What is Public Key Infrastructure (PKI) by Securemetric

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 96

  • @SmartSula
    @SmartSula 5 лет назад +338

    Who the hell is Mary? Is Bob cheating on Alice?

  • @danieleberhardt235
    @danieleberhardt235 5 лет назад +34

    This is by far the MOST complete and easy to understand explanation for PKI!! THANK YOU!

  • @loftondarps
    @loftondarps 2 года назад +6

    Simple, concrete, and to-the-point! Thanks!

  • @BortPlate
    @BortPlate 3 года назад +39

    Maybe Bob wouldn't need to hide his messages if he'd simply stay faithful to Alice...

  • @nicole.9889
    @nicole.9889 7 месяцев назад

    Most helpful video explaining PKI. Thanks

  • @mowglivandjungelbok4785
    @mowglivandjungelbok4785 7 лет назад +59

    MARY??? What happened to Alice???? You killed her!? You murderer!

    • @dhruvbaria5985
      @dhruvbaria5985 7 лет назад

      even I was surprised when she mentioned marry instead of alice.

  • @slackdaddyg
    @slackdaddyg 8 лет назад +11

    Informative and succinct, have a thumbs up!

  • @UralaTAO
    @UralaTAO 3 года назад +3

    Let's talk about it over lunch then Haha.
    Good video.

  • @gracefriasforonda8457
    @gracefriasforonda8457 3 года назад +3

    what is the difference between PKI and a digital signature

  • @furkan9864
    @furkan9864 3 года назад +1

    wonderful video, great explanation, saved me a lot of time and frustration

  • @sirk3v
    @sirk3v 3 месяца назад

    thanks for the great video, so how about that lunch?

  • @MelancholyMadoka
    @MelancholyMadoka 6 лет назад +15

    Video starts @ 0:15

  • @shubhambohra2643
    @shubhambohra2643 Год назад

    Very nice explanation. Thank you.

  • @mohitgadekar7365
    @mohitgadekar7365 4 года назад

    Very good explanation...Simple and easy to understand...thnx

  • @mufcabbage7116
    @mufcabbage7116 22 дня назад

    Can you turn the music up I can still barely hear the woman explaining PKI to me

  • @cyber-guru2552
    @cyber-guru2552 Месяц назад

    I am wondering too..Bob must be messing around🤣🤣🤣

  • @connorcink3972
    @connorcink3972 3 года назад +1

    How DO you validate certificates though

  • @andersonlee404
    @andersonlee404 7 лет назад +21

    damn 14 second intro

  • @mohamedfawzy6463
    @mohamedfawzy6463 4 года назад +1

    thank you that was really useful!

  • @pervasivedoubt150
    @pervasivedoubt150 3 года назад

    Fantastic lesson!

  • @arkfreight92
    @arkfreight92 26 дней назад

    What about if someone else is pretending to be bob?

  • @kartaLaLa
    @kartaLaLa 6 лет назад +2

    Is this topic related to SSL/TLS connection??

  • @aaronjohnson8715
    @aaronjohnson8715 4 года назад +2

    That loud intro scared my dog...

  • @gauridanish
    @gauridanish 4 года назад +1

    This question is in the UPSC prelims exam 2020....

  • @armandop2587
    @armandop2587 6 лет назад +13

    Why is Bob so angry?

  • @chaneyourmind6464
    @chaneyourmind6464 7 лет назад

    easy and good explained

  • @doctorasulmohammedigunheal7505
    @doctorasulmohammedigunheal7505 6 лет назад +21

    Those 14 dislikes were definitely coming from angry Indonesians.

  • @shivamanand8998
    @shivamanand8998 Год назад

    Thanks nice video

  • @vipinv8004
    @vipinv8004 5 лет назад

    super explanation

  • @443TRELL
    @443TRELL 3 года назад

    I would use their public key to encrypt an email and they would use their private to decrypt it right?

  • @889bball
    @889bball 5 лет назад

    My key can't encrypt messages, it can only open my door. Why do all these videos keep showing an actual key? What exactly is the key in this scenario..... is it an app?

    • @SMJSmoK
      @SMJSmoK 5 лет назад +1

      in this case, key is a sequence of bits

  • @SuperHamzamadrid
    @SuperHamzamadrid 8 лет назад +2

    great video (Y)

  • @AbdulSamad-hd1sr
    @AbdulSamad-hd1sr 4 года назад

    why is the music required ?????

    • @SimonLausch
      @SimonLausch 4 года назад

      To trigger us.
      A more serious answer (amateur) : The video itself is a very simple explanation. It is easier to invest on concentrating when there is either something to think about (a more demanding explanation) or if you need to invest not to get destracted by the jingle. Ever heard an explanation and thought along the lines of "uh. So boring. What was the answer to the fish riddle again?" ?

  • @saadeddine6418
    @saadeddine6418 3 года назад

    good video thanks

  • @jaydengoonewardene396
    @jaydengoonewardene396 7 лет назад +4

    I need to watch this for school like if you also need to do that

  • @fabitooopestana7541
    @fabitooopestana7541 4 года назад

    I only understand with Bob and Alice...

  • @chihchang1139
    @chihchang1139 7 лет назад +1

    can an attacker not pretend to be the CA?

    • @muralimohan4938
      @muralimohan4938 5 лет назад +1

      @Jnsss - Fortnite Yes. its a problem in Hierarchical trust model (Self-signed certificates). That's why Distributed trust model is used where Digital Certificates are signed by intermediate CAs (Chain of Trust). if the intermediate CAs are compromised, only a small number of clients is compromised. but anyway users do not trust unknown websites.

    • @bigboyhova
      @bigboyhova 5 лет назад

      Yes thats why people should use high assurance certificates from a trusted CA.

  • @kalmkaos
    @kalmkaos Год назад

    thanks queen

  • @jsonkody
    @jsonkody 5 лет назад

    One of worst names is "public key" .. wtf? Why it's called key? It's more like "public opened trezor" .. once u put something in and close it, it can be opened only by it's owner with his private key ...

    • @SMJSmoK
      @SMJSmoK 5 лет назад

      The key analogy is uses because it's something you combine with the message to generate the encrypted message.

  • @AnonymousAGR
    @AnonymousAGR 7 лет назад

    can't you just encrypt with your private key?

    • @dhruvbaria5985
      @dhruvbaria5985 7 лет назад +1

      you can . that comes under symmetric key encryption.

    • @gboddie39
      @gboddie39 5 лет назад

      @@dhruvbaria5985 Not as secure

  • @SullyFan123
    @SullyFan123 9 дней назад

    Comments about Mary bob and alice: 100%
    Comments about Party Communist Indonesia: 0%

  • @NishitaKhatun-h7i
    @NishitaKhatun-h7i Месяц назад

    Anderson Kimberly Moore Kevin Thomas Scott

  • @JamieVesco
    @JamieVesco Месяц назад

    6725 Margot Isle

  • @anapodnebesova9716
    @anapodnebesova9716 4 года назад +1

    ok

  • @HannahMartinez-z1f
    @HannahMartinez-z1f 2 месяца назад

    Taylor Christopher Miller Sarah Jones Eric

  • @Atomo
    @Atomo 5 лет назад +6

    Njir PKI XD

  • @chintamanibadekar8459
    @chintamanibadekar8459 Год назад

    😃

  • @anapodnebesova9716
    @anapodnebesova9716 4 года назад

    wou wowe

  • @MotleyMagee-o4s
    @MotleyMagee-o4s 12 дней назад

    Jones Lisa Martin Brenda Thomas Brenda

  • @長谷川雄太-b6e
    @長谷川雄太-b6e Месяц назад

    Jones Jeffrey Miller Lisa Moore Dorothy

  • @БЕЗВИЗОВЫЙ
    @БЕЗВИЗОВЫЙ 6 месяцев назад

    Ппа

  • @gfyabc
    @gfyabc 8 лет назад +6

    It's either " *a* high level of confidence" or "high *levels* of confidence".
    I swear, the English language will die from a thousand cuts. She sounds like a native English speaker, too! Ugh...

    • @gfyabc
      @gfyabc 8 лет назад +2

      I'm sorry that my predilection for pointing out grammatical shortcomings doesn't sit well with you--really. Whoever produced and posted this video obviously wanted to pass it off as somewhat professional. Hopefully, what I said will help them do so better in the future.
      The English language is circling the shit-bowl fast enough already. Vigilance really _can_ make a world of difference.

    • @juicyclaws
      @juicyclaws 7 лет назад +4

      How something is spelled or pronounced doesn't mean shit if you can understand what is being said.

    • @gfyabc
      @gfyabc 7 лет назад

      Such a belief says worlds about you.
      What you so flagrantly and pitifully fail to realize, however, is the fact that words are all spelled in a standardized manner, and basic grammatical conventions like the one I pointed out (i.e. subject-verb agreement) are observed so that people _can_ understand what is being said. So no, you're dead wrong and couldn't be more so. In fact, what you just said makes absolutely no fucking sense, whatsoever.
      lan·guage \læŋgwɪdʒ\ n.
      The method of human communication, either spoken or written, consisting of the use of words in *a* *structured* *and* *conventional* *way* .
      en.oxforddictionaries.com/definition/language
      Without these rules, structures, and conventions, there _is_ no language, and in the absence of such, everyone would likely come across as asininely and illogically as you just did. Think about it-if you can..
      At this point, however, it truly _doesn't_ matter, not because of anything you just said, but because the organization that published this video appears to have already corrected the error I mentioned initially. Major props to them. I've already up-voted this video..

    • @juicyclaws
      @juicyclaws 7 лет назад +13

      So people learning a new language should in your opinion not be able to communicate with other people because they don't have perfect grammar? Most languages used to have really bad rules, it wasn't until very recently that people decided to standardize the languages, take the nordic languages for example, they used to all be very similar, and at some point everyone was illiterate. Did a language not exist then? That's retarded.
      People should strive for good grammar don't get me wrong. It's important, but not as important as you make it seem. We're humans, we can understand something whether or not it's spelled correctly.

  • @rootbeersodapopparodies9245
    @rootbeersodapopparodies9245 5 лет назад

    Ok for one this no good video. People who have businesses should not use this at the CEO and Board Levels. Who's to say criminals are not already integrated into the networks of those organizations of that are certification authority . Couldn't Bob use the public key to build his own parent host attack based on the fact that Mary is known for sure we know she is going to open what ever you send her its really bad plan full of loopholes and endless codes that could nullify this shit. maybe bob doesnt know that he is part of a Man In the Middle who is mad at mary, so he decides to hack mary's work. oh shit i know her public key to. I guess the way to safe gaurd is have a closed network loop that run the program outside the reach of any data and run the code while a Dedicated Program verifies its contents

  • @anapodnebesova9716
    @anapodnebesova9716 4 года назад

    ok