Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack

Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle Attack
Follow my blog: www.chiragbhalodia.com/2021/1...
In this video, I have explained "Man-in-the-middle Attack during Diffie- Hellman Key Exchange Algorithm". Also covered Introduction of Man-in-the Middle Attack and Prevention techniques against Man-in-the-Middle attack.
Topic Covered in this video:
1. What is Man in the middle attack?
2. Purpose of man in the middle attack
3. Purpose of Diffie-hallman Key exchange algorithm
4. How man in the middle attack take place in diffie-hellman key exchange algorithm
0:00 Introduction
0:14 Purpose of man in the middle attack
3:09 Purpose of diffie-hellman key exchange algorithm
3:35 How man in the middle attack take place in diffie-hellman key exchange algorithm
10:28 Prevention against man in the middle attack
#Man_in_the_middle_attack
#Man_in_the_middle_attack_in_Diffie_Hellman_Key_Exchange
#Prevention_against_man_in_the_middle_attack
#chiragbhalodia
#chirag_bhalodia

Пікірлер: 40

  • @n8tjake
    @n8tjakeАй бұрын

    bless your heart, you have saved me. Thank you, I pray for many generations of your family good fortune.

  • @ChiragBhalodia

    @ChiragBhalodia

    Ай бұрын

    Thank you! You too!... Please share with others... Please subscribe my channel... Please follow my blog: chiragbhalodia.com

  • @aditichavan3427
    @aditichavan34273 ай бұрын

    Ur A Channel covers almost Every Important topics of Cryptography And Network systems 💯...helped Me a lot to pass ...Thank You very Much Sir 👌👏👏👏

  • @ChiragBhalodia

    @ChiragBhalodia

    3 ай бұрын

    Thank you so much....!!!! I am very glad to hear that.... Your words motivate me lots... Please share with others.... Please susbcribe my channel.... Please follow my blog: chiragbhalodia.com

  • @jded1346
    @jded13462 ай бұрын

    you should explain why/how Alice and Bob are both aware of (a, q) -> these need to be publicly exchanged first before they can compute Ya and Yb

  • @ChiragBhalodia

    @ChiragBhalodia

    2 ай бұрын

    Before Alice and Bob can start calculating Ya and Yb, they need to have a public "exchange of secrets" session with (a, q) to ensure they're both on the same page.

  • @AliyahandMommyLDR
    @AliyahandMommyLDR3 жыл бұрын

    Very informative video. Thanks for sharing

  • @ChiragBhalodia

    @ChiragBhalodia

    3 жыл бұрын

    Glad it was helpful!....Share with others.... Subscribe my channel...

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @ananyasolanki7476
    @ananyasolanki74762 ай бұрын

    understood everything clearly 👍

  • @ChiragBhalodia

    @ChiragBhalodia

    2 ай бұрын

    Thank u.... Please share with your friends... Please subscribe my channel... follow my blog and check the imp of final exam: www.chiragbhalodia.com/p/network-security.html

  • @chrisloeffler4528
    @chrisloeffler45284 күн бұрын

    I love the fact, that you suggest using HTTPS as a solution to savely generate a shared key, with Diffie-Hellmann. Because in essence HTTPS uses RSA to generate a shared key, wich is then used to encrypt the Messages between Alice and Bob so that they can communicate, without a 3rd Party interfering the messages. And over this secure connection, you would then calculate an other key with Diffie-Hellmann wich is your second shared secret (after the RSA key for HTTPS). So why simply dont use Diffie-Hellmann and use RSA for key Exchange?

  • @anjanaksubash762
    @anjanaksubash7623 жыл бұрын

    Very helpfull.. Thanku sir🙏

  • @ChiragBhalodia

    @ChiragBhalodia

    3 жыл бұрын

    Most welcome..... Share with others.....Subscribe my channel...

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @siddhi1993
    @siddhi19933 жыл бұрын

    nicely explained. : )

  • @ChiragBhalodia

    @ChiragBhalodia

    3 жыл бұрын

    Glad you liked it...!!! Share with others... Subscribe my channel.... Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @ravikantmishra3271
    @ravikantmishra3271 Жыл бұрын

    nice

  • @ChiragBhalodia

    @ChiragBhalodia

    Жыл бұрын

    Thanks...Sorry for late response... Please share with others.... Please subscribe my channel.... Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @yashadake1456
    @yashadake1456 Жыл бұрын

    thanks for diagram!

  • @ChiragBhalodia

    @ChiragBhalodia

    Жыл бұрын

    You are welcome!... Please share with others.... Please subscribe my channel... Please follow my blog: chiragbhalodia.com

  • @ayushantre2331
    @ayushantre23312 жыл бұрын

    how do they calculate k without private key

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Dear Ayush, Watch video properly, step by step. You can get your answer. Still you cannot get answer then ask me again.... Its very easy.... Darth is capture messages from both sides .... For example, Alice think that she is communicate with bob (but actually he is darth) and same way at bob side.

  • @RAVI22ize
    @RAVI22ize10 ай бұрын

    Difference with RSA algorithm pls explain

  • @ChiragBhalodia

    @ChiragBhalodia

    7 ай бұрын

    RSA is used in encrypt the text and diffie hellman mostly used fo key generation... Sorry for late reply... Please sshare with others... Please subscribe my channel... Please follow my blog: chiragbhalodia.com

  • @washingtonmugo2253
    @washingtonmugo22532 жыл бұрын

    was expecting for ways of Preventing MITMA in Diffie-Hellman to have been more on how to advance the protocol eg by use of authentication certificates or something.

  • @washingtonmugo2253

    @washingtonmugo2253

    2 жыл бұрын

    good recap though

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Yeah... Difie-Hellman is not protect against MITM... Some authentication protocols is required to exchange the key....else use kerberos scenario or needham schroeder protocols... Please subscribe my channel.... Please follow my blog: www.chiragbhalodia.com/p/network-security.html

  • @ShopperPlug
    @ShopperPlug3 жыл бұрын

    WTF... this means diffe hellman key exchange is completely useless. I thought diffe hellman key exchange sole purpose was to prevent a man in the meddle attack even when there is one occurring. The secret key is what makes the data un readable by the attacker. from my understanding the attacker takes both parties' public key and provides them the with an attacker public key... that is just slick and scary...

  • @ChiragBhalodia

    @ChiragBhalodia

    3 жыл бұрын

    You are right...its vulnerable..

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @DeRizzlo
    @DeRizzlo5 ай бұрын

    Ok but how does the attacker knows the initial agreed upon values of a and q to generate his own public key

  • @ibrahimalmalki8406

    @ibrahimalmalki8406

    4 ай бұрын

    the values are agreed upon in public

  • @ChiragBhalodia

    @ChiragBhalodia

    2 ай бұрын

    Yeah exactly

  • @DeRizzlo

    @DeRizzlo

    2 ай бұрын

    @@ChiragBhalodia yeah i figured it out, it can be sniffed since its public info and no encryption XD

  • @ChiragBhalodia

    @ChiragBhalodia

    2 ай бұрын

    Yeah exactly

  • @ChiragBhalodia
    @ChiragBhalodia2 жыл бұрын

    Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html

  • @hirenmer2279

    @hirenmer2279

    2 жыл бұрын

    Sir Link is not working

  • @ChiragBhalodia

    @ChiragBhalodia

    2 жыл бұрын

    @@hirenmer2279 Follow my blog: www.chiragbhalodia.com/2021/10/man-in-the-middle-attack-in-diffie-hellman.html