Explaining the Diffie-Hellman Key Exchange

  Рет қаралды 80,407

F5 DevCentral

F5 DevCentral

Күн бұрын

Пікірлер
@travisblack9519
@travisblack9519 5 жыл бұрын
This is the most well explained and best presented lecture I have seen on youtube, and I have watched many. Nice job.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@elultimopujilense
@elultimopujilense 4 жыл бұрын
yeah right? i watched the computerphile explanation, and I didnt got it. I thought i wasnt paying enough attention, but now that I finally get it I can say that those guys made many mistakes in their video and didnt explained the topic correctly.
@rahulmathew8713
@rahulmathew8713 5 жыл бұрын
The best and simplest explanation ever on youtube for Diffie-Hellman key. No unnecessary maths symbols were used and the concept was explained with very simple example and to the point. This is the kind of teachers we wish to have in Colleges.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@marcing4287
@marcing4287 5 жыл бұрын
Watched so many videos and read quite few pages with an explanation... and finally, someone explained this really clearly ! good job
@devcentral
@devcentral 5 жыл бұрын
glad it was helpful!!
@minhsp3
@minhsp3 2 жыл бұрын
He is very good: 1) No Indian accent 2) very logical 3) He should say why the shared key is needed. The reason is that a and b have to have the same key to encrypt and decrypt 4) But they have to meet in a restaurant to share that key 5) Impractical 6) then they have to go through all these steps to arrive at the common key, 18 in this example Thank you, the best video on this topic
@gustavogutierrez368
@gustavogutierrez368 2 жыл бұрын
How do they share the secret key?
@fufu4351
@fufu4351 10 ай бұрын
@@gustavogutierrez368 There is no secret key. The keys 'p' and 'g' are ok to be exposed. It is the secret values 'a' and 'b', which never are exchanged in between the client and the server, that gives the secrecy.
@rahulmathew8713
@rahulmathew8713 5 жыл бұрын
Pure and simple to the point and no stupid maths symbols. Professor should learn from you.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@rahulmathew8713
@rahulmathew8713 5 жыл бұрын
Simple and straight to the point and no maths symbols involved . Professors should learn from you.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@hanf4415
@hanf4415 3 жыл бұрын
Here from Cyber Security and you explained it extremely well than my professor did or ever will. I'm just upset for the tuition I'm paying. Thanks a lot!!
@devcentral
@devcentral 3 жыл бұрын
Glad you enjoyed it!
@Abdulaziz-fg3mh
@Abdulaziz-fg3mh 5 жыл бұрын
now I know how Diffie Helman key exchange work! thank you so much, man
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed the video!
@kiruthikagopi9034
@kiruthikagopi9034 6 жыл бұрын
Awesome. All these days I was just hearing DHE DHE... around . Now I know what it actually is. Thank you.
@devcentral
@devcentral 6 жыл бұрын
Glad you found it helpful!
@LFSPharaoh
@LFSPharaoh 2 жыл бұрын
I love these videos; the math always blows my mind. It just, works. So beautiful.
@devcentral
@devcentral 2 жыл бұрын
We're glad you enjoy these and we appreciate the comment!
@ShopperPlug
@ShopperPlug 3 жыл бұрын
that was the best explanation on the subject on youtube.
@devcentral
@devcentral 3 жыл бұрын
glad you enjoyed it!
@abhinavkothari5118
@abhinavkothari5118 5 жыл бұрын
Makes it so easy to understand. Exceptional explanation.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@brianward17
@brianward17 4 жыл бұрын
Thank you so much. A lot easier to understand then the way my lecture tried to teach
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@kwatta1979
@kwatta1979 2 жыл бұрын
Very explanatory and i love it. When i was reading it from my pdf it was difficult for me to understand but here is been made very simple. Good job
@devcentral
@devcentral 2 жыл бұрын
Appreciate the comment and glad you enjoyed the video!
@souravmukherjee3978
@souravmukherjee3978 3 жыл бұрын
excellent explanation on diffie hellman key exchange.
@devcentral
@devcentral 3 жыл бұрын
Glad you enjoyed it!
@patmull1
@patmull1 3 жыл бұрын
Great stuff and easy understandable. Only thing I may not get was that Bulk encryption part. I've tried to google it but it seems to me like confusing term. Can somebody help me and explain me purpose of that? Thanks.
@devcentral
@devcentral 3 жыл бұрын
Great question Patrik! The bulk encryption is the encryption used by the client and server to send/receive messages during the session. In the TLS handshake, the purpose of the key exchange is to get a shared, symmetric encryption key for the client and server to use for the duration of the session. When we say "bulk encryption", we are referring to the symmetric encryption used by the client and server (typically AES). Here's a video on the TLS handshake that might help a little more: kzbin.info/www/bejne/maa1YWivlJd6rsU
@patmull1
@patmull1 3 жыл бұрын
@@devcentral Fantastic! Thanks.
@99thompsi
@99thompsi 4 жыл бұрын
I decided during lockdown I would understand the encryption techniques used all of the time. This has helped hugely. Thank you so much!
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed the video!
@Jorsherr
@Jorsherr 2 жыл бұрын
Thanks. Always helps to see it worked out.
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@LetsNerdIt
@LetsNerdIt 2 жыл бұрын
Perfect! I was looking for a number example of how this works and you nailed it! Thank you for making the math clear, rather than just mixing paint... although the paint analogy makes the idea simple, it make the math side of it harder to understand. Sub well deserved
@devcentral
@devcentral 2 жыл бұрын
Appreciate the comment and sub!! 🙂
@theisjuullanglands9556
@theisjuullanglands9556 2 жыл бұрын
Thanks for a great, clear easy understandable explanation - very appreciated!
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@Bobstew68
@Bobstew68 5 жыл бұрын
This glass drawing stuff is really clever. I thought at first he'd learned to write backwards, but they probably just flip the video, huh? Although, in that case, what about the text on the shirt?
@SanderBuruma
@SanderBuruma 5 жыл бұрын
I want to know this too
@saileshkarki8762
@saileshkarki8762 4 жыл бұрын
maybe the shirt is flipped too just to make the video cooler? they probably flipped the shirt in real
@YiANgO5
@YiANgO5 4 жыл бұрын
mirrors :)
@lelsewherelelsewhere9435
@lelsewherelelsewhere9435 3 жыл бұрын
I agree, he does these videos enough, he probably got a mirrored shirt to match. He's also writing with his left hand, which statistically means it is probably indeed flipped.
@NguyenCungHoaHien
@NguyenCungHoaHien 6 жыл бұрын
Very easy to understand, thank you John!
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@stephen8253
@stephen8253 2 жыл бұрын
Excellent video! I can't wait to watch your IKEv2 when it becomes available
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@ishanmadhuranga7947
@ishanmadhuranga7947 4 жыл бұрын
LoL my lecture took about 30min for this.... You just took 11min to explain it and It was so clear!! Thank You :)
@Karim-nq1be
@Karim-nq1be 4 жыл бұрын
Thank you. Amazing video, clear and practical, great job!
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@elultimopujilense
@elultimopujilense 4 жыл бұрын
Best explanation. Even computerphile didnt got this topic right. They made many mistakes in their video.
@DrRudy-em5nw
@DrRudy-em5nw 3 жыл бұрын
Mike Pound: *Am I a joke to you?*
@m-falcon
@m-falcon 4 жыл бұрын
so simple explaining, but strong
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@elvislee6368
@elvislee6368 3 жыл бұрын
Great video, I have been confused on why is it impossible to decrypt a tcpdump trace with the TLS/SSL private key provided when HTTPS is encrypted using Perfect Forward Secrecy, now it all explains! thanks.
@devcentral
@devcentral 3 жыл бұрын
Glad you enjoyed it!
@austinbrown2675
@austinbrown2675 4 жыл бұрын
Absolutely brilliant work!
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@mdk8783
@mdk8783 4 жыл бұрын
Great video ! Please could you explain how phase 1 and 2 work together by introducing all these components (DH, ESP etc.) and how the traffic passes and is manipulated through these the two phases thanks
@_productivity__nill_1131
@_productivity__nill_1131 5 жыл бұрын
This is very useful for my CS degree. Thanks.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it...and good luck on the CS degree!
@nir61202
@nir61202 4 жыл бұрын
I like the nice touch with mirroring the logo on his shirt. Great video other than that too :)
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@mahbubhaq8725
@mahbubhaq8725 4 жыл бұрын
Fantastic explanation. I appreciate it.
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@unclemamad8023
@unclemamad8023 3 жыл бұрын
when we are sending "A" trough public everyone can easily decrypt it right? the formula is A=g^a mod P which for an eavesdropper looks like 4=5^x mod 23, well no matter how long the P is, with a proper computer "a" can be computed, so we have "a", and "B" is in the public too, so we just take these two and calculate 18 on our own. can someone explain to me what i'm missing?
@devcentral
@devcentral 3 жыл бұрын
Great question/observation! You are correct that the calculation for "a" and "b" would be fairly trivial if these numbers used in the video were actually used in real life. But, the power of this key exchange relies on using very large numbers for P, G, a, b, etc. When very large numbers are used, it becomes computationally very difficult to crack the encryption. Of course, along the way, computers have become more capable/powerful, so the key sizes of these encryption algorithms have also grown larger so as to stay ahead of the computer power. It's a back and forth game that will go on for a long time!
@unclemamad8023
@unclemamad8023 3 жыл бұрын
@@devcentral right! Thanks for clarification
@umerakram1725
@umerakram1725 Ай бұрын
What if quantum computers can solve these DLP problems?
@LogicArray
@LogicArray 4 жыл бұрын
Thanks a lot for your explanation, nice one, I do have have question what is the difference between Diffie-Hellman and RSA?
@andriuskarpas
@andriuskarpas 2 жыл бұрын
very easy explained very well presented, thank you.
@devcentral
@devcentral 2 жыл бұрын
Glad you liked it and thanks for the comment!!
@JY-ni7id
@JY-ni7id 4 жыл бұрын
Fantastic explanation! Truly appreciate your effort! Thank you..
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@raikone14
@raikone14 3 жыл бұрын
Congrats, really nice explanation..
@devcentral
@devcentral 3 жыл бұрын
glad you enjoyed it!
@azuboof
@azuboof Жыл бұрын
best explanation of the topic. helps in exam thanks
@vaylx2253
@vaylx2253 2 жыл бұрын
Couldn't subscribe fast enough. Thank you! :))
@devcentral
@devcentral 2 жыл бұрын
Thanks much and Welcome!!
@wretchedknave5740
@wretchedknave5740 5 жыл бұрын
Brilliant explanation. Is this the same method used in IKE phase 1 of an IPsec tunnel? I'm guessing the secret values are the private keys and the shared values (A and B) are the public keys that are exchanged between the two peers? Please clarify, thank you!
@devcentral
@devcentral 5 жыл бұрын
Great question! IKE Phase 1 does several things to include: authenticate and protect the identities of the IPSec peers; negotiate a matching IKE SA policy between peers to protect the IKE exchange; perform an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys; set up a secure tunnel to negotiate IKE phase 2 parameters. So, the Diffie-Hellman key exchange is certainly used as part of IKE Phase 1, but it's not the only thing happening during IKE Phase 1. Here's more on IKE and IPSEC: www.ciscopress.com/articles/article.asp?p=25474&seqNum=7 Hope this helps!
@plainnessmanifestor7278
@plainnessmanifestor7278 6 жыл бұрын
Very clear and understandable
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@teodor-cristianradoi8042
@teodor-cristianradoi8042 Жыл бұрын
Very nice explained, but I wonder, if an adversary is able to listen to exchange from the beginning, he will have an equation with a single unknown value to decrypt, each side. For example, in our case, for A=g^a%p, the adversary has A, g, p. What blocks him from solving this equation and reaching to the secret value? It's the similar case for B.
@ak2k2
@ak2k2 Жыл бұрын
there are multiple correct solutions for "a" for example (5^23 mod 23) = (5^4 mod 23) = 4
@humbertoc_silva
@humbertoc_silva 6 жыл бұрын
Amazing application of the mathematics and thanks for the explanation, very cool!
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@Abdulaziz-fg3mh
@Abdulaziz-fg3mh 6 жыл бұрын
man I really think you so much for your great work. I learned a lot from you. May god bless you
@devcentral
@devcentral 6 жыл бұрын
thanks! glad you are enjoying the videos!
@ah89971
@ah89971 5 жыл бұрын
Thank you, it is understandable. But the thing that confuse me, the attacker knows g and p then he generates his own secret as well. He will have A an B. So i can assume he acts as Alice for example and calculate the shared. Why Alice and Bob get exact the same while attacker not knowing that he knows A and B. Why his scercet does not work. He can also generate secret that give same A as Alice
@devcentral
@devcentral 5 жыл бұрын
Glad you enjoyed it. You are correct that the attacker will know G and P. But, in order to create the shared key, the attacker would need to know the private value generated by one of the users (Alice / Bob). Here's a good picture representation of what's going on and who can see all the different parts: i.stack.imgur.com/IPUgS.png If an attacker were to somehow maneuver to a "Man in the Middle" position (let's assume he's impersonating Alice), then he could derive his own private value and then generate a shared key with Bob. Let's say Alice is the client and Bob is the server in this example. Servers can request Client Authentication where the client has to send a valid certificate (signed by the Certificate Authority) and then the server knows the client is legitimate. If the attacker was in the middle, he wouldn't be able to send a valid certificate from Alice, so the server would then know the client is invalid. And, if the attacker is impersonating the server, the same thing happens...the server sends a certificate to prove its authenticity. The certificate would be signed by the Certificate Authority so if Alice received the certificate and it was modified in any way, she would get an error message saying the certificate is not valid (or has been modified). This entire discussion highlights the fact that many different things are in play when it comes to security of communication between client and server. The key exchange portion (Diffie-Hellman) is an important part, but it is only part of the overall picture. Hope this helps!
@dbz-pk8mz
@dbz-pk8mz 2 жыл бұрын
Still an awesome video. Thanks!
@devcentral
@devcentral 2 жыл бұрын
Thanks! we appreciate the comment!
@madhum3198
@madhum3198 6 жыл бұрын
Great video John. Keep up the good work.
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@クリス-p2k
@クリス-p2k 4 жыл бұрын
Great explanation but I have a question. Wouldn't an eavesdropper be able to figure out little a? If they know that A = 4, g = 5 and p = 23. This gives 4 = 5^a mod(23) a = 22n+4, with n ≥ 0. The eavesdropper could then just brute force it with n = 0 and get a = 4 .
@devcentral
@devcentral 4 жыл бұрын
This is a great point, Christos! And, this is why it's so important to use large numbers when implementing Diffie-Hellman in real life :) The example I used in the video shows how it all works, but in real life you (or your computer) would use much larger numbers. And, that is the strength behind the key exchange algorithm...that it would take a very long time to brute force (or otherwise crack) these numbers. Thanks!
@armandoaguilar3080
@armandoaguilar3080 Жыл бұрын
Great video! Quick question, how P and G are exchanged between the client and the server? Or how they come to agree those values?
@farenight98_ytp29
@farenight98_ytp29 Жыл бұрын
Those numbers are not leaking any info on the secret keys, they are just a common base to build up the shared secret then. One of the two calculates the two numbers and sends them to the other end. This is what i thought, might not be correct.
@alanye7542
@alanye7542 2 жыл бұрын
Thank you so much! Best explanation!
@devcentral
@devcentral 2 жыл бұрын
Thanks! We appreciate the comment!!
@dzingaichakazamba
@dzingaichakazamba 3 жыл бұрын
Well explained sir. This really made my day!
@rubatharisan
@rubatharisan 2 жыл бұрын
Awesome explaination, thank you :)
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@peter9910
@peter9910 2 жыл бұрын
Thanks for clear explanation
@devcentral
@devcentral 2 жыл бұрын
Thanks and we appreciate the note!!
@leesweets4110
@leesweets4110 3 жыл бұрын
How do you use the key(s) to encrypt/decrypt a message? I ask because no one who explains DHKE explains the message encryption part. And when I look up how to encrypt messages I always find RSA, which starts out with the product of two prime numbers, and there is no bridge between these two concepts. You cant communicate the parameters to a receiver to build an RSA tunnel without compromising security.
@user-xc9ih8gv4h
@user-xc9ih8gv4h 5 жыл бұрын
Thanks so much. Really clear explanation.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@harshmishra9259
@harshmishra9259 6 жыл бұрын
this is an amazing explanation. thanks for saving me.
@devcentral
@devcentral 6 жыл бұрын
Thanks Harsh...I'm glad you enjoyed the video!
@MarKac9090
@MarKac9090 6 жыл бұрын
very nice. I wonder ~how many bits has this end shared key(session key) when I establish HTTPS session?
@devcentral
@devcentral 6 жыл бұрын
Hi MarKac...great question! The number of bits in the shared key depends on the established cipher suite between the client and the server. Once the Diffie-Hellman key exchange is complete, then you have a shared key for symmetric encryption (typically using AES as the encryption algorithm). For many implementations of AES, a key size of 128 is used. In fact, I just checked the key size that KZbin uses at the moment, and it's AES 128. Each site is configured according to their own needs, but many sites use AES 128. Hope this helps!
@BabaYagaWicked
@BabaYagaWicked 3 жыл бұрын
What’s mod mean? And how do you calculates them?
@devcentral
@devcentral 3 жыл бұрын
Mod is the modulo function, and it's a one-way function that takes the remainder of dividing two numbers as its result. It's a one-way function because you can't work backwards from the answer and figure out the numbers that were used to get the mod result...so it's only one way. The mod value in the Diffie Hellman tells you what number you divide by in order to get the result. So, in the example, the mod number is 23. So, you would take the first number and divide it by 23 and see what the remainder number is....that remainder is the result of the mod calculation. For example, if you have 17 mod 3, the calculation would be 17 / 3 = 5, remainder 2. So the answer to "17 mod 3" is 2. I hope this helps!
@fezekileplaatyi7224
@fezekileplaatyi7224 3 жыл бұрын
Thank you so much for this. Just a concern, quick question how long the number Mod = p can we choose which is guaranteed to be most secured?
@devcentral
@devcentral 3 жыл бұрын
Typically the key size is 2,048 bits. This means that the number is 2,048 bits long...a very large number!!
@testcricket1000
@testcricket1000 4 жыл бұрын
You made it look like piece of cake. Thank you
@devcentral
@devcentral 4 жыл бұрын
Glad you enjoyed it!
@mrjohndoe6981
@mrjohndoe6981 4 жыл бұрын
Thank you! This is a video well done.
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@noctavel
@noctavel 4 жыл бұрын
the "g" can vary from client/server from client1/server1?
@devcentral
@devcentral 4 жыл бұрын
Great question! Yes, the server sends the values for "g" and "p" to the client, so the values will vary from client/server to client1/server1. Thanks!
@erandaweerasingha404
@erandaweerasingha404 4 жыл бұрын
Thanks so much
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@deatharmy3684
@deatharmy3684 4 жыл бұрын
Thanks. Great job.
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@prashants5071
@prashants5071 3 ай бұрын
what is a primitive root modulo of a prime number?
@Rocky-cf2xo
@Rocky-cf2xo 4 жыл бұрын
What happens if the parameter are badly chosen? Can you give an example?
@devcentral
@devcentral 4 жыл бұрын
Hi Rocky2...great question! The Diffie-Hellman parameters are critical because if they aren't chosen properly, then either Diffie-Hellman won't work at all or it will be easy to break. The client and server typically rely on a random number generator (on their machine) to pick their secret values. The other parameter values are typically generated in advance and are agreed on by the client and server. Here's a document that shows some Diffie-Hellman "groups" that can be used: datatracker.ietf.org/doc/rfc3526/ This creates a situation where the random numbers generated by the client and server are very important, and it brings into play the importance of the random number generator...it needs to create truly random numbers because if someone could somehow guess the pattern that the random number generator is using, then they could guess the random numbers and then break the encryption. I hope this helps!
@Rocky-cf2xo
@Rocky-cf2xo 4 жыл бұрын
@@devcentral Good explanation. Thanks
@conorcleary733
@conorcleary733 4 жыл бұрын
Great explanation, wish I watched this in Uni woops
@matthewrobert8969
@matthewrobert8969 3 жыл бұрын
How is "a" and "b" generated?
@jokingf259
@jokingf259 3 жыл бұрын
Randomly chosen numbers at 4:10
@devcentral
@devcentral 3 жыл бұрын
Great question! Different software applications will handle this differently, but the outcome will be the same regardless of which application is used (Diffie Hellman keys will be generated). As an example, Microsoft uses function calls to a Cryptographic API that will generate the key values. Here's some documentation on how they do it: docs.microsoft.com/en-us/windows/win32/seccrypto/diffie-hellman-keys#generating-diffie-hellman-keys
@SaiTeja-uk6sc
@SaiTeja-uk6sc 4 жыл бұрын
sir for p=71 g=7 secret a=5 secret b=12 but the key is not the same at last please tell me why it is not same
@devcentral
@devcentral 4 жыл бұрын
Thanks for the question...I was able to calculate the values using the parameters you listed and I got the same result for both sides...it is 30. I calculated 7^5 mod 71 = 51 and then 7^12 mod 71 = 4. Then, calculate 4^5 mod 71 = 30 and 51^12 mod 71 = 30. Here's an online calculator that might help: www.mtholyoke.edu/courses/quenell/s2003/ma139/js/powermod.html
@heatherjacobs6102
@heatherjacobs6102 5 жыл бұрын
How do you get A=4 and B=10. Are these given #'s or is it calculated? If so how?
@mahammedhagi98
@mahammedhagi98 5 жыл бұрын
so he got A=4 by dividing the result of 5^4=3125 by 23 (the mod) which came up to be 135.869...If you round it up, I think you get 136. Then you multiply 136 with 23(the mod) and you get 3128, then you subtract that with 3125 to get A=3 (3128 - 3125=3). I don't understand how he got A=4 though. For B=10, it is exactly the same process. Someone verify if I did it correctly.
@techniker1337
@techniker1337 4 жыл бұрын
@@mahammedhagi98 You're calculating your powers wrong. 5 ^ 4 = 625. Then 625 / 23 = 27.1739... At this point you ALWAYS round DOWN, so 27. Now take the 23 that was used to divide 625 and multiply by 27 which equals 621. Finally, subtract 625 from 621 to get 4. As for the number for B: 1.) 5 ^ 3 = 125 2.) 125 / 23 = 5.4347... round down => 5 3.) 23 x 5 = 115 4.) 125 - 115 = 10
@jefftheworld
@jefftheworld 5 жыл бұрын
I understand Diffie-Hellman, I'm just sitting here wondering if you made a mirrored shirt in order to make these videos.
@JasonRahm
@JasonRahm 5 жыл бұрын
jefftheworld why yes, yes we did!
@jefftheworld
@jefftheworld 5 жыл бұрын
@@JasonRahm You should definitely sell mirror shirts. I'd definitely buy one. ;p
@nelsoncuia23
@nelsoncuia23 4 жыл бұрын
Thank you!
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@KnIfEzZv2
@KnIfEzZv2 5 жыл бұрын
is your shirt logo backwards?
@mjcrcastro
@mjcrcastro 4 жыл бұрын
He is right handed.
@hbol1652
@hbol1652 6 жыл бұрын
You said before TLS does share key exchange.. why u need DH key exchange??
@devcentral
@devcentral 6 жыл бұрын
Great question! Remember that the entire goal of the TLS handshake is to get a shared, symmetric key for both the client (browser) and the server. In order to do this, a key exchange takes place. There is more than one way to accomplish this key exchange, but the two primary methods are RSA and Diffie Hellman. The RSA key exchange has been shown to have some vulnerabilities along the way, so many applications are choosing to exchange keys using the Diffie Hellman method now. It's a more secure way of doing the key exchange. I hope this helps!
@satyamsingh_47
@satyamsingh_47 5 жыл бұрын
Why do we take primitive root and not random prime number?
@nczioox1116
@nczioox1116 3 жыл бұрын
Did you really write "Client" and "Server" in reverse at 1:14?
@justincaseOne
@justincaseOne 5 жыл бұрын
thanks Man !
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@RickyCruz1301
@RickyCruz1301 4 жыл бұрын
great video
@dagasonhackason
@dagasonhackason 4 жыл бұрын
🙌🏽🔥
@kumardivyanshu6944
@kumardivyanshu6944 5 жыл бұрын
can you explain me diffie-Hellman 4096bit to sha 256
@devcentral
@devcentral 5 жыл бұрын
Hi Kumar...were you wanting to know the difference between Diffie-Hellman key exchange and SHA? I just wanted to clarify what your question is. Thanks!
@onesun3023
@onesun3023 5 жыл бұрын
Good content but turn the strobe effect off. You're the only person in 2019 with video latency that isn't caused by the viewer's internet connection.
@himanshusinghchandel9972
@himanshusinghchandel9972 9 ай бұрын
great
@logannnn
@logannnn 2 жыл бұрын
3:56 thank you based god 🙏
@kratos_1986
@kratos_1986 2 жыл бұрын
explica como se explota amigo.
@KrestenGiese
@KrestenGiese 2 жыл бұрын
Bro, you sound like you're out of breath. It's making me unconsciously hold my breath.
@mitchbakeer2141
@mitchbakeer2141 4 жыл бұрын
ok, i am the bad guy, i have P,G and A & B,,, for example, p=23,g=5,A=4 , so 4= 5 to the power ? MOD 23 >>> easy a=4, so i got now a and b , i can get the last shared secret :D :D that depends on a very complex random generated number. !
@randomrandomizer
@randomrandomizer 5 ай бұрын
very poor example, same as in wikipedia, mainly because the value that client sends is actually the same as it's secret key. a=A=4 and a better example could have been chosen.
@Anonymous-vh6kp
@Anonymous-vh6kp 2 жыл бұрын
Too much waffling
@Enrico-Migliore
@Enrico-Migliore 4 жыл бұрын
Not clear at all.
@devcentral
@devcentral 4 жыл бұрын
Hi Enrico...thanks for the comment. What about it was not clear, and maybe I can help clarify? Thanks!
@Enrico-Migliore
@Enrico-Migliore 4 жыл бұрын
@@devcentral Try to use simpler and less words.
@devcentral
@devcentral 4 жыл бұрын
@@Enrico-Migliore thanks...we will keep that in mind!
Perfect Forward Secrecy
13:26
F5 DevCentral
Рет қаралды 72 М.
Long Nails 💅🏻 #shorts
00:50
Mr DegrEE
Рет қаралды 15 МЛН
Thank you Santa
00:13
Nadir Show
Рет қаралды 27 МЛН
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Рет қаралды 979 М.
Explaining TLS 1.3
18:00
F5 DevCentral
Рет қаралды 73 М.
Public key cryptography - Diffie-Hellman Key Exchange (full version)
8:38
Art of the Problem
Рет қаралды 891 М.
Lecture 13: Diffie-Hellman Key Exchange and the Discrete Log Problem by Christof Paar
1:20:47
Introduction to Cryptography by Christof Paar
Рет қаралды 112 М.
Diffie-Hellman Key Exchange and Forward Secrecy
13:00
Practical Networking
Рет қаралды 2,2 М.
Key Exchange Problems - Computerphile
9:18
Computerphile
Рет қаралды 360 М.
What is a TLS Cipher Suite?
20:47
F5 DevCentral
Рет қаралды 116 М.
What Are AEAD Ciphers?
11:09
F5 DevCentral
Рет қаралды 24 М.
Diffie-Hellman Key Exchange: How to Share a Secret
9:09
Spanning Tree
Рет қаралды 158 М.
Perfect Forward Secrecy Side Effects
10:23
F5 DevCentral
Рет қаралды 12 М.
Long Nails 💅🏻 #shorts
00:50
Mr DegrEE
Рет қаралды 15 МЛН