PKI - trust & chain of trust -why, who and how?

Поделиться
HTML-код
  • Опубликовано: 20 авг 2024
  • What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?
    In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.
    I will use an example how these models work.
    Playlist: Advanced Cryptography -
    • What is digital signat...
    Playlist: Basic Cryptography
    • Private Key Encryption...
    Please subscribe to my channel!
    Please leave comments or questions!
    Many thanks,
    Sunny Classroom

Комментарии • 118

  • @alexchang435
    @alexchang435 4 года назад +6

    I have seen a lot of resources online about PKI. This is by far the best one in my opinion. The concepts are brilliantly explained in a simple and concise manner. Very easy to understand. Thank you!

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +1

      You are welcome and thank you very much for taking the time to write such nice comments and it means a lot to me. I appreciate it very much.

  • @narayanasai
    @narayanasai 4 года назад +9

    ***** Warning to Learners: Sunny Class room may cause addiction more than Netflix ...be prepare for it.*** Thank you Sir for great tutorials.

  • @bobbybeduya
    @bobbybeduya 4 года назад +11

    Illustrations are helpful. Complicated theories explained in a simple way.

  • @nitinsharma93ful
    @nitinsharma93ful 6 лет назад +22

    Well explained, clear and crisp... Hats off Sir... Thank you for amazing tutorial.

  • @justcalcio747
    @justcalcio747 3 года назад +2

    It's creepy how good you are at explaining things; i watched 3 of your videos and i always understand the key concept, thank you sunny

  • @hikkyso
    @hikkyso 5 лет назад +7

    Thank you Sunny! I just happened to find your video when I was looking for some information about PKI, and your video helped me a lot about understanding the concept. I watched some more videos that you created and I really liked them. You explained such complicated things rather simply and very clearly! I am taking Info. Systems Security online course at a university. I'm sure that I'll come back to watch other related videos as well!

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +2

      Thanks a lot for your nice words. I do my best.

  • @ethiohagere1993
    @ethiohagere1993 2 года назад

    i have never seen such kind of simple and understandable way of explanation. Your are my hero. i am waiting your new lecture video every time. please keep it up and if u want go througth different programming languges , we will wait patiently.

  • @staj
    @staj 5 лет назад +2

    Brilliantly Concise Explanation yet again. Thanks a lot Sunny!

  • @shalipoto
    @shalipoto 2 года назад

    Your tutorial was very clear with just the right amount of verbal and visual info. Thank you !

  • @101appsCoZa
    @101appsCoZa 4 года назад +1

    another short, packed full of information, and well explained, video. thank you.

  • @fathergascoigne4609
    @fathergascoigne4609 Год назад

    I'm preparing for Security+ and this helped a lot. Thank you Sunny.

  • @roneru
    @roneru 4 года назад +1

    Finally found something that explains it well. Thanks!

  • @parachurimonica6910
    @parachurimonica6910 4 года назад +3

    Very well explained about the topics in a much simpler way with nice illustration

  • @sudeshnapal5213
    @sudeshnapal5213 3 года назад +1

    Awesome content.Finally this is the place where explanation was super simple

  • @bittun1607
    @bittun1607 6 лет назад +1

    Explained in the best possible way .... Very nice

  • @yashrana7735
    @yashrana7735 Год назад

    Sunny thank you for such easy explanation of concepts and topics.

  • @HK-sw3vi
    @HK-sw3vi 2 года назад

    very clear and thorough explanation

  • @itmemo8617
    @itmemo8617 4 года назад +1

    You are the best on RUclips!

  • @getanehgeto7873
    @getanehgeto7873 3 года назад

    Very amazing, wonderful and extremely pretty style of teaching process .thanks you sunny from bottom of my heart . God bless you!

  • @arashvermahmood7961
    @arashvermahmood7961 3 года назад

    Thanks Sunny for this concise and useful tutorial.

  • @sivagopal6447
    @sivagopal6447 2 года назад

    Sunny ! you're so awesome. Thank you.

  • @sththapa416
    @sththapa416 5 лет назад +2

    Thanyou sir.. You are the best in the world.. Love you so much

  • @danielgwj95
    @danielgwj95 4 года назад +2

    Thank you for this video !It really helped me understand the concept of root CAs.

  • @juanmanuelcruzaguilar754
    @juanmanuelcruzaguilar754 3 года назад

    Very helpful. I am trying to understand PKI and this definitely helps. Thank you

  • @katalunec
    @katalunec 5 лет назад +3

    Thank you for the tutorial. Everything is so well explained.

  • @zidanetribal2343
    @zidanetribal2343 3 года назад +1

    Wow! thank you Sunny for the high quality lecture :)

  • @happypeter1983
    @happypeter1983 4 года назад

    Concise and Precise as always

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +1

      Thank you for watching! Check out my other videos please!

  • @jimmylee3760
    @jimmylee3760 Год назад

    thats awesome. please keep up the good work!

  • @emmanouilmorfiadakis118
    @emmanouilmorfiadakis118 2 года назад

    Great Explanation.Thank you

  • @0marfans
    @0marfans 3 года назад +1

    You're the best Sunny, thank you!!

  • @bromadski
    @bromadski 2 года назад

    Thank you Sunny. You are great.

  • @firasatef528
    @firasatef528 2 года назад

    Thank you sunny!

  • @chanurahemal
    @chanurahemal 4 года назад +1

    Best video about this concept 🙏

  • @trendyniro
    @trendyniro Год назад

    Simply explained. Thank you 👍

  • @taqdirsingh
    @taqdirsingh 2 года назад

    excellent knowledge and very easy to understand the details behind.

  • @birensin
    @birensin 2 года назад

    Thanks for explaining.

  • @r0sh4n0
    @r0sh4n0 Год назад

    thank you very much sunny 😊

  • @DominicMotuka
    @DominicMotuka 2 года назад

    Easy to digest. Thank you.

  • @asoteico9528
    @asoteico9528 4 года назад

    Greatly done Sunny...!!!

  • @bluerfoot
    @bluerfoot 4 года назад +1

    I love sunny and I love his music.

  • @danyellbaptiste1055
    @danyellbaptiste1055 5 лет назад +3

    Very Good Tutorial, Thank you Sir!!

  • @halason1
    @halason1 4 года назад +1

    Sunny your awesome videos help me so much.

  • @angelazhang9082
    @angelazhang9082 2 года назад

    Great explanation! Thank you!

  • @jayevans759
    @jayevans759 5 лет назад +3

    Great. Thank you.

  • @g-shubham
    @g-shubham 6 лет назад +4

    Thank you sir for this video✌

  • @mattmarinelli8410
    @mattmarinelli8410 4 года назад +1

    much more in depth than Messer!

  • @mdziaurrahman3392
    @mdziaurrahman3392 4 года назад +4

    Thanks for your video, I was in mid of a confusion as my client sent a certificate which was not working in my modem. Suddenly I found in video that a ROOT CA's supplier and supplied to must be same. I checked and my certificate was wrong. Thanks again.

  • @konstantinrebrov675
    @konstantinrebrov675 5 лет назад +28

    Watch in 1.5 speed.

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +9

      I will speak faster in the future.

    • @windwindson2871
      @windwindson2871 4 года назад +10

      @@sunnyclassroom24 I am much appreciated you speak slowly. Not all the viewers speak English as their mother tongue.

  • @Skynet_the_AI
    @Skynet_the_AI 3 года назад

    Thank you for this tutorial guide lesson

  • @migueledes10
    @migueledes10 3 года назад

    Excelent explanation, thank you for helps us!

  • @ameyapatil1139
    @ameyapatil1139 3 года назад

    brilliant

  • @rajeshgeorge6093
    @rajeshgeorge6093 4 года назад +1

    simplified ... best

  • @marcosalameh8677
    @marcosalameh8677 2 года назад

    Amazing!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @kerrycooper3187
    @kerrycooper3187 2 года назад

    Thanks

  • @articwolf8377
    @articwolf8377 4 года назад

    Thank you for your help

  • @alkamalusare2549
    @alkamalusare2549 5 лет назад +2

    Awesome

  • @giovanninabil6950
    @giovanninabil6950 Год назад

    thanks Sunny, you never disappoint!
    do you by any change have videos explaining the Web of Trust model used by PGP ?

  • @mayadebij5873
    @mayadebij5873 Год назад

    Question about the example: What I saw on the PC only root CA public key was installed, but the certificate is issued by the intermediate CA, without installing the public key of of intermediate CA, how can the PC authenticate the received certificate?

  • @SandeepKumar-bv6wl
    @SandeepKumar-bv6wl Год назад

    Trustworthy reason is SlA and compensation they offered by CA

  • @motiondesign2501
    @motiondesign2501 3 года назад

    Sunny make video about how u creat dot1x authentication using server radius on windows server 2012 ,

  • @SheshadriMadhu
    @SheshadriMadhu 6 лет назад

    Thanks a lot for the videos, they are clear and helpful :)

  • @jindagi_ka_safar
    @jindagi_ka_safar 4 года назад

    Thanks it was a great video

  • @Chroperafox
    @Chroperafox 2 года назад

    How is the deletion of a certificate (revocation) carried out in a chain of trust if not all subscribers who use the certificate have access to a CRL or connection? Are there alternative ways or how is this solved?

  • @pdaniele88
    @pdaniele88 5 лет назад +1

    Hi, thank you for your tutorial. I have a question. The gmail digital certificate needs to be created by owner or by the CA authority ?

  • @dayumnson9769
    @dayumnson9769 4 года назад

    Is there a mistake in this video? At 3:56 you are saying that the hierarchical modell is limited because once the private key is compromised certifitcates will become worthless.
    But that's exactly the same issue with the distributed ones? I can't trust a single certificate if the root is compromised?

  • @relaxhub4178
    @relaxhub4178 2 года назад

    Does the browser only check the validity of the self-signed certificate of the root CA? And if it's valid, it automatically trusts all intermediate CAs without verifying them?

  • @techch3510
    @techch3510 3 года назад

    how to become CA/intermediate-CA/Delegated signing authority? any CA will provide Signing certificate (certificate with signing right ?

  • @krishnachaitanya7435
    @krishnachaitanya7435 6 лет назад +2

    I wonder is this method is what used in Blockchain?

  • @leksandradubovik6291
    @leksandradubovik6291 4 года назад

    thank youuu!!!!!!

  • @pcislocked
    @pcislocked 4 года назад +1

    Do you think installing a third party certificate could have the possibility of breaking this trust chain? In some MITM attacks(used cain for arp poisoning to be specific, rather basic stuff, I was trying to learn how to use it) I'm used to install my own self signed certificate to the test machine so I don't have to deal with chrome alarming me at every page. Also, some school stuff requires you to install certificates onto your windows or android device, and even student tablets and smart board computers have meb's(milli eğitim bakanlığı - ministry of national education on Turkey) certificates pre-installed on them.

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +1

      for a public website, you need a third party certificate. For a website for a small group of people, you can use the self-signed one. The function is the same. However, there might some other differences I don't know. I really appreciate your insights and knowledge.

    • @pcislocked
      @pcislocked 4 года назад

      @@sunnyclassroom24 Thanks. my English might be bad so I'm gonna ask it shortly
      will installing a third party root certificate to a system possibly break the security of all websites? maybe possibly through tools like cain&abel and stuff. since all other websites use different root certs it's not certain on my mind lol

  • @StealthyNomadica
    @StealthyNomadica 4 года назад

    Under mattress is more secure.

  • @albertkristian6502
    @albertkristian6502 5 лет назад

    What's the purpose of hierarchical trust model if for somehow the private key of the root CA's private key is compromised? Does it mean that all digital certs signed for intermediate CA are compromised and eventually digital certs signed for clients are also compromised?

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад

      you are correct! if the top dog or intermediate CAs lost their private key, it would be definitely a bad thing for that company. However, it does not mean all clients are compromised. It only means that you cannot truly believe are truly encrypted. Anyway, as a user, we never trust a site we do not know. Simply we do not easily put credit card # or our confidential information to any site. We do not know if their private keys are already stolen. The original design is always "perfect", but we live in a "real" world. I don't disagree with you.

  • @valb4184
    @valb4184 6 лет назад

    Sunny, question - you mentioned that purpose of PKI is to facilitate a safe transfer electronic transfer of data over the internet, is this definition same for SSL? Thanks.

    • @stevemaloney7305
      @stevemaloney7305 5 лет назад

      To understand how SSL plays in this, you need to go a little deeper. This video will explain the role of SSL in the trust model: ruclips.net/video/heacxYUnFHA/видео.html

  • @arber10
    @arber10 6 лет назад

    Thank you for your videos. These are great! Question: When gmail send his certificate, which is signed by the intermediate CA, does he send the CA also to me (client)? I might have the global CA to verify the intermediate CA later on, but I might miss the intermediate CA on my pc. So how does gmail make sure, I get access to the intermediate CA too?

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +3

      Good question. Public keys of most major intermediate CAs and root CAs have already been pre-installed in your browser (Chrome, firefox or Safari, even Edge :)) , Gmail server would not send CA to you. The certificate has the signature of CAs. Signature is verified by the public key in your browser. All big companies (such as Google) have even been the Intermediate CA themselves.
      If your browser has no public key of intermediate CAs for your service, will not be displayed. That is why we do not trust

    • @arber10
      @arber10 6 лет назад +1

      Sunny,
      thank you so much for your explanation.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      You are welcome!

  • @urvashikesharikeshari7371
    @urvashikesharikeshari7371 5 лет назад +1

    I want hindi

  • @Crux161
    @Crux161 3 года назад

    ...So......,How to break the global internet... 🤣

  • @myokokozaw8962
    @myokokozaw8962 5 лет назад +1

    Thanks