Hey Guys, if you want more such tech educational videos on this channel then please support me by subscribing to this channel & also share it with your friends as it helps me create more content just for you ✌
this was f*cking beautiful ! My college professor is so shit that he took 3 classes of 1hr each for both the algorithm and the attack. In the end it still wasn't clear. Thanks a lot!
Thank you so much buddy, very happy to hear this from you 😇 I would request you to please share the videos with your friends and contacts. That'll be the best help and support for everyone ✌️
No buddy, a lot is left under network security. Actually there are many other pending topics to cover but surely in future I'll add more in the network security playlist ✌️
Thats really great to know buddy🙏 Please support me by sharing the videos and our channel with your friends too. Thats the biggest help and support you can provide 😇
Thank you so much buddy, Please do share the videos with your friends too. Thats the biggest help & support 😇✌ And definitely subscribe & turn on the notifications for more such tech educational content ✌
That was an excellent explanation, well done. Is it not possible to implement a detection system? There needs to be a way which can detect this man in the middle attack is happening.
Hey hi Divya, yes yes I'm working on RSA algorithm too. Will upload that video in a few days 😇✌️ And thank you so much for the positive feedback ya, great to hear that these videos were helpful for you. Please do share them with your friends and contacts. Also a small giveaway coming up soon on the channel since we recently hit 20K subscribers. Stay tuned 😉✌️
He can, because he first decrypts it using the key coresponding to Alice's key, then encrypts it using the key between himself and Bob, so practically he can change the message completely. He decrypts messages from both sides then encrypts them using the key corresponding to the other guy. In the process between them, he can listen to those messages, or even change them, as you asked.
Hey Guys, if you want more such tech educational videos on this channel then please support me by subscribing to this channel & also share it with your friends as it helps me create more content just for you ✌
Hi bro.thank you for this videos. can you show me that how to prevent man in the middle attack on diffie hellman?
this was f*cking beautiful !
My college professor is so shit that he took 3 classes of 1hr each for both the algorithm and the attack.
In the end it still wasn't clear.
Thanks a lot!
@Mohit Jaiswal Couldn't have said it better myself.
😂Nice...
WOWWWWWWWWWW......I just can't belive this video is actualllyyy 5 years old....coz the content quality brooo...Superb...Grateful i fount this videos❤⭐
Best explanation on man in the middle attack i've seen. thank you!
Thank you so much 🙂
This simple and easy. I now get the conceptualization.
Thank you, the example and the way you presented it clarified everything!
Thank you so much buddy, very happy to hear this from you 😇 I would request you to please share the videos with your friends and contacts. That'll be the best help and support for everyone ✌️
@@SimpleSnippets sure I will do it, do you have video also on Elgamal Encryption?)
No buddy, a lot is left under network security. Actually there are many other pending topics to cover but surely in future I'll add more in the network security playlist ✌️
Finally Found A Useful Video... Great Work Man...👍
Thats really great to know buddy🙏 Please support me by sharing the videos and our channel with your friends too. Thats the biggest help and support you can provide 😇
best of all videos regarding MITM DF
Thank you so much buddy, Please do share the videos with your friends too. Thats the biggest help & support 😇✌ And definitely subscribe & turn on the notifications for more such tech educational content ✌
Best best best video on this topic 👍👍
That was an excellent explanation, well done. Is it not possible to implement a detection system? There needs to be a way which can detect this man in the middle attack is happening.
Simply the best explanation.
Thank you so much Naman😊
Glad to hear such a wonderful feedback from you bro ✌️
Amazing Explanation Brother
Thank you so much 🙂
sir please upload the RSA algorithm as well. You are doing a great job. Made all those algos so simple. i love your teaching
Hey hi Divya, yes yes I'm working on RSA algorithm too. Will upload that video in a few days 😇✌️
And thank you so much for the positive feedback ya, great to hear that these videos were helpful for you. Please do share them with your friends and contacts. Also a small giveaway coming up soon on the channel since we recently hit 20K subscribers. Stay tuned 😉✌️
nice bro. This ways of teaching is beneficial to us. thank you.
Thanks bro, please do share the videos with your friends too & I hope you have subscribed. Thats the biggest help and support you can provide ✌
Sure
The best🔥
Great video!
Great explanation, Thanks !!!!!!!!!!!
Thank you so much Rohit. Please share the video with your friends buddy ✌️😇
Thanks bro hope to see more😁✌️
Sure 👍
good job in explaining.
Thanks bro 🤟 I would request you to please share the video with your friends too 😊
Thank you
Plz do video on hash function
Nice Doing great brother.... please upload soon DES and AES.
Hey Rishi, thank you so much buddy. DES algorithm is uploaded already on the channel. And yes today will upload RSA. Also working on AES 😇
Wow superb
Sir , just would like to ask can middle man Tom Modify Alice's data or plain-text and send to Bob?
He can, because he first decrypts it using the key coresponding to Alice's key, then encrypts it using the key between himself and Bob, so practically he can change the message completely. He decrypts messages from both sides then encrypts them using the key corresponding to the other guy. In the process between them, he can listen to those messages, or even change them, as you asked.
Upload AES algo too plz...