Man-in-the-Middle Attack(Bucket-Bridge-Attack) on Diffie Hellman Key Exchange Algorithm with Example

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ม.ค. 2025

ความคิดเห็น • 44

  • @SimpleSnippets
    @SimpleSnippets  5 ปีที่แล้ว +3

    Hey Guys, if you want more such tech educational videos on this channel then please support me by subscribing to this channel & also share it with your friends as it helps me create more content just for you ✌

    • @clayouyang2157
      @clayouyang2157 4 ปีที่แล้ว

      Hi bro.thank you for this videos. can you show me that how to prevent man in the middle attack on diffie hellman?

  • @mohitjaiswal5113
    @mohitjaiswal5113 2 ปีที่แล้ว +1

    this was f*cking beautiful !
    My college professor is so shit that he took 3 classes of 1hr each for both the algorithm and the attack.
    In the end it still wasn't clear.
    Thanks a lot!

    • @pravahanjaivili
      @pravahanjaivili 2 ปีที่แล้ว +1

      @Mohit Jaiswal Couldn't have said it better myself.

    • @abhishekraj1289
      @abhishekraj1289 2 ปีที่แล้ว

      😂Nice...

  • @closer9689
    @closer9689 11 หลายเดือนก่อน

    WOWWWWWWWWWW......I just can't belive this video is actualllyyy 5 years old....coz the content quality brooo...Superb...Grateful i fount this videos❤⭐

  • @Jinzo-
    @Jinzo- 3 ปีที่แล้ว +1

    Best explanation on man in the middle attack i've seen. thank you!

  • @isaacnyarko9134
    @isaacnyarko9134 ปีที่แล้ว +1

    This simple and easy. I now get the conceptualization.

  • @ayseak_
    @ayseak_ 6 ปีที่แล้ว +1

    Thank you, the example and the way you presented it clarified everything!

    • @SimpleSnippets
      @SimpleSnippets  6 ปีที่แล้ว +1

      Thank you so much buddy, very happy to hear this from you 😇 I would request you to please share the videos with your friends and contacts. That'll be the best help and support for everyone ✌️

    • @ayseak_
      @ayseak_ 6 ปีที่แล้ว

      @@SimpleSnippets sure I will do it, do you have video also on Elgamal Encryption?)

    • @SimpleSnippets
      @SimpleSnippets  6 ปีที่แล้ว +1

      No buddy, a lot is left under network security. Actually there are many other pending topics to cover but surely in future I'll add more in the network security playlist ✌️

  • @kamleshgaude6235
    @kamleshgaude6235 4 ปีที่แล้ว +1

    Finally Found A Useful Video... Great Work Man...👍

    • @SimpleSnippets
      @SimpleSnippets  4 ปีที่แล้ว +1

      Thats really great to know buddy🙏 Please support me by sharing the videos and our channel with your friends too. Thats the biggest help and support you can provide 😇

  • @yuvaphalle
    @yuvaphalle 5 ปีที่แล้ว +2

    best of all videos regarding MITM DF

    • @SimpleSnippets
      @SimpleSnippets  5 ปีที่แล้ว

      Thank you so much buddy, Please do share the videos with your friends too. Thats the biggest help & support 😇✌ And definitely subscribe & turn on the notifications for more such tech educational content ✌

  • @shrabanidubey3174
    @shrabanidubey3174 2 ปีที่แล้ว

    Best best best video on this topic 👍👍

  • @ShopperPlug
    @ShopperPlug 3 ปีที่แล้ว +3

    That was an excellent explanation, well done. Is it not possible to implement a detection system? There needs to be a way which can detect this man in the middle attack is happening.

  • @naman6026
    @naman6026 5 ปีที่แล้ว +1

    Simply the best explanation.

    • @SimpleSnippets
      @SimpleSnippets  5 ปีที่แล้ว

      Thank you so much Naman😊
      Glad to hear such a wonderful feedback from you bro ✌️

  • @vijayprajapati7484
    @vijayprajapati7484 4 ปีที่แล้ว +2

    Amazing Explanation Brother

  • @divyamehta2863
    @divyamehta2863 6 ปีที่แล้ว +1

    sir please upload the RSA algorithm as well. You are doing a great job. Made all those algos so simple. i love your teaching

    • @SimpleSnippets
      @SimpleSnippets  6 ปีที่แล้ว +1

      Hey hi Divya, yes yes I'm working on RSA algorithm too. Will upload that video in a few days 😇✌️
      And thank you so much for the positive feedback ya, great to hear that these videos were helpful for you. Please do share them with your friends and contacts. Also a small giveaway coming up soon on the channel since we recently hit 20K subscribers. Stay tuned 😉✌️

  • @DEPPOfficial
    @DEPPOfficial 4 ปีที่แล้ว +1

    nice bro. This ways of teaching is beneficial to us. thank you.

    • @SimpleSnippets
      @SimpleSnippets  4 ปีที่แล้ว +1

      Thanks bro, please do share the videos with your friends too & I hope you have subscribed. Thats the biggest help and support you can provide ✌

    • @DEPPOfficial
      @DEPPOfficial 4 ปีที่แล้ว

      Sure

  • @akshithapanithi2152
    @akshithapanithi2152 8 หลายเดือนก่อน

    The best🔥

  • @gerardohuidobro5811
    @gerardohuidobro5811 2 ปีที่แล้ว

    Great video!

  • @rohitbale15
    @rohitbale15 6 ปีที่แล้ว +1

    Great explanation, Thanks !!!!!!!!!!!

    • @SimpleSnippets
      @SimpleSnippets  6 ปีที่แล้ว

      Thank you so much Rohit. Please share the video with your friends buddy ✌️😇

  • @dhirajkumarrajak3564
    @dhirajkumarrajak3564 4 ปีที่แล้ว +1

    Thanks bro hope to see more😁✌️

  • @raghuuky
    @raghuuky 5 ปีที่แล้ว +1

    good job in explaining.

    • @SimpleSnippets
      @SimpleSnippets  5 ปีที่แล้ว

      Thanks bro 🤟 I would request you to please share the video with your friends too 😊

  • @TheMRUTYUNJAYROUT
    @TheMRUTYUNJAYROUT 4 ปีที่แล้ว +1

    Thank you

  • @kavyasreemg2097
    @kavyasreemg2097 ปีที่แล้ว +1

    Plz do video on hash function

  • @rishithakkar359
    @rishithakkar359 6 ปีที่แล้ว +1

    Nice Doing great brother.... please upload soon DES and AES.

    • @SimpleSnippets
      @SimpleSnippets  6 ปีที่แล้ว

      Hey Rishi, thank you so much buddy. DES algorithm is uploaded already on the channel. And yes today will upload RSA. Also working on AES 😇

  • @nagarjunaaakira8607
    @nagarjunaaakira8607 5 ปีที่แล้ว

    Wow superb

  • @J7777788888
    @J7777788888 4 ปีที่แล้ว

    Sir , just would like to ask can middle man Tom Modify Alice's data or plain-text and send to Bob?

    • @Bci123456
      @Bci123456 4 ปีที่แล้ว

      He can, because he first decrypts it using the key coresponding to Alice's key, then encrypts it using the key between himself and Bob, so practically he can change the message completely. He decrypts messages from both sides then encrypts them using the key corresponding to the other guy. In the process between them, he can listen to those messages, or even change them, as you asked.

  • @shambhuthakur4356
    @shambhuthakur4356 6 ปีที่แล้ว +1

    Upload AES algo too plz...