Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack

Поделиться
HTML-код
  • Опубликовано: 22 янв 2025

Комментарии • 43

  • @n8tjake
    @n8tjake 7 месяцев назад +4

    bless your heart, you have saved me. Thank you, I pray for many generations of your family good fortune.

    • @ChiragBhalodia
      @ChiragBhalodia  7 месяцев назад +1

      Thank you! You too!...
      Please share with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @aditichavan3427
    @aditichavan3427 9 месяцев назад +2

    Ur A Channel covers almost Every Important topics of Cryptography And Network systems 💯...helped Me a lot to pass ...Thank You very Much Sir 👌👏👏👏

    • @ChiragBhalodia
      @ChiragBhalodia  8 месяцев назад

      Thank you so much....!!!!
      I am very glad to hear that.... Your words motivate me lots...
      Please share with others....
      Please susbcribe my channel....
      Please follow my blog: chiragbhalodia.com

  • @ananyasolanki7476
    @ananyasolanki7476 8 месяцев назад +1

    understood everything clearly 👍

    • @ChiragBhalodia
      @ChiragBhalodia  8 месяцев назад

      Thank u.... Please share with your friends...
      Please subscribe my channel...
      follow my blog and check the imp of final exam: www.chiragbhalodia.com/p/network-security.html

  • @jded1346
    @jded1346 8 месяцев назад +3

    you should explain why/how Alice and Bob are both aware of (a, q) -> these need to be publicly exchanged first before they can compute Ya and Yb

    • @ChiragBhalodia
      @ChiragBhalodia  7 месяцев назад +1

      Before Alice and Bob can start calculating Ya and Yb, they need to have a public "exchange of secrets" session with (a, q) to ensure they're both on the same page.

  • @AliyahandMommyLDR
    @AliyahandMommyLDR 3 года назад +2

    Very informative video. Thanks for sharing

    • @ChiragBhalodia
      @ChiragBhalodia  3 года назад

      Glad it was helpful!....Share with others.... Subscribe my channel...

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @chrisloeffler4528
    @chrisloeffler4528 5 месяцев назад +1

    I love the fact, that you suggest using HTTPS as a solution to savely generate a shared key, with Diffie-Hellmann.
    Because in essence HTTPS uses RSA to generate a shared key, wich is then used to encrypt the Messages between Alice and Bob so that they can communicate, without a 3rd Party interfering the messages. And over this secure connection, you would then calculate an other key with Diffie-Hellmann wich is your second shared secret (after the RSA key for HTTPS).
    So why simply dont use Diffie-Hellmann and use RSA for key Exchange?

    • @ChiragBhalodia
      @ChiragBhalodia  2 месяца назад

      You are welcome...
      Please share with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @anjanaksubash762
    @anjanaksubash762 3 года назад +1

    Very helpfull.. Thanku sir🙏

    • @ChiragBhalodia
      @ChiragBhalodia  3 года назад +1

      Most welcome..... Share with others.....Subscribe my channel...

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @Valueinvestment22
    @Valueinvestment22 Год назад +2

    Difference with RSA algorithm pls explain

    • @ChiragBhalodia
      @ChiragBhalodia  Год назад

      RSA is used in encrypt the text and diffie hellman mostly used fo key generation...
      Sorry for late reply...
      Please sshare with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @Purple-e9c
    @Purple-e9c 3 года назад +2

    nicely explained. : )

    • @ChiragBhalodia
      @ChiragBhalodia  3 года назад

      Glad you liked it...!!! Share with others... Subscribe my channel....
      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @shriji_nakrani
    @shriji_nakrani Месяц назад +1

    sir man in middle is cyber attack and meet in middle is cryptography attack NOT same

    • @ChiragBhalodia
      @ChiragBhalodia  Месяц назад

      Both are same....
      Please share this video with others...
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @yashadake1456
    @yashadake1456 Год назад +2

    thanks for diagram!

    • @ChiragBhalodia
      @ChiragBhalodia  Год назад

      You are welcome!... Please share with others....
      Please subscribe my channel...
      Please follow my blog: chiragbhalodia.com

  • @washingtonmugo2253
    @washingtonmugo2253 2 года назад +1

    was expecting for ways of Preventing MITMA in Diffie-Hellman to have been more on how to advance the protocol eg by use of authentication certificates or something.

    • @washingtonmugo2253
      @washingtonmugo2253 2 года назад

      good recap though

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад +1

      Yeah... Difie-Hellman is not protect against MITM... Some authentication protocols is required to exchange the key....else use kerberos scenario or needham schroeder protocols...
      Please subscribe my channel....
      Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @ayushantre2331
    @ayushantre2331 2 года назад +1

    how do they calculate k without private key

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад

      Dear Ayush, Watch video properly, step by step. You can get your answer. Still you cannot get answer then ask me again.... Its very easy.... Darth is capture messages from both sides ....
      For example, Alice think that she is communicate with bob (but actually he is darth) and same way at bob side.

  • @DeRizzlo
    @DeRizzlo 10 месяцев назад

    Ok but how does the attacker knows the initial agreed upon values of a and q to generate his own public key

    • @ibrahimalmalki8406
      @ibrahimalmalki8406 10 месяцев назад +1

      the values are agreed upon in public

    • @ChiragBhalodia
      @ChiragBhalodia  8 месяцев назад

      Yeah exactly

    • @DeRizzlo
      @DeRizzlo 8 месяцев назад +1

      @@ChiragBhalodia yeah i figured it out, it can be sniffed since its public info and no encryption XD

    • @ChiragBhalodia
      @ChiragBhalodia  7 месяцев назад

      Yeah exactly

  • @ShopperPlug
    @ShopperPlug 3 года назад +5

    WTF... this means diffe hellman key exchange is completely useless. I thought diffe hellman key exchange sole purpose was to prevent a man in the meddle attack even when there is one occurring. The secret key is what makes the data un readable by the attacker. from my understanding the attacker takes both parties' public key and provides them the with an attacker public key... that is just slick and scary...

    • @ChiragBhalodia
      @ChiragBhalodia  3 года назад +4

      You are right...its vulnerable..

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад +2

      Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @ravikantmishra3271
    @ravikantmishra3271 2 года назад +1

    nice

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад

      Thanks...Sorry for late response...
      Please share with others....
      Please subscribe my channel....
      Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @ChiragBhalodia
    @ChiragBhalodia  3 года назад +1

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

    • @hirenmer2279
      @hirenmer2279 2 года назад

      Sir Link is not working

    • @ChiragBhalodia
      @ChiragBhalodia  2 года назад +1

      @@hirenmer2279 Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html