Jeremy....I don't think many people realize the significance of the short and subtle pauses when you switch from the drawing to looking into the camera to talk to us. This style of teaching is incredibly engaging and allows the viewer's mind to refocus and absorb what they are hearing. Love the usage of different techniques and methods. Please keep doing what you are doing. You have a superhuman ability to engage your audience and break down the most difficult of subjects in the most sensible way. You inspire me on every product demo and training session I present to my clients. I would love for you to create a series on how to be a better presenter!
"client encrypt session key using server's public key" that's the sentence I was looking for , it was so confusing reading other blogs saying that encryption starts as asymmetric and then switches to symmetric, this single sentence makes it clear how it works, thanks a lot
how many knowledgeable people we may have in the world if we all have someone like him teaching this way! wow! 19.38 mins being more productive than toons of classes I have been to! hands down to you!
Iam where Iam now because of you. 2015 I decided career switch, 30 days of career break just watching online - Jeremy's videos on CCNA, after 2 months landed a job. Thanks so much!!
Watching you teach anything is like binge watching some very addictive TV show! When this video finished I felt the almost 20min just go by so quickly, and leaving me wanting to watch the next video right away. This was so engaging! I always thought I knew SSL/TLS, but as you mentioned there were certain things where pieces of puzzle were just missing and after watching this video I have those pieces! And I have watched you videos on CBT Nuggets for my CCNA training and you managed to break down something, that for me was so complex for me to understand by other means (reading books, other training courses) where I thought there is no way I will understand this networking stuff, to explaining it in such a way that anyone can relate to and then really understand it! So thank you for all the teaching that you do!
One year later and I just watch this now.. I can't say how much helpful this video and the information is delivered so smooth especially the cryptography part.. Thank you jermey and the video is saved for future needs.
Fantastic explanation for someone like me who has been doing front end development for years, but never fully understand everything that was going on with https. Definitely filled in a few holes in my understanding of the process! Thanks!!!
Thank you fro putting such a concerted efforts explaining this convoluted subject ( SSL/TLS ) in plain English. appreciated for sharing your working knowledge. Mat.
Great explanation of a process that even most experienced IT professionals in the DOD don't even understand. I am constantly struggling to explain the process to them.
This is a brilliant, informative, talented piece of teaching. I'm putting it on my twitter account. I agree with Craig that the engagement is amazing. This is how you want to teach using electronic mediums.
Mate, I really don't comment on youtube very often but I need to say this - absolutely brilliant video. Your method of explaining and teaching is better than virtually anything I've ever seen, both online or in actual courses (and I've been to dozens). Certificates are something that have remained as a bit of a black hole for me in my career and finding a video like this that so succinctly re-enforces everything in my head is just amazing. Definitely subscribing.
Fantastic video. One of the best that describes SSL & HTTPS out there. Would be great if you can do a video on the intricacies of certificates - root, intermediate, leaf etc.
man you're a legend! you're the one who made networking understandable for me during my college days and now you still rockin and im still learning from you. such good stuff! Edit: Helped me aced my job application last week! im really happy i bumped into this content! Thanks Jeremy, All the best!
Thanks for the video. I thought that with Diffie Hellman there was no need to keep the communication to set up the symmetrical key encrypted. If so, in your example, why is the web server's public key used by the client to send information to set up the symetrical key?
If the CA encrypt their signature with their private key and u need their public key to decript it. Wouldnt that permit a hacker to decript the CA signature in between the web browser and the server? Since the public key is on public demand?
Thank you for posting this video. I am surprised everybody else seems to have understood things. i am still confused you introduced the phrase "private key" in the beginning, but did not mention it where it comes from and where its used in the process. you said the certificate includes the public key, but then later you said half of it is actually used /sent for encryption? what is the relationship between session key and private key ? I think all of this can be explained with a concrete example. pick a few numbers call one public key, call another private, etc....
You the man Jeremy! This really explains this topic. Bit of a lingering question as to when the CA encrypts the signature with it's private key, is it not giving away something, I know it doesn't give the key but like I'd to hear a bit more on this sometime.
Keep in mind that the PUBLIC keys of the "global CAs" (aka well-known CAs) are embedded in every OS/Web browser. So...that tells you that ANYONE can "decrypt" data that was originally encrypted with the CA's PRIVATE key (not that they "get" the private key, but that they can decrypt data that was encrypted with the private key). So...when a CA "signs" a certificate, what it means is they encrypt their name with their private key and put that data on the certificate... EVERYONE in the world can decrypt that signature, which validates that it came from the REAL CA.
QUESTION: The initial request/response HTTPS communication between client and server are not encrypted, except for the CA certificate in the response? If so, what prevents a hacker from seeing the initial client request to the server, and intercept the response from the server, containing its CA certificate, decrypting the certificate with the CA's public key, get the public key in the certificate, and use it to encrypt its own symmetric key and send to the server, thereby bypassing the client, and establishing a bogus dialog between racker and server?
Thank you for this video, and which stage "Diffie hellman" key exchange happening? client(pub key { "Diffie hellman" factor of Client } )------------------> Server client
Jeremy....I don't think many people realize the significance of the short and subtle pauses when you switch from the drawing to looking into the camera to talk to us. This style of teaching is incredibly engaging and allows the viewer's mind to refocus and absorb what they are hearing. Love the usage of different techniques and methods. Please keep doing what you are doing. You have a superhuman ability to engage your audience and break down the most difficult of subjects in the most sensible way. You inspire me on every product demo and training session I present to my clients. I would love for you to create a series on how to be a better presenter!
troof
Hugely appreciate your kind words Craig. I frequently try different styles and never know what “works.” :-)
You are amazing
I have never seen anyone explain this concept so flawlessly. Appreciate you so much, Jeremy.
Excellent video... The clarification, in the end, about how the signature is verified and how the browser does that was perfect! Thanks!
"client encrypt session key using server's public key" that's the sentence I was looking for , it was so confusing reading other blogs saying that encryption starts as asymmetric and then switches to symmetric, this single sentence makes it clear how it works, thanks a lot
Exactly Same here 🤌
Best explanation of SSL/TLS I’ve every seen. Great job Jeremy!
Good, now you can explain it to the rest of us.
how many knowledgeable people we may have in the world if we all have someone like him teaching this way! wow! 19.38 mins being more productive than toons of classes I have been to! hands down to you!
Software engineer here. This is the best explanation I have of ssl/tls works. Thank you!
Iam where Iam now because of you. 2015 I decided career switch, 30 days of career break just watching online - Jeremy's videos on CCNA, after 2 months landed a job. Thanks so much!!
Watching you teach anything is like binge watching some very addictive TV show! When this video finished I felt the almost 20min just go by so quickly, and leaving me wanting to watch the next video right away. This was so engaging!
I always thought I knew SSL/TLS, but as you mentioned there were certain things where pieces of puzzle were just missing and after watching this video I have those pieces!
And I have watched you videos on CBT Nuggets for my CCNA training and you managed to break down something, that for me was so complex for me to understand by other means (reading books, other training courses) where I thought there is no way I will understand this networking stuff, to explaining it in such a way that anyone can relate to and then really understand it!
So thank you for all the teaching that you do!
One year later and I just watch this now.. I can't say how much helpful this video and the information is delivered so smooth especially the cryptography part.. Thank you jermey and the video is saved for future needs.
you are an addiction jeremy. your method of teaching is unique. Thank you!
I've seen a very passionate guy trying to teach fundamentals. Really appreciated and subscribed of course!
Your effort will not go waste the way you are tried to feed and inculcate the content in viewers mind. Hats off to you.
6:18 Dian
6:18
I've yet to find a better teacher than Jeremy who can take any subject and present in a way that anyone can understand. Top work, and thanks👍 🙌
Sir, your passion towards the topic simply gets us hooked in no time and make us want to stay on till the end. Kudos to you for all the efforts!
Fantastic explanation for someone like me who has been doing front end development for years, but never fully understand everything that was going on with https. Definitely filled in a few holes in my understanding of the process! Thanks!!!
I am absolutely clear how ssl works. Tks for your spending time!
I don't usually comment, but maaaaaan, you are awesome... from your teaching methods to your charisma, keep the good work! Cheers!
"Wait a second!"..."I'm going to put this to bed right now...".. Awesome video. Thanks for trying to simplify it.
Thank you fro putting such a concerted efforts explaining this convoluted subject ( SSL/TLS ) in plain English. appreciated for sharing your working knowledge. Mat.
Great explanation of a process that even most experienced IT professionals in the DOD don't even understand. I am constantly struggling to explain the process to them.
Brother I love you........I am studying for security plus and I understand alot but you just made everything click together.
That's some damn good teaching here I wished I brought popcorn with me. Thank you for the great content !
This is awesome, you did an excellent job in explaining the concept! Bravo to you sir. 🙂
At last, a clear explanation of SSL/TLS! Thanks for this!
This is a brilliant, informative, talented piece of teaching. I'm putting it on my twitter account. I agree with Craig that the engagement is amazing. This is how you want to teach using electronic mediums.
Mate, I really don't comment on youtube very often but I need to say this - absolutely brilliant video. Your method of explaining and teaching is better than virtually anything I've ever seen, both online or in actual courses (and I've been to dozens). Certificates are something that have remained as a bit of a black hole for me in my career and finding a video like this that so succinctly re-enforces everything in my head is just amazing. Definitely subscribing.
Hilariously serious...very engaging. You're a bit of a 'nut case' with this and I mean that in the nicest way - keep up the good work! 👍😆
Its awesome how fast you speak when you get all excited when explaining and then i get all hyped as well love all your vids
this is best , not one of the best explanation on SSL/TLS which I have been seen , Great !!!
Fantastic video. One of the best that describes SSL & HTTPS out there. Would be great if you can do a video on the intricacies of certificates - root, intermediate, leaf etc.
That's really heavy. But you know this is the video where I have understood the process in a clear manner.
Thank you Jeremy, One of the best explanation I have ever seen on HTTPS
The best explanation ever! Thank you so much for this video.
one of the best videos on the internet. Thank You.
Thanks Jeremy! Always love that passion that you bring sharing the knowledge.
This is the best video on the internet on this topic.
man you're a legend! you're the one who made networking understandable for me during my college days and now you still rockin and im still learning from you. such good stuff!
Edit: Helped me aced my job application last week! im really happy i bumped into this content! Thanks Jeremy, All the best!
after 2 3 years, finally I got it and I got it right :)) thank you so much
Loved the pen 🖊 and paper 📄. Nice explanation 😊
Huge effort , thanks jeremy ,keep watching this video and cant get enogh ..
Many thanks from syria.
just subscribed and liked as soon as watched this.! awesome content in the RUclips today
Really appreciate your efforts... I'm looking forward to take and complete the entire series ... please don't be late :)
Great demo, many THANKS Jeremy for this video.
My pleasure!
Thanks Jeremy! You have explained it very simple as usual :)
I found this video very helpful and it helped me to understand the whole HTTPS protocol. Great work done!
Incredible explanation! Subscribed!!!
Did a great job at explaining a complex concept. Would give 2 thumbs up if I could!
you can't, you can do only 1
I liked it sir , the way you explained and your want to have that be learnt. I suppose I watched your video first time.
Thanks
The best ever https explanation.
I finally understand this concept. Thank you!!
My head hurts after this video but amazing explanation as always !
Awesome explanation.. subscribed!
Thank you, Mr Lahey. 🍻
Thanks for clear explanation! Good job!
Glad it was helpful!
Nailed IT! Thank you very much!
Was watching the same topic on ccna labs for real world and then this popped up!! Thank
This deserves more views
One of the best videos every explaining this topic. really thanks that helped a lot.
Thanks for the video. I thought that with Diffie Hellman there was no need to keep the communication to set up the symmetrical key encrypted. If so, in your example, why is the web server's public key used by the client to send information to set up the symetrical key?
Yep!
Excellent explanation
Amazing explaination
Thanks a lot Jeremy, very well explained.
Glad it was helpful!
You killed it Sir!
Amazing explanation!!!
great work Sir! For some reason you remind me of Saul Goodman from the Breaking Bad or Better call Saul series.
Wow...Thanks?
Thanks, your explanation is awesome. I finally understand how the HTTPS stuff works.
Glad it helped!
If the CA encrypt their signature with their private key and u need their public key to decript it. Wouldnt that permit a hacker to decript the CA signature in between the web browser and the server? Since the public key is on public demand?
Thank you! That was very helpful!
Greate job...thanks for the video...
Tylenol please....but I do appreciate your efforts
super, I watched 3 times and got it. the is the best
Simply Awesome
can you also please make a video on mutual TLS on similar line. Great simplification of a complicated topic.
thank you for the clear explanation.
Great video, Thanks. Subscribed!!
Jeremy for presidnet.
Thank you for this video and nice explaination ! You helped me so much !
Brilliant mate!
Really helped me Jeremy! Thank you!
This was an excellent explanation. Thank you!
Definitely gonna rewatch this! X4
Thank you for posting this video. I am surprised everybody else seems to have understood things. i am still confused you introduced the phrase "private key" in the beginning, but did not mention it where it comes from and where its used in the process. you said the certificate includes the public key, but then later you said half of it is actually used /sent for encryption? what is the relationship between session key and private key ? I think all of this can be explained with a concrete example. pick a few numbers call one public key, call another private, etc....
Thank you very much for very well explained.
Great Video. So educated
You the man Jeremy! This really explains this topic.
Bit of a lingering question as to when the CA encrypts the signature with it's private key, is it not giving away something, I know it doesn't give the key but like I'd to hear a bit more on this sometime.
Keep in mind that the PUBLIC keys of the "global CAs" (aka well-known CAs) are embedded in every OS/Web browser. So...that tells you that ANYONE can "decrypt" data that was originally encrypted with the CA's PRIVATE key (not that they "get" the private key, but that they can decrypt data that was encrypted with the private key). So...when a CA "signs" a certificate, what it means is they encrypt their name with their private key and put that data on the certificate... EVERYONE in the world can decrypt that signature, which validates that it came from the REAL CA.
@@Viatto Got it, thanks Jeremy, the private key used in a different way in asymmetric encryption, yin and yang, private key still secure.
Great video, thanks
Thanks Jeremy
what if (let's encrypt) used as CA?
I don't think its already installed inside any browser
thanks
Great vid, thanks!!
Thank you so much !!
Super helpful! Love it. Thank you.
Thank you!
QUESTION: The initial request/response HTTPS communication between client and server are not encrypted, except for the CA certificate in the response?
If so, what prevents a hacker from seeing the initial client request to the server, and intercept the response from the server,
containing its CA certificate, decrypting the certificate with the CA's public key, get the public key in the certificate,
and use it to encrypt its own symmetric key and send to the server, thereby bypassing the client, and establishing a bogus dialog between racker and server?
Thank you for this video, and which stage "Diffie hellman" key exchange happening?
client(pub key { "Diffie hellman" factor of Client } )------------------> Server
client
Awesome. This one is worth a million views
thank you so much, you're the best teacher
As the protocol itself is stateless does the session key generates for every request or how does it identify the session key and client?
Wonderful
Love the way you teach!
Jeremy is the best