Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003

Поделиться
HTML-код
  • Опубликовано: 8 ноя 2024

Комментарии • 11

  • @learnandroiddev2927
    @learnandroiddev2927 5 месяцев назад +1

    thanks so much
    after understanding your previous video on primitive roots and discrete log problem this just clicked in

    • @SatishCJ
      @SatishCJ  5 месяцев назад

      You are most welcome

  • @ramyaaddanki9665
    @ramyaaddanki9665 Год назад +1

    Excellent Explanation Sir ,pls upload machine learning,data science,daa playlists..

    • @SatishCJ
      @SatishCJ  Год назад

      Sure.. after I learn those subjects in depth I will create video lectures. Thanks for the feedback

  • @lokeshreddysura6836
    @lokeshreddysura6836 2 года назад

    Simple and clear explanation. Superb
    Can you explain HTTPS in the same way from syn packet to the session keys generation(Encrypted data Transfer) which would be very useful in today's world.
    Below are some of components
    CLIENT_EARLY_TRAFFIC_SECRET
    CLIENT_HANDSHAKE_TRAFFIC_SECRET
    SERVER_HANDSHAKE_TRAFFIC_SECRET
    CLIENT_TRAFFIC_SECRET_0
    SERVER_TRAFFIC_SECRET_0
    EXPORTER_SECRET
    MASTER SECRET
    SHARED SECRET
    PRIVATE SECRET and there are many.
    So come you come up with this HTTPS in detail ( not in brief)
    Pleaseee

  • @Romeo-sf7tw
    @Romeo-sf7tw Год назад +2

    Simply beautiful 😭

  • @deveshnandan323
    @deveshnandan323 Год назад +1

    Awesome content Sir

  • @raghusvideo
    @raghusvideo 3 года назад +2

    very nice explanation

  • @bravesingh1677
    @bravesingh1677 7 месяцев назад +1

    great sir

  • @thebigvusi3377
    @thebigvusi3377 3 года назад +1

    But how do we ensure the integrity of the the shared key ?? I mean the middleman can manipulate the key since it’s insecure