diffie-Hellman to have been more on how to advance the protocol eg by use of authentication certificates or something.

washingtonmugo
Автор

Difference with RSA algorithm pls explain

RAVIize
Автор

how do they calculate k without private key

ayushantre
Автор

WTF... this means diffe hellman key exchange is completely useless. I thought diffe hellman key exchange sole purpose was to prevent a man in the meddle attack even when there is one occurring. The secret key is what makes the data un readable by the attacker. from my understanding the attacker takes both parties' public key and provides them the with an attacker public key... that is just slick and scary...

ShopperPlug
Автор

Ok but how does the attacker knows the initial agreed upon values of a and q to generate his own public key

DeRizzlo