Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ธ.ค. 2024

ความคิดเห็น •

  • @n8tjake
    @n8tjake 6 หลายเดือนก่อน +4

    bless your heart, you have saved me. Thank you, I pray for many generations of your family good fortune.

    • @ChiragBhalodia
      @ChiragBhalodia  6 หลายเดือนก่อน +1

      Thank you! You too!...
      Please share with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @aditichavan3427
    @aditichavan3427 8 หลายเดือนก่อน +2

    Ur A Channel covers almost Every Important topics of Cryptography And Network systems 💯...helped Me a lot to pass ...Thank You very Much Sir 👌👏👏👏

    • @ChiragBhalodia
      @ChiragBhalodia  8 หลายเดือนก่อน

      Thank you so much....!!!!
      I am very glad to hear that.... Your words motivate me lots...
      Please share with others....
      Please susbcribe my channel....
      Please follow my blog: chiragbhalodia.com

  • @jded1346
    @jded1346 7 หลายเดือนก่อน +3

    you should explain why/how Alice and Bob are both aware of (a, q) -> these need to be publicly exchanged first before they can compute Ya and Yb

    • @ChiragBhalodia
      @ChiragBhalodia  6 หลายเดือนก่อน +1

      Before Alice and Bob can start calculating Ya and Yb, they need to have a public "exchange of secrets" session with (a, q) to ensure they're both on the same page.

  • @ananyasolanki7476
    @ananyasolanki7476 7 หลายเดือนก่อน +1

    understood everything clearly 👍

    • @ChiragBhalodia
      @ChiragBhalodia  7 หลายเดือนก่อน

      Thank u.... Please share with your friends...
      Please subscribe my channel...
      follow my blog and check the imp of final exam: www.chiragbhalodia.com/p/network-security.html

  • @AliyahandMommyLDR
    @AliyahandMommyLDR 3 ปีที่แล้ว +2

    Very informative video. Thanks for sharing

    • @ChiragBhalodia
      @ChiragBhalodia  3 ปีที่แล้ว

      Glad it was helpful!....Share with others.... Subscribe my channel...

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @shriji_nakrani
    @shriji_nakrani 14 วันที่ผ่านมา +1

    sir man in middle is cyber attack and meet in middle is cryptography attack NOT same

    • @ChiragBhalodia
      @ChiragBhalodia  8 วันที่ผ่านมา

      Both are same....
      Please share this video with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @chrisloeffler4528
    @chrisloeffler4528 4 หลายเดือนก่อน +1

    I love the fact, that you suggest using HTTPS as a solution to savely generate a shared key, with Diffie-Hellmann.
    Because in essence HTTPS uses RSA to generate a shared key, wich is then used to encrypt the Messages between Alice and Bob so that they can communicate, without a 3rd Party interfering the messages. And over this secure connection, you would then calculate an other key with Diffie-Hellmann wich is your second shared secret (after the RSA key for HTTPS).
    So why simply dont use Diffie-Hellmann and use RSA for key Exchange?

    • @ChiragBhalodia
      @ChiragBhalodia  หลายเดือนก่อน

      You are welcome...
      Please share with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @anjanaksubash762
    @anjanaksubash762 3 ปีที่แล้ว +1

    Very helpfull.. Thanku sir🙏

    • @ChiragBhalodia
      @ChiragBhalodia  3 ปีที่แล้ว +1

      Most welcome..... Share with others.....Subscribe my channel...

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @Purple-e9c
    @Purple-e9c 3 ปีที่แล้ว +2

    nicely explained. : )

    • @ChiragBhalodia
      @ChiragBhalodia  3 ปีที่แล้ว

      Glad you liked it...!!! Share with others... Subscribe my channel....
      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @Valueinvestment22
    @Valueinvestment22 ปีที่แล้ว +2

    Difference with RSA algorithm pls explain

    • @ChiragBhalodia
      @ChiragBhalodia  ปีที่แล้ว

      RSA is used in encrypt the text and diffie hellman mostly used fo key generation...
      Sorry for late reply...
      Please sshare with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @yashadake1456
    @yashadake1456 ปีที่แล้ว +2

    thanks for diagram!

    • @ChiragBhalodia
      @ChiragBhalodia  ปีที่แล้ว

      You are welcome!... Please share with others....
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @ravikantmishra3271
    @ravikantmishra3271 ปีที่แล้ว +1

    nice

    • @ChiragBhalodia
      @ChiragBhalodia  ปีที่แล้ว

      Thanks...Sorry for late response...
      Please share with others....
      Please subscribe my channel....
      Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @ShopperPlug
    @ShopperPlug 3 ปีที่แล้ว +5

    WTF... this means diffe hellman key exchange is completely useless. I thought diffe hellman key exchange sole purpose was to prevent a man in the meddle attack even when there is one occurring. The secret key is what makes the data un readable by the attacker. from my understanding the attacker takes both parties' public key and provides them the with an attacker public key... that is just slick and scary...

    • @ChiragBhalodia
      @ChiragBhalodia  3 ปีที่แล้ว +4

      You are right...its vulnerable..

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว +2

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @ayushantre2331
    @ayushantre2331 2 ปีที่แล้ว +1

    how do they calculate k without private key

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว

      Dear Ayush, Watch video properly, step by step. You can get your answer. Still you cannot get answer then ask me again.... Its very easy.... Darth is capture messages from both sides ....
      For example, Alice think that she is communicate with bob (but actually he is darth) and same way at bob side.

  • @washingtonmugo2253
    @washingtonmugo2253 2 ปีที่แล้ว +1

    was expecting for ways of Preventing MITMA in Diffie-Hellman to have been more on how to advance the protocol eg by use of authentication certificates or something.

    • @washingtonmugo2253
      @washingtonmugo2253 2 ปีที่แล้ว

      good recap though

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว +1

      Yeah... Difie-Hellman is not protect against MITM... Some authentication protocols is required to exchange the key....else use kerberos scenario or needham schroeder protocols...
      Please subscribe my channel....
      Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @DeRizzlo
    @DeRizzlo 9 หลายเดือนก่อน

    Ok but how does the attacker knows the initial agreed upon values of a and q to generate his own public key

    • @ibrahimalmalki8406
      @ibrahimalmalki8406 9 หลายเดือนก่อน +1

      the values are agreed upon in public

    • @ChiragBhalodia
      @ChiragBhalodia  7 หลายเดือนก่อน

      Yeah exactly

    • @DeRizzlo
      @DeRizzlo 7 หลายเดือนก่อน +1

      @@ChiragBhalodia yeah i figured it out, it can be sniffed since its public info and no encryption XD

    • @ChiragBhalodia
      @ChiragBhalodia  6 หลายเดือนก่อน

      Yeah exactly

  • @ChiragBhalodia
    @ChiragBhalodia  3 ปีที่แล้ว +1

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

    • @hirenmer2279
      @hirenmer2279 2 ปีที่แล้ว

      Sir Link is not working

    • @ChiragBhalodia
      @ChiragBhalodia  2 ปีที่แล้ว +1

      @@hirenmer2279 Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html