7 - Cryptography Basics - Diffie-Hellman Key Exchange

Sdílet
Vložit
  • čas přidán 18. 01. 2021
  • In this video you'll learn about Diffie-Hellman key exchange method.

Komentáře • 49

  • @gekobcint4973
    @gekobcint4973 Před 8 měsíci +12

    Bro just explained them better than my professor did in two lectures

  • @worldwar_two2894
    @worldwar_two2894 Před 2 lety +15

    Colossal explanation!! I wish CZcams could let me give this video a "like" infinitely!

  • @devsaranga
    @devsaranga Před rokem +5

    Beautifully condensed a dreary 1 hour lecture into 8 minutes. Fantastic!

  • @AmmarMujtabaTariq-zv8zp
    @AmmarMujtabaTariq-zv8zp Před 6 měsíci +1

    very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing

  • @WikiSteve
    @WikiSteve Před 2 lety +4

    Incredible. Best explanation of DH I have ever heard.

  • @scotth8083
    @scotth8083 Před 2 lety +3

    Thank you. This is very clear and to the point explaination. Very helpful.

  • @Boobae_me
    @Boobae_me Před 27 dny

    came searching to understand for tomorrow's exam and this video has helped me 💯

  • @giovannipollo
    @giovannipollo Před 2 lety +1

    Amazing video. Great explanation!

  • @Lilly_Angelin
    @Lilly_Angelin Před rokem

    Thank you so much for such clean explaination!!!

  • @ricp
    @ricp Před rokem +1

    Great video, great explanation, thanks a lot!

  • @luiMallia
    @luiMallia Před 2 lety +3

    Great explanation !

  • @hassanhashemi6478
    @hassanhashemi6478 Před 2 lety +1

    Just fell in love with it!

  • @tarirocoffee5026
    @tarirocoffee5026 Před rokem

    Simple. Direct. Thank you.

  • @unixguy1396
    @unixguy1396 Před rokem +1

    very very helpful explination, I love it.

  • @humphreychama1734
    @humphreychama1734 Před měsícem

    Best video explanation ever!!!

  • @paulofduty9790
    @paulofduty9790 Před 8 měsíci

    Awesome thanks I was lost forever on this

  • @JoJoYte
    @JoJoYte Před 2 lety +1

    Amazing , on point!

  • @SALMANKHAN-lz4mg
    @SALMANKHAN-lz4mg Před rokem

    Thank You so much for this tutorial ❤❤❤

  • @MuhammadNaveed-xl7wq
    @MuhammadNaveed-xl7wq Před rokem

    Excellent explanation.

  • @chathekamangazi3913
    @chathekamangazi3913 Před 2 lety +1

    Very good explanation

  • @crawf78
    @crawf78 Před rokem

    Awesome explanation

  • @abdurrahmanyoosuff4284
    @abdurrahmanyoosuff4284 Před 6 měsíci

    Than you very much, may god bless you and guide you.

  • @sarakavinsky288
    @sarakavinsky288 Před 2 lety

    Thank you dude

  • @sunethsandaruwan392
    @sunethsandaruwan392 Před 8 měsíci

    Thank Youu ❤ 🎉 its very clear sir

  • @aleixfalguerascasals3329

    Thanks man!

  • @yves4360
    @yves4360 Před rokem

    I'm not sure you need 2 prime numbers to start. A prime number and a generator is normally needed if not mistaken.

  • @yaweno9555
    @yaweno9555 Před rokem +1

    only x, y and n need to be very large for this to be secure. g can be small.

  • @6e0eH732
    @6e0eH732 Před 6 měsíci

    Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!

  • @teddintersmith9683
    @teddintersmith9683 Před 10 měsíci

    Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?

  • @reyzapermanas4859
    @reyzapermanas4859 Před rokem

    Mantap bos

  • @achyuthvishwamithra
    @achyuthvishwamithra Před 10 měsíci

    It is also a good thing to know that g is a primitive root modulo of n

  • @airbender9593
    @airbender9593 Před 2 lety +1

    Only makes sense and clear if you have a bit of background.

  • @Datcomgaming
    @Datcomgaming Před rokem

    An example of an even higher prime number would be more useful to see and the anology on it. something like n = 101 or something like that and g be like 27

  • @genatto
    @genatto Před 3 měsíci

    Thanks

  • @marthalubacha9861
    @marthalubacha9861 Před 11 měsíci

    How to find the remainder

  • @babthooka
    @babthooka Před 5 měsíci

    Tom's number ( z=4 ) is not prime. Should it not be?

  • @k.a.1568
    @k.a.1568 Před měsícem

    But g must be primitive root of n isn't it?

  • @ethanbrehin220
    @ethanbrehin220 Před 6 měsíci

    But what's the point of getting uncrypting k = 10 on the receiving end ? When and who decided that the uncrypted message would be 10 ?

  • @shivrajpatil1612
    @shivrajpatil1612 Před rokem +4

    I had a doubt....why was Tom not able to get the value of K right....he used the same g and n right??

    • @peekaboo6026
      @peekaboo6026 Před 5 měsíci +2

      Because he used a different Z... He'd get the value right if he could guess the X and Y Alice and Bob were using. but they're private.

    • @MuhammadHamza-rf6ry
      @MuhammadHamza-rf6ry Před měsícem

      He was fuckin drunk bruh

    • @sarfarazmasood5547
      @sarfarazmasood5547 Před měsícem

      Becoz in the equations to calculate K, TOM has no idea about x & y as these were never shared on the network

  • @seabiscuitthechallenger6899

    With the four public numbers and some algebra the key can be uncovered 😈

  • @avinashchaubey4958
    @avinashchaubey4958 Před rokem

    Hlo

  • @wisdom1223
    @wisdom1223 Před rokem

    I think the hacker needs to get the larger exchanged result in this case 10, 2 are obtained and the hacker going to select 10 and can find the secrete key by having his/her own key starting from 7 like 7,11,13,17..... just use the formula as bob and alliance 10pow7,11,13,...., mod 11 is always 10! so, the exchanged key also keep as a secret. the tutorial is so amazing and wonderful!

  • @avinashchaubey4958
    @avinashchaubey4958 Před rokem

    U want your video views are more people seen then u can speak with me and i will grow your view on channel

  • @cherinpiyumantha961
    @cherinpiyumantha961 Před rokem

    thanx .you really saved my day🫡