I've taken the paid course the math part is taken from and the value is incredible and basically made me the cryptography subject matter expert at the organization I work at. Crazy how good you are at dumbing things down and putting the right amount of focus at the right place. You make it look so easy but I can tell there is a lot of work in putting this together to be as thorough as it comes out to be. You are an incredible teacher. I rarely comment but thanks for all the quality content you put out. I took the course when you were initially building in and doing the lessons live and you are very fun to interact with. I think you were travelling in Hawaii at some point and no, we couldn't hear the dog 😂🤫 I had a blast! Cheers from Quebec.
I knew how DH works, how it worked with the mathematics and it was only used for key exchange. But I didn't know about the ephemeral part or what Forward Secrecy was. I wanted to refresh some concepts (it is good to do from time to time if it's not your field but you like it), and I'm in complete awe with your teaching skills. You are amazing! Keep up the good work! This was a master piece.
This is yhe first time i am learning a course series from you and i am very impressed very convined to take your paid course soon as i get a job. Thank you very much for all your service 🎉🙏 goddess bless you ✋🤚👏👍
Thanks Ed, that was really informative and clearly explained. Your content is awesome! Is Forward Secrecy the same thing as Perfect Forward Secrecy (or PFS) being used in IPSec or is there some subtle differences?
It's not _exactly_ the same thing, but sort of the same concept. IPsec's "PFS" simply does a second key exchange. So without PFS, you still have Forward Secrecy (because DH is used in Phase 1), but with PFS, you have a second DH exchange for each Phase 2 tunnel. The finer points of all this are often debated, but it's hard to get into significant details in a YT comment. In any case, HTH.
should i expect further topics in crypto, like Homomorphic encryption , mode types in AES like CBC ,etc.? and case example implementation of crypto like signal protocol? how it differs from normal E2E?
The series ends next week with the final video on EC. Remember, this is a Crypto _Essentials_ course =). I get into AES / CBC / GCM / AEAD in my TLS course though, if you're looking to go deeper on all this.
Authentication needs secret key to be known at Alice and Bob side, and while key exchange how to make sure that no one is impersonating Alice? using authentication? but then it's chicken-egg problem. What am i missing?
Hello and thank you very much for sahring this knowledge. One think that I don't undertand is what really is the diference between keeping a private key or a Share Secret becaus as far as I know both are a string of zeroes and ones, both are kept in private computers and both can be stolen in the same way. What is the point that I have missed. By the way I appreciate a lot konwing the ditails behind the DF algorithm, one comment to this regard is that I have a degree in physics and I didn't know what a Generator is.
📋 *Full Crypto Essentials Series* ruclips.net/p/PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ
👉 *Shortlink* pracnet.net/ce _(this one is easier to share... wink wink)_
🔐 *SSL/TLS Deep Dive course* pracnet.net/tls
I've taken the paid course the math part is taken from and the value is incredible and basically made me the cryptography subject matter expert at the organization I work at. Crazy how good you are at dumbing things down and putting the right amount of focus at the right place. You make it look so easy but I can tell there is a lot of work in putting this together to be as thorough as it comes out to be. You are an incredible teacher. I rarely comment but thanks for all the quality content you put out. I took the course when you were initially building in and doing the lessons live and you are very fun to interact with. I think you were travelling in Hawaii at some point and no, we couldn't hear the dog 😂🤫 I had a blast! Cheers from Quebec.
Thanks for the kind words =). I'm thrilled to hear the course turned into the defacto cryptography expert at your work =).
Ha, that dang dog! ;)
I knew how DH works, how it worked with the mathematics and it was only used for key exchange. But I didn't know about the ephemeral part or what Forward Secrecy was. I wanted to refresh some concepts (it is good to do from time to time if it's not your field but you like it), and I'm in complete awe with your teaching skills. You are amazing! Keep up the good work! This was a master piece.
Wao! That is incredibly well explained. Thanks a lot.
This is yhe first time i am learning a course series from you and i am very impressed very convined to take your paid course soon as i get a job. Thank you very much for all your service 🎉🙏 goddess bless you ✋🤚👏👍
Excelent... Thanks From Colombia
Very cool. Thank you every much.
I know it’s easy to say that it’s all just math, but it’s crazy to actually see it work.
You're very welcome. Yea, the math is fun to see =)
Thanks Ed, that was really informative and clearly explained. Your content is awesome!
Is Forward Secrecy the same thing as Perfect Forward Secrecy (or PFS) being used in IPSec or is there some subtle differences?
It's not _exactly_ the same thing, but sort of the same concept. IPsec's "PFS" simply does a second key exchange. So without PFS, you still have Forward Secrecy (because DH is used in Phase 1), but with PFS, you have a second DH exchange for each Phase 2 tunnel.
The finer points of all this are often debated, but it's hard to get into significant details in a YT comment. In any case, HTH.
@@PracticalNetworking Thank you very much, that cleared things up for me. :)
Very well explained
should i expect further topics in crypto, like Homomorphic encryption , mode types in AES like CBC ,etc.? and case example implementation of crypto like signal protocol? how it differs from normal E2E?
The series ends next week with the final video on EC. Remember, this is a Crypto _Essentials_ course =).
I get into AES / CBC / GCM / AEAD in my TLS course though, if you're looking to go deeper on all this.
@@PracticalNetworking tls course on pracnet website?
WOW best channel
Authentication needs secret key to be known at Alice and Bob side,
and while key exchange how to make sure that no one is impersonating Alice? using authentication? but then it's chicken-egg problem.
What am i missing?
Hello and thank you very much for sahring this knowledge. One think that I don't undertand is what really is the diference between keeping a private key or a Share Secret becaus as far as I know both are a string of zeroes and ones, both are kept in private computers and both can be stolen in the same way. What is the point that I have missed.
By the way I appreciate a lot konwing the ditails behind the DF algorithm, one comment to this regard is that I have a degree in physics and I didn't know what a Generator is.
If DH allows the key exchange. Why can not be used for encryption (confidentiality)?