Excellent explanation. Have to understand the fundamental concept of the Asymmetric key exchange. Maybe some people get it without exploration, but even so, it helps to understand everything with the CA and RA roles.
Around 5:20, you say that You request Alice's certificate from CA. This is incorrect. In SSL/TLS, You never ask Alice's certificate from CA. During the handshake, Alice sends her certificate to You and You verify Alice's certificate from the CA's Root Certificate.
+Subash Manikandan Mr., that is true for SSL (a particular implementation of a PKI concept), but could it be that she is just giving a general definition of the PKI concept? Am i wrong? Cheers.
+decasT , yes I guess she was giving general information about PKI. the point of Lucas is correct and is great to keep that in mind, since some other users that are just starting on the PKI world may get confuse. However it is a great video to understand PKI basics, we are all human looking for perfection but we make mistakes.
Still a question, that means there is some relation between public and private key. Else a msg encrypted with public key cant be decrypted with private key.
you created your own private key to use to decrypt messages that other ppl are sending to you. these messages they sent to you were encrypted with your public key on their computer before they sent them.
One of the BEST video at explaining a subject! very clear, precise/detailed, visual presentation 100%. SIMPLY AMAZING!
The best video explaining PKI! Thank you!
Great video, felt like someone glued the understanding of PKI. I can explain it even in my sleep. Thank you
Excellent explanation. Have to understand the fundamental concept of the Asymmetric key exchange. Maybe some people get it without exploration, but even so, it helps to understand everything with the CA and RA roles.
Very helpful and more informative thanks for sharing the video
Thank you... First time i got clear picture on PKI by this video
Around 5:20, you say that You request Alice's certificate from CA. This is incorrect. In SSL/TLS, You never ask Alice's certificate from CA. During the handshake, Alice sends her certificate to You and You verify Alice's certificate from the CA's Root Certificate.
You are correct!
+Subash Manikandan Mr., that is true for SSL (a particular implementation of a PKI concept), but could it be that she is just giving a general definition of the PKI concept? Am i wrong? Cheers.
+decasT , yes I guess she was giving general information about PKI. the point of Lucas is correct and is great to keep that in mind, since some other users that are just starting on the PKI world may get confuse. However it is a great video to understand PKI basics, we are all human looking for perfection but we make mistakes.
She says this. If you watch the video again at 5:07
A bit of a moot point really.
During SSL, you initiate the handshake so technically it is you who is asking and Alice is sending.
Top notch presentation. Thank you.
Excellent video!
Great video, informative, and you have a perfect voice for instruction.
Very nice video tutorial, explained in really simple words. Thanks
great video
The way she says Beautiful isn't it while highlighting the hexadecimal bits. I just fell in love.
Thank you. You explained some of the material better than Cisco net academy
great video. Very clear explanation about PKI. Thankyou
thank you for this amazing, Excellent presentation
Hats Off !! Explanation is top notch!!!
Very nice video, in a brief and precise manner, thanks for uploading, you made my day!!
Thank you, this really help me!
Nicely explained and nice voice
this video is nice...
Contains all the important information and concept :D
Used it to repeat the stuff I learned for class
Great job explained concepts. Would love to see some real world examples at ta terminal of how to go about each of these concepts.
Great video. Concepts were very well explained
Real nice one.
She is Great! Thanks make a lot sense now!
very well explained....
Very well explained. Thanks for the video and sharing it.
Where are the other videos? Thanks for posting this one. It was a big help.
app.pluralsight.com/author/lisa-szpunar
Very nicely explained...thanks.
Great video
Nice easy explanation
just got it correctly ..thank you so much
BEST TEACHER EVER!
Ok
Great Video..Thanks a lot.
nicest part about this video is her VOICE :)
At 8:42, why would expired certs be on the CRL?
Nice video. It really helped me a lot.
thank you .....
RadwanoVetch Great video well done thanks for posting my classmates at College got a lot of help out of it
Still a question, that means there is some relation between public and private key. Else a msg encrypted with public key cant be decrypted with private key.
Hell yeah makes sense now thanks!
Thanks a lot Mam so much !!!
Thank you for your sharing :)
love this.think you.
If I created both the public key, and the private key; then how is it that only Alice has the private key?
you created your own private key to use to decrypt messages that other ppl are sending to you. these messages they sent to you were encrypted with your public key on their computer before they sent them.
How is it decided that which CA to contact ? On what basis ?
Is PKI compatible with HAProxy?
Thanks
can you send this ppt actually, I have an presentation in this week about public key infrastructure.
thanks
that awkward moment that no one noticed 5:50