Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS

Поделиться
HTML-код
  • Опубликовано: 22 дек 2024

Комментарии •

  • @PracticalNetworking
    @PracticalNetworking  3 года назад +12

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

  • @mertcancam
    @mertcancam 3 года назад +114

    I can't thank you enough! Finally, I am beginning to truly understand all those topics that I have been struggling to grasp.

  • @shayanpz7209
    @shayanpz7209 2 года назад +56

    I watched different videos on RUclips to understand this concept and no one else explained this as good as you did! Great job 👏🏼

  • @rogermcnulty887
    @rogermcnulty887 Год назад +26

    I’m 38 years old and a newer IT professional after switching careers. I just recently earned my BS degree in IT and got hired at a major defense company. I’m watching these types of videos for better understanding of specific types of concepts covered in Security+. Also I’ve been personally using technology since the days of original Oregon Trail as a hobby. As my first ever RUclips comment:
    These videos are fantastic videos. You deserve way more subscribers than you have. Fantastic explanations man. Bravo.

    • @PracticalNetworking
      @PracticalNetworking  Год назад +1

      Hi Roger! Thank you so much for the kind note, I'm honored to be the recipient of your first RUclips comment. =).
      Hope things are going well at the defense company =). Let me know if your team would benefit from in person training, I'd be happy to oblige. =)

  • @karamjeetpadam4719
    @karamjeetpadam4719 Год назад +2

    this is the most practical explanation of cyryptography in the entire RUclips.... thanks for such a simplified explanation!!

  • @aditisinghpal1116
    @aditisinghpal1116 Год назад +4

    I am a Law Student and was finding it difficult to understand the certain concepts of Information Technoloagy law involving core aspects of cybersecurity. This video simplified everything and explained articulately. Thank you to the author!

  • @bentabarzadi3379
    @bentabarzadi3379 Год назад +2

    I have never comment for any video EVER! but you are amazing! Simple, short and sweet! THANK YOU SO MUCH! WOW!

  • @santoshkumar-dr4qg
    @santoshkumar-dr4qg 3 года назад +20

    Again, I am amazed about the nitty gritty details this video is providing. The author starts with basic concept and take it to another level once the basic is done. This increases our horizon in which the techniques can be used. Well done.

  • @yiweima4412
    @yiweima4412 8 месяцев назад +20

    This is easily the most beautiful explanation video on RUclips to date.

  • @CedevismoLiberale
    @CedevismoLiberale 4 месяца назад +1

    Man, you deserve a medal. I've read and watched countless sources and never understood how this worked, until listening to your words, where you specify that encrypted stuff with public|private key can "only be" decrypted by the other one (private|public) depending on the case. The most unclear part of this concept is that one of the keys can describe what the other encrypts. It is absurd I realize only now, after years of wondering.
    I may be wrong, but I think what makes all of this counterintuitive (not just in yours, but in literally every source I've got info about this matter) is the analogy with physical keys, that usually don't have this specific kind of property. What should have made it more intuitive, resulted in way more confusion for me.
    Thank you so much, this video was "the key" that unlocked in me the path to understanding.

  • @privatesocialhandle
    @privatesocialhandle Год назад +1

    My god, I can't believe I had to search so long for a video that makes sense for beginners. Subscribed.

  • @tomnguyen1015
    @tomnguyen1015 Год назад +1

    FINALLY sometime who actually understand and know how to explain things PROPERLY

  • @terjidjurhuus1917
    @terjidjurhuus1917 Год назад +4

    In a few minutes you managed to simply explain what hours of other videos managed to complicate. Thanks!

  • @encryptionforbeginners96
    @encryptionforbeginners96 2 года назад +17

    Thanks for the great video. I found the factors P and Q for the number 1909: P=23, Q=83. To do this, I used the "Quadratisches Sieb" factorization procedure, which operates as follows:
    First I calculate the square root of 1909 which gives the value "43.69".
    After that I set the factors P = 43 and Q = 44.
    Now the calculations follow.
    If I calculate P*Q (43*44), then this results in "1892". Since this value is smaller than "1909" I increase Q by one -> Q=45.
    Now I calculate again the product P*Q (43*45) -> "1935". The value is now greater than "1909", so I decrease P by the value 1 -> P=42.
    I follow these rules until the value 1909 is calculated.
    Summary:
    - P*Q (43*44) -> 1892 < 1909 -> Q+1 (45)
    - P*Q (43*45) -> 1935 > 1909 -> P-1 (42)
    - P*Q (42*45) -> 1890 < 1909 -> Q+1 (46)
    - P*Q (42*46) -> 1932 > 1909 -> P-1 (41)
    .....
    - P*Q (23*83) -> 1909 = 1909
    I hope this is helpful.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +5

      Great write up! This proves 2 things:
      1. Any key can be solved via brute force
      2. Brute force doesn't necessarily require trying _every_ possibility, there are shortcuts you can take as you did =)
      Going to pin your post, to bring more attention to your write up and hopefully your channel. Good stuff!

    • @encryptionforbeginners96
      @encryptionforbeginners96 2 года назад +3

      @@PracticalNetworking Thank you for pinning. The great thing about the algorithm is also that this can be divided into several threads very well. So you could crack your RSA-1024 key on a graphics card quickly :-)!

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      @@encryptionforbeginners96 The difficulty scales exponentially as the key size increases. To date the 1024 bit "RSA Number" factorization challenge has yet to be solved.
      en.wikipedia.org/wiki/RSA_Factoring_Challenge
      en.wikipedia.org/wiki/RSA_numbers#RSA-1024

    • @scottspa74
      @scottspa74 2 года назад +3

      Ummm you're sort of a genius

  • @lawrenceonlineshop7040
    @lawrenceonlineshop7040 Год назад +1

    Good Teacher! Very rare to see someone taking difficult concepts and making it simple for others to understand better.

  • @DG-fs1pq
    @DG-fs1pq 2 года назад +1

    I say this about each of your videos, but seriously....You are the best teacher when it comes to this material!!! I finally understand this clearly.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад +1

      Thank you, David. Glad you are enjoying this content =).
      If you are willing... could you do me a favor? Do you mind sharing these videos on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .

    • @DG-fs1pq
      @DG-fs1pq 2 года назад +1

      @@PracticalNetworking I share it quite often. Thanks.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      @@DG-fs1pq In that case, *Thank you **_very_** much for your support.* Much appreciated

  • @alan29115
    @alan29115 2 года назад +1

    So many explanations go right over the actual essence of how these keys interact to encrypt and decrypt. Almost as if they don't even know it themselves, just regurgitating shit from a textbook. THANK YOU

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      You're welcome, Alan =). I too agree I've heard many people attempt to explain this by simply regurgitating what others have said... agreed 100% =).

  • @rockystark9539
    @rockystark9539 2 года назад +1

    Incredible performance, man needs a solid understanding of encryption to explain it in such a way. Well done.

  • @north4220
    @north4220 6 месяцев назад +1

    honestly i wish you happiness , i was struggling to get a grasp on this subject , you explained it in a wonderful way thank you !

  • @lallu1122
    @lallu1122 Год назад

    Super work - probably the best SSL videos on RUclips.

  • @peterchmelar8886
    @peterchmelar8886 3 года назад +15

    Another gem :) Thank you for the uploads Ed. Every video is packed with useful knowledge.

  • @cevuwolf3077
    @cevuwolf3077 2 года назад +2

    I agree with Mustafa Mertcan CAM ,finally someone explained the proper way.Thanks a lot :D

  • @mmdbx
    @mmdbx 3 года назад +9

    The way you explain things uses the right level of simplification, to facilitate understanding, but doesn't get lost in the details. Thanks for your great work, much appreciated! (I always had challanges to understand the difference between the concept of signatures vs. bulk encryption, but this visualization of yours, with the explanation helped a lot!)

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Glad this helped make it click. Thanks for the kind words, Gergely =)

  • @alistairbarros8192
    @alistairbarros8192 8 месяцев назад

    The best explanation and video I've seen on secure communications using asymmetric and symmetric keys, the illustrations and pacing of explanations are exemplary!

  • @IliyaDamyanov
    @IliyaDamyanov Год назад

    This is the best video in the internet explaining this topic.

  • @bitfluent
    @bitfluent Год назад +1

    Concise, simple, and visual. Great video!

  • @ChaoticBeing-yj3ij
    @ChaoticBeing-yj3ij 10 месяцев назад +2

    I was legit mind blown after seeing this video wonderful explanation

  • @rob651
    @rob651 Год назад

    I have taken many tutorials online, watched many educational videos but your tutorial is so different. You are a great teacher sir. I dont understand how but the topic is explained in depth and at the same time in a very brief and concise way.
    Thank you very much! Keep up the good work!

  • @vmkkannan
    @vmkkannan Год назад +1

    the content you explain is in order and clear to the subject... easily understandable...

  • @martinmokran6324
    @martinmokran6324 3 года назад +4

    Another great video in Practical TLS series! Thank you.

  • @LuvxJacqu4li8e
    @LuvxJacqu4li8e Год назад

    Amazingly done again: using Pam's public key to encrypt so she alone can open it with her private key. Wow!!!

  • @fab5749
    @fab5749 2 года назад +1

    This is by far the best explanation on this topic

  • @Scottpie47
    @Scottpie47 2 года назад +1

    Omg FINALLY an explanation of public/private keys that made perfect sense to me!! Thank you!!

  • @southern_smacker
    @southern_smacker Год назад

    I first tried to study Public and Private keys encryption back in 2002 after passing my Java 2 certification, but could not understand the concept. I then kept struggling with understanding how encryption and SSL/TLS works. Today this mystery is solved forever. I would like to thank the creator of this wonderful course.

  • @med0897
    @med0897 3 месяца назад

    I was a bit confused on how encryption in TOR hidden services works, especially the part of signing the hidden service descriptor and the onion address derived from the hidden service public key, now because of this video it makes perfect sense, thank you very much for this amazing video, great work !

  • @Frack_Black
    @Frack_Black 3 года назад +1

    This channel has become my go to for catching up on stuff I haven't, previously, fully understood. The simple breakdown of the subject matter makes for easier digestion. 👏👏

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Welcome, Frack =). Glad you're enjoying this content and how I present it!

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Congratulations, you won the giveaway. Message me on discord to claim your prize -- pracnet.net/discord

    • @Frack_Black
      @Frack_Black 3 года назад +1

      @@PracticalNetworking lovely, thank you. Will pm later.

    • @Frack_Black
      @Frack_Black 3 года назад +1

      Thanks for the course. 😀

  • @rkveluvali
    @rkveluvali Год назад

    I can't thank you enough for the detailed explanations, providing necessary intricate details in a lucid and understandable way.... 🙇

  • @adityae83
    @adityae83 Год назад

    You explain really well, after going through few videos and still not grasping the concept your video and explanation helped me understand this concept well. Thank you for this video.

  • @AtharvBogra
    @AtharvBogra Год назад

    This video is awesome in explaining this concept and how hashing and encryption come together in PKI as this was what Ive been struggling to grasp in terms of the complete image! Awesome job.

  • @gangstaberry2496
    @gangstaberry2496 6 месяцев назад +1

    Thanks for the video... This explanation is a lot clearer than the one I saw in class

  • @scottspa74
    @scottspa74 2 года назад +1

    Ed, you are absolutely the BEST!. I'm finishing a 2 year degree at Edmonds and feel like I've learned little (all during covid, virtual) and frequently refer back to your amazing instruction. You def have the calling of a professor (not to mention your obvious chops as an engineer).

  • @szilardfineascovasa6144
    @szilardfineascovasa6144 8 месяцев назад +1

    Boy, this video indeed demonstrated the mission of the channel as stated: hitting that sweet spot between basic and too complex. I often find myself frustrated right in that "Twilight Zone", googling and switching between articles and videos (only to become more frustrated).
    As someone else was saying, this made JWT make sense as well...after reading through stuff that was starting nicely, bulding up nicely, only to then muddy the waters in an epico style 😁. Was tempted for the first time to read the RFC.
    Bookmarked, subscribed, and will certainly chek the other videos. Thanks!

    • @PracticalNetworking
      @PracticalNetworking  8 месяцев назад +1

      Thank you for the kind words! Glad you enjoyed this series.
      Thank you for supporting the channel =)

  • @AHMondal
    @AHMondal 22 дня назад

    The best video I found on RUclips on this topic! ❤🎉

  • @helena8918
    @helena8918 Год назад

    Best video yet, BY FAR. All well explained, and following all the principals that we should have in count when learning encryption and informatic security.

  • @pinoyheartbeat7245
    @pinoyheartbeat7245 Год назад

    I am currently enrolled in Cisco's cybersecurity course and I always look at this particular video whenever I get symmetric and asymmetric and public and private keys confused with one another. Very very good tutorial.

  • @yosephteshomebirhanu6639
    @yosephteshomebirhanu6639 2 месяца назад

    i dont think GPT can explain it this way this days... Cryptography is the major topic in ISS, it paves the way to understand, Authentication, Acess control and internet network security... with this regard all your explanations starting from the concept Key are paramount ! i cant thank you enough!

  • @chittlingwhittles1198
    @chittlingwhittles1198 Год назад

    Thanks for all of this. Superb content and presentation!
    Does anyone else feel guilty when you forget to like a video as you’re gobbling this stuff up?

  • @dg223-p1r
    @dg223-p1r 2 месяца назад

    I am taking an algorithms course where I implemented all the math for calculating RSA keys, but still could not understand how to use them. Now I get it! Thanks, this video was great!

  • @prasadpulaguntla9255
    @prasadpulaguntla9255 9 месяцев назад

    The best video to understand how JWT works (although jwt is not explicitly discussed in the video). Can't thank you enough for such a clear and simple explanation!!

  • @zs8850
    @zs8850 9 месяцев назад +1

    Absolutely brilliant content! Thank you for taking the time to create this!

  • @tony_0088
    @tony_0088 2 года назад +1

    This video is awesome, congratulations guys! You explain complex topics in a very simple, elegant and didactic way.

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Glad you enjoyed it, Tony =). I'm sure you'll enjoy the rest of the Crypto series:
      ruclips.net/p/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY

  • @sammyfrost9244
    @sammyfrost9244 2 месяца назад

    Love the way you explain. Everything is crisp and clear

  • @roytitas
    @roytitas Год назад

    Thank you for explaining each topic with such clarity! This is very very helpful.

  • @momo8718
    @momo8718 2 года назад +1

    I am currently reading a book on cryptography and hash functions and this is a really good illustration. Well done!

  • @digitaldrive1192
    @digitaldrive1192 3 года назад +1

    Very nice. Concise, clear with simple and effective animated diagrams. Not sure if it gets any better than this.

  • @MultiBob1010
    @MultiBob1010 2 года назад +1

    Thank you so much, you made my day, I've been reading bunch of articles about it, there was unclear idea to me (which I can use the private key to encrypt the data and use the public one for decypt) by your video you made the pic clear to me

  • @rpinto8800
    @rpinto8800 3 года назад +3

    Thanks again for making this available to us, just finished the playlist enjoyed it, well explained.

  • @danialranjbar9805
    @danialranjbar9805 Год назад

    Thank you for your time and effort for sharing us all this knowledge for free.

  • @rafay1708
    @rafay1708 3 года назад +4

    You always know how to make life brighter for everyone you know. Thank you so much for spending your Golden time to make such useful Video. these Keys are not easy to understand and to explain but you make it so much easy to understand. Thanks, waiting for your next Video. ✌

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Thank you for the kind words, Rafay. Glad you're enjoying this content =)

  • @kaykay02120
    @kaykay02120 9 месяцев назад +1

    no words to explain. excellent series

  • @atulsurjuse2916
    @atulsurjuse2916 Год назад

    This is one of the best explanation of the difficult subject.I was struggling to understand the base of this topic..Now it's cleared.Thank you very much..!!

  • @RaidenHeaven
    @RaidenHeaven 10 месяцев назад +1

    You know why this video is the Best?
    Because it doesn't hide the fact you can Encrypt with public and Decrypt with private
    but ALSO Encrypt with private and Decrypt with public
    May are too scared to say that.

    • @PracticalNetworking
      @PracticalNetworking  10 месяцев назад

      If you enjoyed this video, you'll love my video on RSA where I prove exactly that with the math =)

  • @paolonervi2208
    @paolonervi2208 3 года назад +2

    Your videos are really super useful and interesting.thank you for the time you dedicate in making these contents.greetings from Italy.Paul.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад

      Hi Paolo! Glad you enjoyed them! Thank you for the kind words. Cheers!

  • @vihanga01
    @vihanga01 4 месяца назад

    im currently working on Project Spring Security ... this content helps me so much can’t thank you enough

  • @fuadyhidayat
    @fuadyhidayat 2 года назад +1

    What a great explanation. Finally it all make sense. Thank you for providing this video. Really really helpful.

  • @grigorynedaev7254
    @grigorynedaev7254 Год назад +1

    Thanks!

  • @jeffchen86
    @jeffchen86 3 года назад +1

    Thanks bro!I struggled a lot to find out this stuff,but you help me a lot just in a few minutes!You are so amazing!

  • @noel1637
    @noel1637 3 месяца назад

    The best explanation i have found about pgp. Thank you

  • @hosseinshourabi398
    @hosseinshourabi398 2 года назад +1

    Woooooooonderful.
    I am amazed about deep details this video is providing.
    Well Done,
    Thank you so much!

  • @AnantaAkash.Podder
    @AnantaAkash.Podder Год назад

    This is the BESTTT lecture to Public & Private key & how TLS works... Thanks a Lot Man 😊❤️😊

  • @OscarPerez-ox8sq
    @OscarPerez-ox8sq 7 месяцев назад

    So far best explaination seen on internet.

  • @sgwong513
    @sgwong513 Год назад

    agree, this is the best video series explain how the ssl/tls and encryption works.

  • @rajeshrama86
    @rajeshrama86 Год назад

    The best explanation I came across after a lot of reading.................Thanks a lot sir

  • @CKZA10
    @CKZA10 3 года назад +1

    Really well done video. There's not so many well-made videos that take on the concept, because you can't just dip your toe in the water and experience the totality and awesomeness of encryption and how it sets the stage for what we do and use daily.
    I can also highly recommend Paul Turner's RUclips videos on SSH and PKI. And then Ivan Ristić's excellent book on SSL and TLS (Bulletproof SSL and TLS - Feisty Duck publishing) - the book started off as a very good TLS 1.3 book but has transpired into something much more and is currently in its second edition (preview stage).
    If you truly want to get to grip with SSH and PKI - play with it on your PC. It's free and with a bit of virtualization you can toy with SSH Authentication against servers. Heck, PGP is also straight forward with GPG cli and on Windows you get Kleopatra for the GUI experience (although with GPG command line you can do a lot more like sub keys).

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Ivan's book is solid. I haven't heard of Paul, just looked up a few of his videos and yes, I agree, it also looks pretty solid. Glad to be compared to such high quality sources. Thanks, CKZA10 =)

  • @hasanalmuazzaz4678
    @hasanalmuazzaz4678 Год назад

    thanks, no one else explained this as good as you did.

  • @chukwukauba2417
    @chukwukauba2417 Год назад

    You have really simplified this mystery for me. Thank you!

  • @renansantos8727
    @renansantos8727 11 месяцев назад

    Thanks, saved my life with such clear explanation

  • @Jyothis
    @Jyothis Год назад

    Very helpful video. One thing I wish to clarify, 11:07 it is mentioned that signature provides Integrity and Authentication. I can't understand how it is related to Authentication. At best it can provide Non Repudiation AFAIK. Can you please review this

  • @mistershirokov5067
    @mistershirokov5067 Год назад

    You are a great tutor and you’ve just got a subscriber, good sir. I’ve read tens of articles about ASE and this video is way better than any of them combined (although some were more about the actual functions than the general idea)

  • @markmanzo2488
    @markmanzo2488 Год назад

    New sub here. I'm studying for the A+ after getting the Google IT Support Professional cert, and ran across your channel. It's really helping me fill in the gaps on some big topics I was confused on, and helping me understand more of the basics so I can in turn understand some of the more advanced stuff for the Network+ and Security+. I seem to be learning these concepts the way you are teaching them. Thank you.

  • @AndreyKhomyakov
    @AndreyKhomyakov 2 года назад +1

    Great job on the presentation. Very clear and concise. Loved the "tell me what you are going to tell me, tell me, then tell me what you told me" approach! For your future lessons I'd like to note a piece of feedback you might want to consider. You are using colors to highlight object differences. Consider the fact that there are color blind folks out there. Perhaps in the future in addition to colors use shapes to highlight the difference. E.g. Jim's keys could have square base, while Pam's could be round and so on...

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      Hi Andrey, thanks for the kind words. Glad you enjoyed it =)
      Great call about color blind safe graphics. I'm afraid this video is from my SSL/TLS deep dive course, and the colors end up consistent throughout the entire course -- over 800 PowerPoint slides. At this point, changing every instance of a "red" key to something with different shape would be an enormous amount of work -- something I can not take on my plate at the moment =(.
      You are right, though, I wish from the beginning I had created the illustrations while accounting for color blind folks.

    • @AndreyKhomyakov
      @AndreyKhomyakov 2 года назад +1

      @@PracticalNetworking Sorry, I should have been clearer. I didn't mean to redo the existing lessons. I meant for when you make new lessons in the future on w/ever subject, it's something to consider. I'm not color blind myself, but when I was watching the keys move around and color messages, I had that thought that being able to see those colors correctly helps a lot, but not everyone can see colors. Anyways, awesome course! And I really want to compliment your public speaking skills! Kudos!

    • @PracticalNetworking
      @PracticalNetworking  2 года назад

      ​@@AndreyKhomyakov Thank you for the kind words. Creating effective learning content that is effective, and also inclusive, is an important problem to solve.

  • @po6577
    @po6577 Год назад

    Best explaination I had seen out there! Thanks!

  • @raghav3914
    @raghav3914 6 месяцев назад

    After watching a lot of animated videos on the same topic, this is so far the easiest explanation.

  • @thecyberguard426
    @thecyberguard426 Год назад

    o one else explained this as good as you did! Great job 👏🏼

  • @fishfanaticgokul4758
    @fishfanaticgokul4758 Год назад

    Most valuable video i have seen in this year 🎉🎉🎉🎉 am really astonished ❤

  • @yijingmeng
    @yijingmeng 5 месяцев назад

    Thanks for the great video. Really clear and good explaination.... I just need to come back and watch it several more times to make sure I grasp all the details!!!! Mind explosion now, haha!

  • @blackbarry45
    @blackbarry45 Год назад +1

    the series are awesome! Thank you for your content

  • @scottspa74
    @scottspa74 3 года назад +4

    Great video and illustration. This reinforces what I've learned in school. I am still a bit lost trying to understand what, exactly, we're talking about when we're talking about these keys. Like, I apparently do understand the concepts, (cuz this matches what I knew from school) but I struggle to understand 'when' we're using these keys, how we 'get' them...what are real-world examples of using them, etc. Like, what is the scenario when one determines whether to sign with their public key vs their private key ? I've done packet tracer labs where I've configured IPsec tunnels and still don't grasp what I was doing' lol. I just mean,...I think it'd be so helpful (at least, for me) to see/hear what a real-world scenario using keys is. Hopefully that makes sense, and someone could take a moment to enlighten. Thanks, all, and thanks, Ed, for all the time and great, direct, illustrative content.

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Hey Scott! I think you'll enjoy the next video. It's going to call out where all these various cryptographic functions we've discussed actually come into play in SSL (but conceptually, it will also apply to IPsec and SSH, as well).

    • @5gun1
      @5gun1 2 года назад

      0:00 I gotchu bro

  • @nidhisharma3578
    @nidhisharma3578 11 месяцев назад +1

    Thank you for making it so easy to understand 🙏

  • @alexl2512
    @alexl2512 Год назад

    Thank you so much for your explanation. It is very clear and accurate. 🎉🎉🎉

  • @bill0cao
    @bill0cao Год назад

    Thanks for this great lesson which very clearly explains the topic!

  • @Don-Carillo
    @Don-Carillo 3 года назад +3

    Thanks . look forward to all of these and never disappointed, bonus points for using Pam and Jim instead of Bob and Alice too. unique :-)

    • @PracticalNetworking
      @PracticalNetworking  3 года назад +1

      Hi Don! Glad you enjoyed this too!
      When I teach this in real life, I add stories to the messages Pam and Jim are sending, and they mostly follow plot points from the Office. Ahh, I miss teaching in person ;).

    • @nocare3356
      @nocare3356 3 года назад

      Bob and alice is used for Compatiasecurity+ course

  • @tusharludhrani8059
    @tusharludhrani8059 Год назад

    this was the most amazing explaination ive ever heard!!!! thankyou sooooooo muchhhh

  • @ersoyyildirim5838
    @ersoyyildirim5838 Год назад +1

    Such a perfect and clear explanation

  • @harisrg92
    @harisrg92 Год назад +1

    At 3:20, you mentioned that Jim can verify integrity of the message by just decrypting the message by using Pam's public key. If the message has been tempered with, Jim would see a garbled message. However, how would Jim know whether Pam intended or not intended to actually send a garbled message. Maybe she did send the garbled message and it was not tempered with..?

    • @PracticalNetworking
      @PracticalNetworking  Год назад

      Great question! You've perfectly realized why encryption alone isn't enough, because whatever the result of decryption is, there is no way for the receiving entity to confirm whether the decrypted content matches what the initiator sent.
      That is why you also need a mechanism for Integrity to pair with your Encryption. =)
      I tie them together in the "How TLS uses Crypto" video of this series. I encourage you to watch that one next =)

  • @yulanluo7328
    @yulanluo7328 9 месяцев назад

    Every clear and easy to understand, thanks for sharing!

  • @JimOlson-r4h
    @JimOlson-r4h 2 месяца назад

    I want to project this video into the sky like the batman, just to give you the proper credit. BRAVO

  • @trino4965
    @trino4965 7 месяцев назад

    Thanks for making understand easy what I couldn't understand for years

  • @shankar7435
    @shankar7435 Год назад +1

    After watching other some 100 channels vodes, I was hopeless to understand about actual tsl. Now I could easily get it at single shot about it. I knew it's always who teaches make difference but not the other way.b

  • @masoodaziz4338
    @masoodaziz4338 Месяц назад

    Great job and really well explained with simple manner