Correction: At 06:09 In 2 and 3, I switched the sender and recipient, check Slide 7 in the slide show linked in the description. The recipient sends their public key to the sender first.
I adore your approach to teaching. Going through this crash course as I have my Computer Science exam in two days. You are such a huge help and an absolute inspiration. Please never stop and Kudos to you, mang.
Your lecture was great, I just read your blog post and you mentioned you went to Vietnam. I'm so glad about that, I'm a Vietnamese and I come from Da Lat city from Vietnam. If you have the chance, please visit and explore Da Lat city. It will be a wonderful experience.
Can you please tell about your setup? I already know you use ScreenBrush. I am curios as to how your annotations remain on each slide when going forward and backward as well as if you are any additional device or tool to help you draw on screen?
I screen share from my iPad to my Macbook and record that in tandem with my microphone. I do the annotations on my iPad in Keynote with an Apple Pencil.
In the SSL/TLS steps, it initially mentions the use of public and private keys. These public and private keys are used to communicate in process of making a session key. Then further communication is encrypted using the session key. Does this mean that the client and server are initially communicating through asymmetric key encryption to then establish a symmetric key for symmetric key encryption? and that in this case the session key is the secret key?
On the asymmetric cryptography description, i think there is a mistake, Step 2, the receiver should be sending their public key to the sender, which then the sender uses this public key to encrypt the message, but you wrote the sender sends their public key?
You're right - my "person A person B" explanation was correct, but I didn't explain it correctly on the slide. I got the sender and recipient mixed up as you said. I'll publish a correction comment and change the slide. Thanks so much for catching this.
Correction: At 06:09 In 2 and 3, I switched the sender and recipient, check Slide 7 in the slide show linked in the description.
The recipient sends their public key to the sender first.
such a big topic fully covered in 30 mins is insane, keep it up
Thanks!
I adore your approach to teaching. Going through this crash course as I have my Computer Science exam in two days. You are such a huge help and an absolute inspiration. Please never stop and Kudos to you, mang.
Thanks 😊 Good luck with your exam!
@@TheCSClassroom You actually saved my grades so hard man, Thanks for the great content!
Your lecture was great, I just read your blog post and you mentioned you went to Vietnam. I'm so glad about that, I'm a Vietnamese and I come from Da Lat city from Vietnam. If you have the chance, please visit and explore Da Lat city. It will be a wonderful experience.
I went to Da Lat and it's my favorite place in Vietnam. It was beautiful, and it had the best food and coffee in all of Vietnam 💕
Will you be posting more topics from the 9618? Please do, you explain the concepts so well.
I'll be putting out videos weekly on 9618, with the intention of eventually covering the whole curriculum.
@@TheCSClassroom Thank you.
Can you please tell about your setup? I already know you use ScreenBrush. I am curios as to how your annotations remain on each slide when going forward and backward as well as if you are any additional device or tool to help you draw on screen?
I screen share from my iPad to my Macbook and record that in tandem with my microphone. I do the annotations on my iPad in Keynote with an Apple Pencil.
In the SSL/TLS steps, it initially mentions the use of public and private keys. These public and private keys are used to communicate in process of making a session key. Then further communication is encrypted using the session key.
Does this mean that the client and server are initially communicating through asymmetric key encryption to then establish a symmetric key for symmetric key encryption? and that in this case the session key is the secret key?
That's absolutely how it works.
On the asymmetric cryptography description, i think there is a mistake, Step 2, the receiver should be sending their public key to the sender, which then the sender uses this public key to encrypt the message, but you wrote the sender sends their public key?
You're right - my "person A person B" explanation was correct, but I didn't explain it correctly on the slide. I got the sender and recipient mixed up as you said. I'll publish a correction comment and change the slide. Thanks so much for catching this.
love you!
😊