Secret Key Exchange (Diffie-Hellman) - Computerphile
How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens.
Mathematics bit: https://youtu.be/Yjrfm_oRO0w
Computing Limit: https://youtu.be/jv2H9fp9dT8
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Secret Key Exchange (Diffie-Hellman) - Computerphile канала Computerphile
Mathematics bit: https://youtu.be/Yjrfm_oRO0w
Computing Limit: https://youtu.be/jv2H9fp9dT8
https://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: https://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Видео Secret Key Exchange (Diffie-Hellman) - Computerphile канала Computerphile
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Man in the middle attack in Diffie Hellman Key Exchange | Prevention against Man in Middle AttackGUI: Under the Hood - ComputerphileDiffie Hellman -the Mathematics bit- ComputerphileTransport Layer Security (TLS) - ComputerphileAsymmetric Encryption - Simply explainedKey Exchange Problems - ComputerphileExplaining the Diffie-Hellman Key ExchangeCookie Stealing - ComputerphileHow to Choose a Password - ComputerphileLecture 13: Diffie-Hellman Key Exchange and the Discrete Log Problem by Christof PaarRunning an SQL Injection Attack - ComputerphileCrypto-jacking - Computerphile2FA: Two Factor Authentication - ComputerphilePublic key cryptography - Diffie-Hellman Key Exchange (full version)End to End Encryption (E2EE) - ComputerphileHave You Been Pwned? - ComputerphileSecrets Hidden in Images (Steganography) - ComputerphileSecuring Stream Ciphers (HMAC) - ComputerphileAlmost All Web Encryption Works Like This (SP Networks) - ComputerphileMaze Solving - Computerphile