Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
Vložit
- čas přidán 17. 10. 2021
- Asymmetric Encryption requires two keys: a Public key and a Private key. These keys can be used to perform Encryption and Message Signing. Encryption provides Confidentiality, and Message Signatures provides Integrity and Authentication.
This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
🔐 More details about the course:
classes.pracnet.net/courses/p...
🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
💬 Join Practical Networking Discord
/ discord
🖧 Want to learn how how data moves through a network?
• Networking Fundamentals
Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100 - Věda a technologie
👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
✨ *Full course:* pracnet.net/tls
💲 *Coupon Code* for 50% off: youtube50
This session was great, thank you!
This is easily the most beautiful explanation video on CZcams to date.
I can't thank you enough! Finally, I am beginning to truly understand all those topics that I have been struggling to grasp.
Excellent, Mustafa. Glad it's all "clicking" =)
I watched different videos on CZcams to understand this concept and no one else explained this as good as you did! Great job 👏🏼
Thank you, Shayan. Glad this helped =)
I am a Law Student and was finding it difficult to understand the certain concepts of Information Technoloagy law involving core aspects of cybersecurity. This video simplified everything and explained articulately. Thank you to the author!
I’m 38 years old and a newer IT professional after switching careers. I just recently earned my BS degree in IT and got hired at a major defense company. I’m watching these types of videos for better understanding of specific types of concepts covered in Security+. Also I’ve been personally using technology since the days of original Oregon Trail as a hobby. As my first ever CZcams comment:
These videos are fantastic videos. You deserve way more subscribers than you have. Fantastic explanations man. Bravo.
Hi Roger! Thank you so much for the kind note, I'm honored to be the recipient of your first CZcams comment. =).
Hope things are going well at the defense company =). Let me know if your team would benefit from in person training, I'd be happy to oblige. =)
The best explanation and video I've seen on secure communications using asymmetric and symmetric keys, the illustrations and pacing of explanations are exemplary!
Again, I am amazed about the nitty gritty details this video is providing. The author starts with basic concept and take it to another level once the basic is done. This increases our horizon in which the techniques can be used. Well done.
Thank you, Santosh =) Glad you liked this video!
In a few minutes you managed to simply explain what hours of other videos managed to complicate. Thanks!
Another gem :) Thank you for the uploads Ed. Every video is packed with useful knowledge.
Thank you, Peter. Glad you're enjoying all of these =)
FINALLY sometime who actually understand and know how to explain things PROPERLY
You are a great tutor and you’ve just got a subscriber, good sir. I’ve read tens of articles about ASE and this video is way better than any of them combined (although some were more about the actual functions than the general idea)
Good Teacher! Very rare to see someone taking difficult concepts and making it simple for others to understand better.
Thank you for explaining each topic with such clarity! This is very very helpful.
Super work - probably the best SSL videos on CZcams.
Concise, simple, and visual. Great video!
I can't thank you enough for the detailed explanations, providing necessary intricate details in a lucid and understandable way.... 🙇
Every clear and easy to understand, thanks for sharing!
I was legit mind blown after seeing this video wonderful explanation
You have really simplified this mystery for me. Thank you!
New sub here. I'm studying for the A+ after getting the Google IT Support Professional cert, and ran across your channel. It's really helping me fill in the gaps on some big topics I was confused on, and helping me understand more of the basics so I can in turn understand some of the more advanced stuff for the Network+ and Security+. I seem to be learning these concepts the way you are teaching them. Thank you.
Thanks for the great video. I found the factors P and Q for the number 1909: P=23, Q=83. To do this, I used the "Quadratisches Sieb" factorization procedure, which operates as follows:
First I calculate the square root of 1909 which gives the value "43.69".
After that I set the factors P = 43 and Q = 44.
Now the calculations follow.
If I calculate P*Q (43*44), then this results in "1892". Since this value is smaller than "1909" I increase Q by one -> Q=45.
Now I calculate again the product P*Q (43*45) -> "1935". The value is now greater than "1909", so I decrease P by the value 1 -> P=42.
I follow these rules until the value 1909 is calculated.
Summary:
- P*Q (43*44) -> 1892 < 1909 -> Q+1 (45)
- P*Q (43*45) -> 1935 > 1909 -> P-1 (42)
- P*Q (42*45) -> 1890 < 1909 -> Q+1 (46)
- P*Q (42*46) -> 1932 > 1909 -> P-1 (41)
.....
- P*Q (23*83) -> 1909 = 1909
I hope this is helpful.
Great write up! This proves 2 things:
1. Any key can be solved via brute force
2. Brute force doesn't necessarily require trying _every_ possibility, there are shortcuts you can take as you did =)
Going to pin your post, to bring more attention to your write up and hopefully your channel. Good stuff!
@@PracticalNetworking Thank you for pinning. The great thing about the algorithm is also that this can be divided into several threads very well. So you could crack your RSA-1024 key on a graphics card quickly :-)!
@@encryptionforbeginners96 The difficulty scales exponentially as the key size increases. To date the 1024 bit "RSA Number" factorization challenge has yet to be solved.
en.wikipedia.org/wiki/RSA_Factoring_Challenge
en.wikipedia.org/wiki/RSA_numbers#RSA-1024
Ummm you're sort of a genius
Very good clear explanation. Thanks.
Thanks again for making this available to us, just finished the playlist enjoyed it, well explained.
Glad you've enjoyed it! Next video releases Monday =)
I have never comment for any video EVER! but you are amazing! Simple, short and sweet! THANK YOU SO MUCH! WOW!
Perfect explanation.
Thanks so much
This video is awesome, congratulations guys! You explain complex topics in a very simple, elegant and didactic way.
Glad you enjoyed it, Tony =). I'm sure you'll enjoy the rest of the Crypto series:
czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
Just wow, u explained everything so well
My god, I can't believe I had to search so long for a video that makes sense for beginners. Subscribed.
thanks, no one else explained this as good as you did.
Thanks for this great lesson which very clearly explains the topic!
Best video yet, BY FAR. All well explained, and following all the principals that we should have in count when learning encryption and informatic security.
Thanks bro!I struggled a lot to find out this stuff,but you help me a lot just in a few minutes!You are so amazing!
Excellent Jeff! Glad it makes sense now. Cheers!
this is the most practical explanation of cyryptography in the entire CZcams.... thanks for such a simplified explanation!!
Another great video in Practical TLS series! Thank you.
Thank you, Martin. Glad you enjoyed it!
This video is awesome in explaining this concept and how hashing and encryption come together in PKI as this was what Ive been struggling to grasp in terms of the complete image! Awesome job.
Thank you for your time and effort for sharing us all this knowledge for free.
the content you explain is in order and clear to the subject... easily understandable...
I have taken many tutorials online, watched many educational videos but your tutorial is so different. You are a great teacher sir. I dont understand how but the topic is explained in depth and at the same time in a very brief and concise way.
Thank you very much! Keep up the good work!
Excellent explanation!! Thank you very much!!
Thanks, saved my life with such clear explanation
clearest explanation ive watched. thanks!
no words to explain. excellent series
You always know how to make life brighter for everyone you know. Thank you so much for spending your Golden time to make such useful Video. these Keys are not easy to understand and to explain but you make it so much easy to understand. Thanks, waiting for your next Video. ✌
Thank you for the kind words, Rafay. Glad you're enjoying this content =)
Very nice. Concise, clear with simple and effective animated diagrams. Not sure if it gets any better than this.
Glad you liked it! =)
You know why this video is the Best?
Because it doesn't hide the fact you can Encrypt with public and Decrypt with private
but ALSO Encrypt with private and Decrypt with public
May are too scared to say that.
If you enjoyed this video, you'll love my video on RSA where I prove exactly that with the math =)
Absolutely brilliant content! Thank you for taking the time to create this!
You're very welcome. Glad you enjoyed it.
You explain really well, after going through few videos and still not grasping the concept your video and explanation helped me understand this concept well. Thank you for this video.
This is the best video in the internet explaining this topic.
So many explanations go right over the actual essence of how these keys interact to encrypt and decrypt. Almost as if they don't even know it themselves, just regurgitating shit from a textbook. THANK YOU
You're welcome, Alan =). I too agree I've heard many people attempt to explain this by simply regurgitating what others have said... agreed 100% =).
this was the most amazing explaination ive ever heard!!!! thankyou sooooooo muchhhh
Thank you for making it so easy to understand 🙏
You’re welcome 😊
This video is fantastic. Thank you.
Incredible didactics method. Congratulations
This is one of the best explanation of the difficult subject.I was struggling to understand the base of this topic..Now it's cleared.Thank you very much..!!
Thank you so much, you made my day, I've been reading bunch of articles about it, there was unclear idea to me (which I can use the private key to encrypt the data and use the public one for decypt) by your video you made the pic clear to me
Wohoo! Glad I could help. Glad it makes sense now =)
agree, this is the best video series explain how the ssl/tls and encryption works.
Thank you, thank you, thank you! I finally got how it all works!
That moment you said "why don't we use a asymmetric key to share symmetric key ?" had me mind blown lol
o one else explained this as good as you did! Great job 👏🏼
What a great explanation. Finally it all make sense. Thank you for providing this video. Really really helpful.
Cheers Fuady =) Glad it helped! Thanks for the kind words.
Thanks for the great explanation my man!
Most valuable video i have seen in this year 🎉🎉🎉🎉 am really astonished ❤
Best explaination I had seen out there! Thanks!
The way you explain things uses the right level of simplification, to facilitate understanding, but doesn't get lost in the details. Thanks for your great work, much appreciated! (I always had challanges to understand the difference between the concept of signatures vs. bulk encryption, but this visualization of yours, with the explanation helped a lot!)
Glad this helped make it click. Thanks for the kind words, Gergely =)
Such a perfect and clear explanation
Glad you enjoyed it!
Your videos are really super useful and interesting.thank you for the time you dedicate in making these contents.greetings from Italy.Paul.
Hi Paolo! Glad you enjoyed them! Thank you for the kind words. Cheers!
Incredible performance, man needs a solid understanding of encryption to explain it in such a way. Well done.
Glad you enjoyed it =).
Thank you for the video.
Omg FINALLY an explanation of public/private keys that made perfect sense to me!! Thank you!!
Glad this one helped, Scott =). You're very welcome.
I first tried to study Public and Private keys encryption back in 2002 after passing my Java 2 certification, but could not understand the concept. I then kept struggling with understanding how encryption and SSL/TLS works. Today this mystery is solved forever. I would like to thank the creator of this wonderful course.
I am currently reading a book on cryptography and hash functions and this is a really good illustration. Well done!
Thank you, momo. =)
the series are awesome! Thank you for your content
You're very welcome. Thank you for supporting the channel !
This channel has become my go to for catching up on stuff I haven't, previously, fully understood. The simple breakdown of the subject matter makes for easier digestion. 👏👏
Welcome, Frack =). Glad you're enjoying this content and how I present it!
Congratulations, you won the giveaway. Message me on discord to claim your prize -- pracnet.net/discord
@@PracticalNetworking lovely, thank you. Will pm later.
Thanks for the course. 😀
Great explanation! Thank you.
You're welcome, Jugjiwan!
Thank you so much for your explanation. It is very clear and accurate. 🎉🎉🎉
The best explanation I came across after a lot of reading.................Thanks a lot sir
Thanks, a lot. A great video.
Took a break from binge watching "the office" only to find Pam and Jim in the encryption video. 😄
Superb! very well explained
Thank you so much. Good explanation.
Glad you enjoyed it !
Ed, you are absolutely the BEST!. I'm finishing a 2 year degree at Edmonds and feel like I've learned little (all during covid, virtual) and frequently refer back to your amazing instruction. You def have the calling of a professor (not to mention your obvious chops as an engineer).
Thank you so so much for the great explanation 😊
You're very welcome.
Amazingly tutorial 👍the best all my doubts are cleared
Glad to hear, Sandhya. Cheers !
Boy, this video indeed demonstrated the mission of the channel as stated: hitting that sweet spot between basic and too complex. I often find myself frustrated right in that "Twilight Zone", googling and switching between articles and videos (only to become more frustrated).
As someone else was saying, this made JWT make sense as well...after reading through stuff that was starting nicely, bulding up nicely, only to then muddy the waters in an epico style 😁. Was tempted for the first time to read the RFC.
Bookmarked, subscribed, and will certainly chek the other videos. Thanks!
Thank you for the kind words! Glad you enjoyed this series.
Thank you for supporting the channel =)
superbly explained
seeing your videos everyone will switch his/her career to networking 😍
Wow, great explanation, easily understandable.
Thank you, Sravana. Glad you enjoyed it !
Amazingly done again: using Pam's public key to encrypt so she alone can open it with her private key. Wow!!!
Solid solid SOLIDDDD video. Thanks !!!
Woooooooonderful.
I am amazed about deep details this video is providing.
Well Done,
Thank you so much!
Glad you enjoyed it, Hosein =) You're very welcome.
I am currently enrolled in Cisco's cybersecurity course and I always look at this particular video whenever I get symmetric and asymmetric and public and private keys confused with one another. Very very good tutorial.
This is the BESTTT lecture to Public & Private key & how TLS works... Thanks a Lot Man 😊❤️😊
Eurica! Finally I got it !!!!!! Thank you very much dude !!!!!
Great way of teaching Thank you
You're welcome.
Thank you so much!!! Now it is understandable for me.
This is just brilliant way of explaining 👏
Thank you, Madhu!
excellent explaintion👍👍👍
Another great lesson. Actually, this is fantastic! Thanks!
Thanks Ward =). Cheers!
Excellent video, finally understood these concepts!
Glad to hear, Karthik =). Cheers!