7 - Cryptography Basics - Diffie-Hellman Key Exchange

Поділитися
Вставка
  • Опубліковано 9 січ 2025

КОМЕНТАРІ • 55

  • @gekobcint4973
    @gekobcint4973 Рік тому +25

    Bro just explained them better than my professor did in two lectures

  • @AmmarMujtabaTariq-zv8zp
    @AmmarMujtabaTariq-zv8zp 11 місяців тому +4

    very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing

  • @devsaranga
    @devsaranga Рік тому +10

    Beautifully condensed a dreary 1 hour lecture into 8 minutes. Fantastic!

  • @worldwar_two2894
    @worldwar_two2894 2 роки тому +18

    Colossal explanation!! I wish UA-cam could let me give this video a "like" infinitely!

  • @WikiSteve
    @WikiSteve 2 роки тому +5

    Incredible. Best explanation of DH I have ever heard.

  • @Boobae_me
    @Boobae_me 6 місяців тому

    came searching to understand for tomorrow's exam and this video has helped me 💯

  • @scotth8083
    @scotth8083 2 роки тому +3

    Thank you. This is very clear and to the point explaination. Very helpful.

  • @syedaliahmed
    @syedaliahmed 2 місяці тому

    This is so simple and amazing, thank you, you are amazing!!!!

  • @giovannipollo
    @giovannipollo 2 роки тому +1

    Amazing video. Great explanation!

  • @paulofduty9790
    @paulofduty9790 Рік тому

    Awesome thanks I was lost forever on this

  • @ricp
    @ricp Рік тому +1

    Great video, great explanation, thanks a lot!

  • @humphreychama1734
    @humphreychama1734 6 місяців тому

    Best video explanation ever!!!

  • @Lilly_Angelin
    @Lilly_Angelin Рік тому

    Thank you so much for such clean explaination!!!

  • @geocybergraphy
    @geocybergraphy 2 роки тому +1

    very very helpful explination, I love it.

  • @yves4360
    @yves4360 2 роки тому

    I'm not sure you need 2 prime numbers to start. A prime number and a generator is normally needed if not mistaken.

  • @luiMallia
    @luiMallia 2 роки тому +3

    Great explanation !

  • @hassanhashemi6478
    @hassanhashemi6478 2 роки тому +1

    Just fell in love with it!

  • @yaweno9555
    @yaweno9555 Рік тому +1

    only x, y and n need to be very large for this to be secure. g can be small.

  • @SthreeH-y4z
    @SthreeH-y4z 5 місяців тому

    There is an issue, what if 'Tom' supposes z=7 then he'll be able to calculate the correct final key i.e. "10" like others do. So if someone chooses/assumes a prime number on his side as well then the game is over LOL ? What's your comment on this CBTVid?

  • @rfc-793-darpa
    @rfc-793-darpa 3 місяці тому

    The eavesdrop can just send his own keys to Alice and Bob when they first exchange keys, so it does not solve MITM attack, is that right?

  • @tarirocoffee5026
    @tarirocoffee5026 Рік тому

    Simple. Direct. Thank you.

  • @abdurrahmanyoosuff4284
    @abdurrahmanyoosuff4284 Рік тому

    Than you very much, may god bless you and guide you.

  • @ethanbrehin220
    @ethanbrehin220 11 місяців тому +1

    But what's the point of getting uncrypting k = 10 on the receiving end ? When and who decided that the uncrypted message would be 10 ?

  • @achyuthvishwamithra
    @achyuthvishwamithra Рік тому

    It is also a good thing to know that g is a primitive root modulo of n

  • @chathekamangazi3913
    @chathekamangazi3913 2 роки тому +1

    Very good explanation

  • @SALMANKHAN-lz4mg
    @SALMANKHAN-lz4mg Рік тому

    Thank You so much for this tutorial ❤❤❤

  • @teddintersmith9683
    @teddintersmith9683 Рік тому

    Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?

  • @WPSSandaruwan
    @WPSSandaruwan Рік тому

    Thank Youu ❤ 🎉 its very clear sir

  • @aadityakumarjha-ju3xg
    @aadityakumarjha-ju3xg 2 місяці тому

    The concept and algorithm is clear. But I have a doubt as every one knows that we will choose a prime number as a private key. So by using hit and trial methods if an attacker tries each prime number then this algorithm is also cracked and the attacker can easily understand the key. As prime numbers are limited so the attacker has to come only a certain number of attempts. I know the computational time is high but by using a high performance system this can be cracked.

  • @airbender9593
    @airbender9593 2 роки тому +1

    Only makes sense and clear if you have a bit of background.

  • @MuhammadNaveed-xl7wq
    @MuhammadNaveed-xl7wq Рік тому

    Excellent explanation.

  • @crawf78
    @crawf78 Рік тому

    Awesome explanation

  • @babthooka
    @babthooka 10 місяців тому

    Tom's number ( z=4 ) is not prime. Should it not be?

  • @Datcomgaming
    @Datcomgaming 2 роки тому

    An example of an even higher prime number would be more useful to see and the anology on it. something like n = 101 or something like that and g be like 27

  • @JoJoYte
    @JoJoYte 2 роки тому +1

    Amazing , on point!

  • @shivrajpatil1612
    @shivrajpatil1612 2 роки тому +4

    I had a doubt....why was Tom not able to get the value of K right....he used the same g and n right??

    • @peekaboo6026
      @peekaboo6026 10 місяців тому +3

      Because he used a different Z... He'd get the value right if he could guess the X and Y Alice and Bob were using. but they're private.

    • @MuhammadHamza-rf6ry
      @MuhammadHamza-rf6ry 7 місяців тому +1

      He was fuckin drunk bruh

    • @sarfarazmasood5547
      @sarfarazmasood5547 7 місяців тому

      Becoz in the equations to calculate K, TOM has no idea about x & y as these were never shared on the network

    • @innocent1040
      @innocent1040 3 місяці тому

      The value of k is absolutely right just thr thing is T didnt get shared both this works when both of them exchange their value to one another , here only tom got value from them didnt give his number orelse it would be correct

    • @BoleDaPole
      @BoleDaPole 2 місяці тому

      Tom needs to mind his own business

  • @seabiscuitthechallenger6899

    With the four public numbers and some algebra the key can be uncovered 😈

  • @marthalubacha9861
    @marthalubacha9861 Рік тому

    How to find the remainder

  • @k.a.1568
    @k.a.1568 6 місяців тому

    But g must be primitive root of n isn't it?

  • @SylviaNtombela-d8t
    @SylviaNtombela-d8t 3 місяці тому

    I'll remember that

  • @reyzapermanas4859
    @reyzapermanas4859 2 роки тому

    Mantap bos

  • @aleixfalguerascasals3329
    @aleixfalguerascasals3329 Рік тому

    Thanks man!

  • @sarakavinsky288
    @sarakavinsky288 2 роки тому

    Thank you dude

  • @belindakumi
    @belindakumi 4 місяці тому

    Ah it's understandable but my Lectrual made it hard 😢

  • @genatto
    @genatto 9 місяців тому

    Thanks

  • @avinashchaubey4958
    @avinashchaubey4958 2 роки тому

    Hlo

  • @avinashchaubey4958
    @avinashchaubey4958 2 роки тому

    U want your video views are more people seen then u can speak with me and i will grow your view on channel

  • @cherinpiyumantha961
    @cherinpiyumantha961 2 роки тому

    thanx .you really saved my day🫡