Simple and clear explanation. Superb Can you explain HTTPS in the same way from syn packet to the session keys generation(Encrypted data Transfer) which would be very useful in today's world. Below are some of components CLIENT_EARLY_TRAFFIC_SECRET CLIENT_HANDSHAKE_TRAFFIC_SECRET SERVER_HANDSHAKE_TRAFFIC_SECRET CLIENT_TRAFFIC_SECRET_0 SERVER_TRAFFIC_SECRET_0 EXPORTER_SECRET MASTER SECRET SHARED SECRET PRIVATE SECRET and there are many. So come you come up with this HTTPS in detail ( not in brief) Pleaseee
thanks so much
after understanding your previous video on primitive roots and discrete log problem this just clicked in
You are most welcome
Excellent Explanation Sir ,pls upload machine learning,data science,daa playlists..
Sure.. after I learn those subjects in depth I will create video lectures. Thanks for the feedback
Simple and clear explanation. Superb
Can you explain HTTPS in the same way from syn packet to the session keys generation(Encrypted data Transfer) which would be very useful in today's world.
Below are some of components
CLIENT_EARLY_TRAFFIC_SECRET
CLIENT_HANDSHAKE_TRAFFIC_SECRET
SERVER_HANDSHAKE_TRAFFIC_SECRET
CLIENT_TRAFFIC_SECRET_0
SERVER_TRAFFIC_SECRET_0
EXPORTER_SECRET
MASTER SECRET
SHARED SECRET
PRIVATE SECRET and there are many.
So come you come up with this HTTPS in detail ( not in brief)
Pleaseee
Simply beautiful 😭
Thank you!!
Awesome content Sir
very nice explanation
great sir
But how do we ensure the integrity of the the shared key ?? I mean the middleman can manipulate the key since it’s insecure