That is a very good article.
It is definitely worth a read if you want to understand how security is handled over the internet.
I will highlight it on one of my articles where I talked very quickly about Man in the Middle.
Well done. :clap:
RSA, asymmetric encryption, can be used for secret key exchange too. I am not sure when it is favoured over Diffie-Hellman and who decides on that though.
It would be great if someone could shed some light on that :)
Plot twist: Criminals are perfectly allowed to get a public key for any domain they want, so you cannot be sure either way. More sophisticated certificates show the name of the owner in your address bar - but would YOU be able to see that the current website belongs to Goog1e instead of Google?
What happened with Alice and Bob?
I called but they didn't show up. I guess after 40 years in the workforce they decided to retire.
This is a SUPERB explanation and one I enjoyed very much! Thank you!
Nice article, thanks
Very pure explanation. Thank you!
Great Great Great Explanation 👏👏👏👏
Thanks Isaac! Love the analogy and makes it clearer.
Excellent explanation 👍! Thank you very much! Every web developer should know how this algorithm works!
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.