PKI - trust & chain of trust -why, who and how?

Sdílet
Vložit
  • čas přidán 2. 02. 2018
  • What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?
    In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.
    I will use an example how these models work.
    Playlist: Advanced Cryptography -
    • What is digital signat...
    Playlist: Basic Cryptography
    • Private Key Encryption...
    Please subscribe to my channel!
    Please leave comments or questions!
    Many thanks,
    Sunny Classroom

Komentáře • 118

  • @shalipoto
    @shalipoto Před 2 lety

    Your tutorial was very clear with just the right amount of verbal and visual info. Thank you !

  • @justcalcio747
    @justcalcio747 Před 3 lety +2

    It's creepy how good you are at explaining things; i watched 3 of your videos and i always understand the key concept, thank you sunny

  • @alexchang435
    @alexchang435 Před 4 lety +6

    I have seen a lot of resources online about PKI. This is by far the best one in my opinion. The concepts are brilliantly explained in a simple and concise manner. Very easy to understand. Thank you!

    • @sunnyclassroom24
      @sunnyclassroom24  Před 4 lety +1

      You are welcome and thank you very much for taking the time to write such nice comments and it means a lot to me. I appreciate it very much.

  • @katalunec
    @katalunec Před 5 lety +3

    Thank you for the tutorial. Everything is so well explained.

  • @getanehgeto7873
    @getanehgeto7873 Před 3 lety

    Very amazing, wonderful and extremely pretty style of teaching process .thanks you sunny from bottom of my heart . God bless you!

  • @sudeshnapal5213
    @sudeshnapal5213 Před 3 lety +1

    Awesome content.Finally this is the place where explanation was super simple

  • @hikkyso
    @hikkyso Před 5 lety +7

    Thank you Sunny! I just happened to find your video when I was looking for some information about PKI, and your video helped me a lot about understanding the concept. I watched some more videos that you created and I really liked them. You explained such complicated things rather simply and very clearly! I am taking Info. Systems Security online course at a university. I'm sure that I'll come back to watch other related videos as well!

  • @ethiohagere1993
    @ethiohagere1993 Před rokem

    i have never seen such kind of simple and understandable way of explanation. Your are my hero. i am waiting your new lecture video every time. please keep it up and if u want go througth different programming languges , we will wait patiently.

  • @zidanetribal2343
    @zidanetribal2343 Před 3 lety +1

    Wow! thank you Sunny for the high quality lecture :)

  • @narayanasai
    @narayanasai Před 3 lety +8

    ***** Warning to Learners: Sunny Class room may cause addiction more than Netflix ...be prepare for it.*** Thank you Sir for great tutorials.

  • @staj
    @staj Před 4 lety +2

    Brilliantly Concise Explanation yet again. Thanks a lot Sunny!

  • @101appsCoZa
    @101appsCoZa Před 4 lety +1

    another short, packed full of information, and well explained, video. thank you.

  • @fathergascoigne4609
    @fathergascoigne4609 Před rokem

    I'm preparing for Security+ and this helped a lot. Thank you Sunny.

  • @nitinsharma93ful
    @nitinsharma93ful Před 5 lety +22

    Well explained, clear and crisp... Hats off Sir... Thank you for amazing tutorial.

  • @arashvermahmood7961
    @arashvermahmood7961 Před 3 lety

    Thanks Sunny for this concise and useful tutorial.

  • @juanmanuelcruzaguilar754

    Very helpful. I am trying to understand PKI and this definitely helps. Thank you

  • @asoteico9528
    @asoteico9528 Před 4 lety

    Greatly done Sunny...!!!

  • @bobbybeduya
    @bobbybeduya Před 4 lety +11

    Illustrations are helpful. Complicated theories explained in a simple way.

  • @bromadski
    @bromadski Před 2 lety

    Thank you Sunny. You are great.

  • @0marfans
    @0marfans Před 3 lety +1

    You're the best Sunny, thank you!!

  • @HK-sw3vi
    @HK-sw3vi Před 2 lety

    very clear and thorough explanation

  • @yashrana7735
    @yashrana7735 Před rokem

    Sunny thank you for such easy explanation of concepts and topics.

  • @roneru
    @roneru Před 4 lety +1

    Finally found something that explains it well. Thanks!

  • @jimmylee3760
    @jimmylee3760 Před rokem

    thats awesome. please keep up the good work!

  • @taqdirsingh
    @taqdirsingh Před 2 lety

    excellent knowledge and very easy to understand the details behind.

  • @emmanouilmorfiadakis118

    Great Explanation.Thank you

  • @trendyniro
    @trendyniro Před rokem

    Simply explained. Thank you 👍

  • @angelazhang9082
    @angelazhang9082 Před 2 lety

    Great explanation! Thank you!

  • @sivagopal6447
    @sivagopal6447 Před 2 lety

    Sunny ! you're so awesome. Thank you.

  • @DominicMotuka
    @DominicMotuka Před 2 lety

    Easy to digest. Thank you.

  • @migueledes10
    @migueledes10 Před 3 lety

    Excelent explanation, thank you for helps us!

  • @danielgwj95
    @danielgwj95 Před 4 lety +2

    Thank you for this video !It really helped me understand the concept of root CAs.

  • @bittun1607
    @bittun1607 Před 5 lety +1

    Explained in the best possible way .... Very nice

  • @parachurimonica6910
    @parachurimonica6910 Před 4 lety +3

    Very well explained about the topics in a much simpler way with nice illustration

  • @birensin
    @birensin Před 2 lety

    Thanks for explaining.

  • @firasatef528
    @firasatef528 Před 2 lety

    Thank you sunny!

  • @sththapa416
    @sththapa416 Před 5 lety +2

    Thanyou sir.. You are the best in the world.. Love you so much

  • @r0sh4n0
    @r0sh4n0 Před rokem

    thank you very much sunny 😊

  • @giovanninabil6950
    @giovanninabil6950 Před rokem

    thanks Sunny, you never disappoint!
    do you by any change have videos explaining the Web of Trust model used by PGP ?

  • @happypeter1983
    @happypeter1983 Před 4 lety

    Concise and Precise as always

    • @sunnyclassroom24
      @sunnyclassroom24  Před 4 lety +1

      Thank you for watching! Check out my other videos please!

  • @SheshadriMadhu
    @SheshadriMadhu Před 6 lety

    Thanks a lot for the videos, they are clear and helpful :)

  • @jayevans759
    @jayevans759 Před 5 lety +3

    Great. Thank you.

  • @danyellbaptiste1055
    @danyellbaptiste1055 Před 5 lety +3

    Very Good Tutorial, Thank you Sir!!

  • @g-shubham
    @g-shubham Před 6 lety +4

    Thank you sir for this video✌

  • @Skynet_the_AI
    @Skynet_the_AI Před 3 lety

    Thank you for this tutorial guide lesson

  • @pdaniele88
    @pdaniele88 Před 5 lety +1

    Hi, thank you for your tutorial. I have a question. The gmail digital certificate needs to be created by owner or by the CA authority ?

  • @chanurahemal
    @chanurahemal Před 3 lety +1

    Best video about this concept 🙏

  • @itmemo8617
    @itmemo8617 Před 4 lety +1

    You are the best on CZcams!

  • @jindagi_ka_safar
    @jindagi_ka_safar Před 4 lety

    Thanks it was a great video

  • @articwolf8377
    @articwolf8377 Před 3 lety

    Thank you for your help

  • @halason1
    @halason1 Před 3 lety +1

    Sunny your awesome videos help me so much.

  • @bluerfoot
    @bluerfoot Před 4 lety +1

    I love sunny and I love his music.

  • @ameyapatil1139
    @ameyapatil1139 Před 3 lety

    brilliant

  • @mayadebij5873
    @mayadebij5873 Před rokem

    Question about the example: What I saw on the PC only root CA public key was installed, but the certificate is issued by the intermediate CA, without installing the public key of of intermediate CA, how can the PC authenticate the received certificate?

  • @alkamalusare2549
    @alkamalusare2549 Před 5 lety +2

    Awesome

  • @relaxhub4178
    @relaxhub4178 Před 2 lety

    Does the browser only check the validity of the self-signed certificate of the root CA? And if it's valid, it automatically trusts all intermediate CAs without verifying them?

  • @valb4184
    @valb4184 Před 5 lety

    Sunny, question - you mentioned that purpose of PKI is to facilitate a safe transfer electronic transfer of data over the internet, is this definition same for SSL? Thanks.

    • @stevemaloney7305
      @stevemaloney7305 Před 5 lety

      To understand how SSL plays in this, you need to go a little deeper. This video will explain the role of SSL in the trust model: czcams.com/video/heacxYUnFHA/video.html

  • @marcosalameh8677
    @marcosalameh8677 Před 2 lety

    Amazing!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @dayumnson9769
    @dayumnson9769 Před 3 lety

    Is there a mistake in this video? At 3:56 you are saying that the hierarchical modell is limited because once the private key is compromised certifitcates will become worthless.
    But that's exactly the same issue with the distributed ones? I can't trust a single certificate if the root is compromised?

  • @Chroperafox
    @Chroperafox Před rokem

    How is the deletion of a certificate (revocation) carried out in a chain of trust if not all subscribers who use the certificate have access to a CRL or connection? Are there alternative ways or how is this solved?

  • @kerrycooper3187
    @kerrycooper3187 Před 2 lety

    Thanks

  • @mattmarinelli8410
    @mattmarinelli8410 Před 4 lety +1

    much more in depth than Messer!

  • @mdziaurrahman3392
    @mdziaurrahman3392 Před 4 lety +4

    Thanks for your video, I was in mid of a confusion as my client sent a certificate which was not working in my modem. Suddenly I found in video that a ROOT CA's supplier and supplied to must be same. I checked and my certificate was wrong. Thanks again.

  • @techch3510
    @techch3510 Před 3 lety

    how to become CA/intermediate-CA/Delegated signing authority? any CA will provide Signing certificate (certificate with signing right ?

  • @arber10
    @arber10 Před 5 lety

    Thank you for your videos. These are great! Question: When gmail send his certificate, which is signed by the intermediate CA, does he send the CA also to me (client)? I might have the global CA to verify the intermediate CA later on, but I might miss the intermediate CA on my pc. So how does gmail make sure, I get access to the intermediate CA too?

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety +3

      Good question. Public keys of most major intermediate CAs and root CAs have already been pre-installed in your browser (Chrome, firefox or Safari, even Edge :)) , Gmail server would not send CA to you. The certificate has the signature of CAs. Signature is verified by the public key in your browser. All big companies (such as Google) have even been the Intermediate CA themselves.
      If your browser has no public key of intermediate CAs for your service, will not be displayed. That is why we do not trust

    • @arber10
      @arber10 Před 5 lety +1

      Sunny,
      thank you so much for your explanation.

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety

      You are welcome!

  • @albertkristian6502
    @albertkristian6502 Před 5 lety

    What's the purpose of hierarchical trust model if for somehow the private key of the root CA's private key is compromised? Does it mean that all digital certs signed for intermediate CA are compromised and eventually digital certs signed for clients are also compromised?

    • @sunnyclassroom24
      @sunnyclassroom24  Před 5 lety

      you are correct! if the top dog or intermediate CAs lost their private key, it would be definitely a bad thing for that company. However, it does not mean all clients are compromised. It only means that you cannot truly believe are truly encrypted. Anyway, as a user, we never trust a site we do not know. Simply we do not easily put credit card # or our confidential information to any site. We do not know if their private keys are already stolen. The original design is always "perfect", but we live in a "real" world. I don't disagree with you.

  • @leksandradubovik6291
    @leksandradubovik6291 Před 4 lety

    thank youuu!!!!!!

  • @pcislocked
    @pcislocked Před 4 lety +1

    Do you think installing a third party certificate could have the possibility of breaking this trust chain? In some MITM attacks(used cain for arp poisoning to be specific, rather basic stuff, I was trying to learn how to use it) I'm used to install my own self signed certificate to the test machine so I don't have to deal with chrome alarming me at every page. Also, some school stuff requires you to install certificates onto your windows or android device, and even student tablets and smart board computers have meb's(milli eğitim bakanlığı - ministry of national education on Turkey) certificates pre-installed on them.

    • @sunnyclassroom24
      @sunnyclassroom24  Před 4 lety +1

      for a public website, you need a third party certificate. For a website for a small group of people, you can use the self-signed one. The function is the same. However, there might some other differences I don't know. I really appreciate your insights and knowledge.

    • @pcislocked
      @pcislocked Před 4 lety

      @@sunnyclassroom24 Thanks. my English might be bad so I'm gonna ask it shortly
      will installing a third party root certificate to a system possibly break the security of all websites? maybe possibly through tools like cain&abel and stuff. since all other websites use different root certs it's not certain on my mind lol

  • @motiondesign2501
    @motiondesign2501 Před 2 lety

    Sunny make video about how u creat dot1x authentication using server radius on windows server 2012 ,

  • @konstantinrebrov675
    @konstantinrebrov675 Před 5 lety +28

    Watch in 1.5 speed.

    • @sunnyclassroom24
      @sunnyclassroom24  Před 4 lety +9

      I will speak faster in the future.

    • @windwindson2871
      @windwindson2871 Před 4 lety +9

      @@sunnyclassroom24 I am much appreciated you speak slowly. Not all the viewers speak English as their mother tongue.

  • @krishnachaitanya7435
    @krishnachaitanya7435 Před 5 lety +2

    I wonder is this method is what used in Blockchain?

  • @rajeshgeorge6093
    @rajeshgeorge6093 Před 3 lety +1

    simplified ... best

  • @StealthyNomadica
    @StealthyNomadica Před 4 lety

    Under mattress is more secure.

  • @SandeepKumar-bv6wl
    @SandeepKumar-bv6wl Před rokem

    Trustworthy reason is SlA and compensation they offered by CA

  • @urvashikesharikeshari7371

    I want hindi

  • @Crux161
    @Crux161 Před 3 lety

    ...So......,How to break the global internet... 🤣

  • @myokokozaw8962
    @myokokozaw8962 Před 4 lety +1

    Thanks