Introduction to Cryptographic Keys and Certificates

Sdílet
Vložit
  • čas přidán 16. 05. 2024
  • This video provides a brief introduction to symmetric and asymmetric keys and certificates.

Komentáře • 304

  • @karthik14141
    @karthik14141 Před 6 lety +58

    My best 18 mins spent on internet today. Thanks Sir..

  • @pkelly20091
    @pkelly20091 Před 5 lety +6

    amazing explanation, much appreciated

  • @dr.octothorp1536
    @dr.octothorp1536 Před 5 lety +1

    Indeed. Best 18 min of my day as well. Well done. Great images and description.

  • @alexmook6786
    @alexmook6786 Před 2 lety +2

    By far the best description of the certificate process I haver seen.....a fricken gem of a description!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thank you very much for your feedback, Alex. I’m glad you liked it.

  • @ameyapatil1139
    @ameyapatil1139 Před 3 lety +3

    Absolutely beautiful ! Hands down the best tutorial seen !

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      Wow! Thank you for the great compliment, Ameya. I’m glad you liked.

  • @AndyMGar
    @AndyMGar Před 6 lety +5

    After days of searching on this topic this is, by a country mile, the best explanation of encryption I have come across. Paul, as someone who has run many training courses myself, you articulate difficult concepts exceptionally well. Andy.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 6 lety +1

      Thank you for you kind words, Andy. I'm glad it was helpful and humbled by your comments.

  • @sovit991
    @sovit991 Před 6 lety +1

    great explanation!!! easy, crisp and concise...way to go!!!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 6 lety

      Thank you very much for your kind comment. It is great to hear.

  • @s0041464
    @s0041464 Před 4 lety +1

    All your videos are excellent and well thought out. Thank you!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      I appreciate your feedback. It means a lot to hear that. I'm hoping to get time to do more soon. Again, thank you.

  • @tkouhsari
    @tkouhsari Před 3 lety +1

    You have a gift for turning a complex concept into a simple explanation!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      Thanks you very much for your feedback not means a lot to me.

  • @mikexue5104
    @mikexue5104 Před 4 lety +1

    the most intuitive explanation for general idea. hat off to you, Paul.

  • @vdogra1
    @vdogra1 Před 4 lety +1

    Thanks Paul for this great video. You have a gift of explaining complicated concept with ease

  • @jerrychinweze1698
    @jerrychinweze1698 Před 3 lety +1

    This tutorial is worth a million dollars. Thank you Paul!

  • @sharon2416
    @sharon2416 Před 3 lety +6

    Thank you so much for this coherent explanation!! You're such a great teacher

  • @LocoCioco
    @LocoCioco Před 2 lety +1

    Thank you for this, Paul. By far the best explanation of the topic

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thank you for your kind words, LocoCioco. I’m glad it was helpful.

  • @HS-bb5vm
    @HS-bb5vm Před 2 lety +6

    That's the beauty, you explained so clearly. Thank you.

  • @jamesfeverett
    @jamesfeverett Před 4 lety +8

    Very informative and clear. This is of the quality of paid resources. Thank you for sharing!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Thank you for your very kind comment, James. I’m glad you enjoyed it.

  • @mfundodlamini8544
    @mfundodlamini8544 Před 4 lety +1

    You are the best Paul Turner, well explained.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Thank you very much for the kind feedback, Mfundo. I'm glad it was helpful.

  • @michaellai5549
    @michaellai5549 Před 6 lety

    Despite numerous encryption videos no CZcams, I believe this is the clearest and succinct one to explain these concepts in such as short period of time...bravo~

  • @42svb58
    @42svb58 Před 3 lety +2

    One of the best videos on intro to crypto keys and certificates!

  • @adamjohnson9206
    @adamjohnson9206 Před 2 lety +2

    Finally a tutorial that explains the relationship between the public and private key. Thanks. So many videos take for granted that the public key is sent but in the end the private key magically decrypts 'somehow'. This makes it so much easier to understand.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thanks for the feedback, Adam. I’m glad you found it helpful.

  • @mdk124
    @mdk124 Před 5 lety +2

    This was very helpful in understand CAs ! Thank you so much!

  • @sanjayt9501
    @sanjayt9501 Před 2 lety +1

    Very detailed and easy to understand explanation - thank you for taking time and effort to make this!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      I appreciate you making the time to give your feedback, Sanjay. I’m glad you liked it.

  • @KamalMettananda
    @KamalMettananda Před 3 lety +2

    Thanks a lot, it recapped everything and refreshed all my older memory...

  • @ashwinraj8683
    @ashwinraj8683 Před 3 lety +4

    The best style of progression in teaching encryption concepts. Wow!

  • @catch.2022
    @catch.2022 Před 3 lety +3

    This is probably the best video I have watched on keys! (I've watched many and never understood it)

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thanks a bunch for that feedback, Ajay. It means a lot to me that it was helpful to you.

  • @sujeetbaranwal9085
    @sujeetbaranwal9085 Před 6 lety

    Awesome video Sir, Please post more. for beginners like us, its a great source of info.

  • @balajiparthasarathy6221
    @balajiparthasarathy6221 Před 2 lety +1

    Great tutorial Paul, showing step by step how secure communications evolved on the internet.

  • @retro_escape2969
    @retro_escape2969 Před 2 lety +1

    Very good explanation on the topic. Thank you for offering up this training for free.

  • @skr0nytbe389
    @skr0nytbe389 Před 4 lety +1

    Excellent Video and great Effort Paul. As one of the comment already pointed out, I don't know even a paid training would be able to teach in such detailed manner. I appreciate your effort. Keep it up.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Selvakumar, thank you for the very generous comment and your encouragement to keep creating videos. It makes it all worth it.

  • @Sama-jj4vm
    @Sama-jj4vm Před rokem +1

    Absolutely beautiful . By far the best explanation of the topic.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před rokem

      Thank you for your kind words, Sama. I’m glad you found it helpful.

  • @KSanofficial
    @KSanofficial Před rokem +1

    The analogy with a safe that is being shipped around the world is great. Gave me a way better understanding of the topic!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před rokem +1

      I’m glad the analogy was helpful, K-San. I wish I could take credit for it but heard it somewhere else (can’t remember where) and found it very helpful as well. All the best.

  • @bonford
    @bonford Před 4 lety +1

    Many Thanks, Paul! That's very helpful.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Thank you very much for the feedback! I appreciate it and am glad it was helpful.

  • @punditgi
    @punditgi Před 3 lety +2

    Excellent video! Many thanks for all the work to create the extremely helpful graphics.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thanks for taking the time to leave a comment, Ezra. Years ago, a great mentor taught me that pictures are an important tool to facilitate understanding. Since then, I’ve enjoyed experimenting with PowerPoint to communicate concepts. I really do appreciate your feedback and wish you the best!

    • @punditgi
      @punditgi Před 3 lety

      @@PaulTurnerChannel Same to you, sir!

  • @karlheinzvogel619
    @karlheinzvogel619 Před 5 lety

    I can not think of any way explaining this better. Thank you

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety

      Thanks a bunch for your comment, Karlheinz. I'm glad you liked it.

  • @benjaminzhou9503
    @benjaminzhou9503 Před 5 lety +5

    Wow, that a clear and concise lecture. Thank you Paul!

  • @ger3535
    @ger3535 Před 3 lety +1

    The best explanation about Certificates and Key exchange. Thank you for your contribution.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thank you very much for taking the time to write your comment, Gerardo. I’m glad you felt the explanation was helpful.

  • @sameerlawande5701
    @sameerlawande5701 Před 4 lety +3

    Wow - am not a security guy - and I feel like an expert now ;) So lucid and easy to understand - was struggling to understand these key management concepts earlier - Great Video Paul - keep up the great work.Thanks a ton!!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Thank you for the enthusiastic feedback, Sameer. It is so good to hear.

    • @worldphoton
      @worldphoton Před rokem

      @@PaulTurnerChannel Al to काqqqq1qq@६q,

  • @bernardgarrett3897
    @bernardgarrett3897 Před 2 lety +1

    Great comforting voice and great explanation. Thank you

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thanks for the kind feedback, Bernard. I’ll have to tell my kids that someone thinks I have a comforting voice. They’ll likely be surprised 😲
      Seriously, I do appreciate it!

  • @mattd9898
    @mattd9898 Před 4 lety +5

    This is literally is the last piece of the jigsaw I was looking for and where it all comes together in understanding pki and certificates.Videos of such crystal clear explanatory quality about intricate technical stuff are few and far between.You took it to a whole different level, especially the last part where I experienced an epiphany when you combined the challenge of confidentiality with sender authentication.Thanks a lot Paul and keep up the good work!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety +1

      Thank you so much for the enthusiastic feedback. I really appreciate it and am so glad you found it of value!

  • @DonMerri
    @DonMerri Před 5 lety +1

    Clear and concise. THANKS!!

  • @vasiljaveed4748
    @vasiljaveed4748 Před 2 lety +1

    A good explanation on Encryption and key management, thanks paul for the efforts, it valued to my knowledge.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      I’m glad you found it valuable, Vasil. Thanks for the feedback.

  • @sachinbhavsar1716
    @sachinbhavsar1716 Před 5 lety

    Best video explaining concepts of Public-key and private Key and certificate. Awesome explanation sir !!!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety

      Thank you so much, Sachin. Sorry for the slow response. I'm glad you enjoyed the video.

  • @nicolaikarcher7186
    @nicolaikarcher7186 Před 3 lety +1

    Very clear and helpful. It's difficult to get a good grasp of these concepts if you're going into IT type of stuff but haven't studied something of that sort.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      I’m glad it was helpful, Nicolai! Thanks for your feedback.

  • @PhiXioNLife
    @PhiXioNLife Před 5 lety +5

    Holy shit this blew my mind, that was very clear and useful!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety +2

      LOL!!! I was in the middle of a call when the notification for this comment came in. I burst out laughing. Thanks for the laugh!

    • @123grownsexy
      @123grownsexy Před 3 lety

      .day and 7
      K
      009
      .u9

  • @BroaderBasicsBuddy
    @BroaderBasicsBuddy Před 2 lety +1

    really awesome analogies, love the teachings

  • @gfxmrsaltman
    @gfxmrsaltman Před 5 lety +1

    Wow! Very amazing and easy to understand video, thanks a lot.

  • @smitbhatt992
    @smitbhatt992 Před 4 lety +1

    Really Appreciate the simple way in which you explained the complex concept..

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      I’m glad you liked it, Smit. Thanks for taking the time to provide the feedback!

  • @davian1989
    @davian1989 Před 4 lety +1

    The best explanation of Cryptography you will get via CZcams, you can take that to the bank!

  • @mohammedamineharmak5940
    @mohammedamineharmak5940 Před 5 lety +1

    Very Very well done and explained. Thank you sir !

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety

      Mohammed, I'm very glad you liked it and appreciate your kind feedback. Thank you.

  • @malaka123456
    @malaka123456 Před 5 lety

    The best explanation I came across

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety +1

      I'm glad it was helpful. It took me a while to understand these topics. I was hoping to be able to explain it so that others wouldn't have to take so long. I really appreciate your feedback.

  • @SiddharthSharma-yh1bc
    @SiddharthSharma-yh1bc Před 4 lety +2

    Nice Lecture. I just wanted to add that Certificate contains Digital signature which is just an Encrypted Hash that can be decrypted using the public key(verifying the sender), and the integrity can be verified with the Hash. For more information on who signs it, who checks it, watch further the video series on PKI, very well explained here. Thanks, Paul.

  • @abhaysharma7638
    @abhaysharma7638 Před 4 lety +1

    Really Helpful Thanks and Good work Paul !

  • @prashb5753
    @prashb5753 Před 2 lety +1

    Excellent explanation with a nice illustrative diagrams and walk through.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thank you very much for your feedback, Prash. I’m glad you liked it.

  • @safetime100
    @safetime100 Před rokem

    Amazing, thanks a lot, please add another video for practice and testing for all scenarios...

  • @avasheshshukla
    @avasheshshukla Před 4 lety +1

    Best explanation. Very useful in understanding Keys and Certificates, Thanks

  • @IntergrateThisFool
    @IntergrateThisFool Před 6 lety

    Thanks for the video. Very informative, I had a little bit of an idea but it’s good to get a good overview before implementing :)

  • @AnthonyAntay
    @AnthonyAntay Před rokem

    Awesome video, Thank you!

  • @matha.1022
    @matha.1022 Před 3 lety +1

    Amazing explanation. Thank you so much.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thank you for the great feedback, Matheus. Sorry for the slow response.

  • @namannarula2412
    @namannarula2412 Před 3 lety +1

    explanation clear as glass.Thank you very much

  • @shashankbelsare6207
    @shashankbelsare6207 Před 2 lety +1

    great video. Very well explained for someone like me who doesn't have any cryptography background.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      I’m really happy to hear it was helpful, Shashank. Thanks for the kind feedback.

  • @rakshithprasad3101
    @rakshithprasad3101 Před 4 lety +1

    Thank you very much. Explanation is very clear... It is the best...

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      I’m happy that it was helpful to you, Rakshith. Thank you for your comment.

  • @raulcsam
    @raulcsam Před 3 lety

    Thank you so much for sharing, It was really clear!

  • @graftedbranch7246
    @graftedbranch7246 Před 4 lety +1

    So good. You are a gifted communicator

  • @OurCloudSchool-Hindi
    @OurCloudSchool-Hindi Před 4 lety +1

    You deserve 100k likes for this article!!

  • @haydene3802
    @haydene3802 Před 3 lety +1

    studying for my comptia security + and this has been very useful

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      I’m so glad to hear that, Poly. Good luck with the test and your career!

  • @henrik9173
    @henrik9173 Před 3 lety +1

    Very clear! Soooo useful

  • @TheAkiller101
    @TheAkiller101 Před 2 lety +1

    Amazing explanation !!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Really glad you liked it, Zeid. Thanks for taking the time to comment.

  • @NWS189
    @NWS189 Před 4 lety +1

    This explanation is superb.

  • @marmolejor
    @marmolejor Před 3 lety +1

    Amazing video, thanks!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      I’m really glad you liked it. Thanks for taking the time to comment.

  • @franciscochaves3380
    @franciscochaves3380 Před 4 lety +1

    great explanation! thank you

  • @irfan_b5186
    @irfan_b5186 Před 3 lety +1

    Super session Paul👍🏼

  • @sparshashok3930
    @sparshashok3930 Před rokem +1

    Nice explanation. Thanks.

  • @jmjxcabbage
    @jmjxcabbage Před 7 lety

    thanks for the video !

  • @adityabansal2737
    @adityabansal2737 Před 3 lety +2

    Future Visitors, If youre like me, watched dozens of videos but coudnt understand the Asymetric Crytography, THIS VIDEO IS FOR YOU.
    Thanks Paul Turner

  • @cepi24
    @cepi24 Před 3 lety +1

    Very educative video. Thanks

  • @rashie
    @rashie Před rokem +1

    👍👍- Awesome! Thanks!

  • @cbpmjd00
    @cbpmjd00 Před 6 lety

    Great explanation!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 6 lety

      I've been slow in replying but thank you very much for your comment, rabbit.

  • @farukbatakci3331
    @farukbatakci3331 Před 3 lety +2

    Great job!!!

  • @rk5759
    @rk5759 Před 3 lety +1

    this video is gem !

  • @TebogoMotlhale
    @TebogoMotlhale Před 4 lety +1

    i love your wonderful and very patient approach you took to explain it, it is hard to simplify it because simplification and analogies can induce deeper questions on the actual logic of how the whole thing really fits together and how it actually operates, but you made a serious conceited effort nonetheless. Was anyone else here left with the question of "Why" the man in the middle is NOT able to resurface on the picture after the introduction of certificates ? I mean, the man in the middle simply has to wrap his public key with a {fake} certificate and he can certainly continue to perpetuate his illicit acts of mediating between the two parties ?? LOL, i know the answer but I just wonder if ANYONE else here had that question lurking in the back of their minds when suddenly the solution to eliminate the middleman was simply the introduction of a certificate whereby the public key is simply "wrapped" inside a certificate and "walla" . . the middleman is defeated just like that ?? did it strike ANYBODY else here as "No way, the middleman WILL certainly persist becuz he will simply fabricate a certificate and wrap his malicious public key inside that fabricated certificate so he will therefore PERSIST with or without the introduction of certificates" ?? Hahahahaha, LOL

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety +1

      Tebogo, thank you for making me laugh. You’re right that I simplified things for the sake of making the basic concepts (hopefully) easier to understand. It is possible for a MitM to mint a forged certificate but they have to do it from a CA that the relying party trusts. With the emergence of Let’s Encrypt, this has become easier, but the MitM still has to then compromise DNS or the legitimate server they’re trying to MitM to successfully get a rogue cert.
      You bring up a good point about certs versus raw public keys, and the potential disadvantages of each. The explicit trust afforded by raw public keys (and self-signed certs, for that matter), makes MitM more difficult as long as you can reliably manage all of the trust relationships. SSH is a good example of this (where the weaknesses include users blindly accepting server public keys or authorized keys being left around forever). Certs can reduce the management headache but then thrust the trust into a smaller number of entities (CAs) that must be secured.
      I loved the humor and the accompanying thought provoking points. Thanks a bunch.

  • @rockystark9539
    @rockystark9539 Před 2 lety +1

    Great job Paul, you've done an simple guide for a very complicated issue. But I have a question please, how 2 parties can exchange private keys ?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Hey, Rocky. Thanks for the kind feedback. In response to your question, the beauty of asymmetric cryptography is that private keys do not need to be shared (should not be shared). If Party A wants to send something confidential to Party B, they get a copy of Party B’s cert (public key), encrypt the information with that, and send the encrypted info. Party B decrypts it with their private key (no private key sharing needed). Alternatively, if Party A wants to authenticate a message that they’re sending to Party B, they encrypt it with their own (Party A’s) private key and send that message to Party B. Party B then confirms it came from Party A by decrypting it with Party A’s cert (public key). Again, no need to exchange private keys. Public keys are shared but private (secret) keys are not. Secret keys are typically only exchanged in symmetric crypto. I hope this makes sense. (I kept it simple up top but, to be clear, when authenticating, Party A encrypts a hash of the message with their private key.)

    • @rockystark9539
      @rockystark9539 Před 2 lety

      @@PaulTurnerChannel It is so clear now Paul, I really appreciate your time. Many thanks.

  • @tyrannicrex7114
    @tyrannicrex7114 Před 2 lety +1

    thanks so much!

  • @momokuldip
    @momokuldip Před 4 lety +1

    Awesome explanation

  • @VikasSharma-ed6gs
    @VikasSharma-ed6gs Před 4 lety +2

    omg... awesome!!

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety

      Thanks for the enthusiast feedback, Vikas. It put a big smile on my face!

  • @sreeram77
    @sreeram77 Před 4 lety +1

    Fantastic!

  • @winghun
    @winghun Před 3 lety +1

    Hi Paul, great video, thanks. Just wondering, how can one get into a field like this? What education background do you need? It looks super interesting.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety

      Thanks for the feedback and for your question. It is a good question. The first step is to begin to educate yourself. Fortunately, with the internet now there are lots of online resources for that. If you’re interested in enterprise key management, you might start with NIST 1800-16 (www.nccoe.nist.gov/sites/default/files/library/sp1800/tls-serv-cert-mgt-nist-sp1800-16b-final.pdf). Once you’ve educated yourself on some of the basics, there is strong demand for people who have a passion for this area, as it is not necessarily mainstream security (though you would think it would be).

  • @maxcady4208
    @maxcady4208 Před 2 lety +1

    good video overall. everything was making total sense up until that very last scenario. that was kind of confusing. would you mind clearing it up. the way I understood it is the sender uses their private key to encrypt the message. then the sender uses the recipient's public key to encrypt the message? did I get that right? then that means the recipient would need decrypt the message twice??? 1st with their private key and then with the senders public key? does that sound right or did i misunderstand something? thanks

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety +1

      Hi, Max. You explained it perfectly. Thanks for reaching out and checking.

  • @romannagel2414
    @romannagel2414 Před 5 lety +1

    AWESOME!

  • @ubiquicomubiquicom7545
    @ubiquicomubiquicom7545 Před 3 lety +2

    very clear and clean video; just one question, at 15:12, how can the receiver decrypt the message with the received public key? from my understanding, public key is for encrypting only (not decrypting), while private key is for decrypting (and for encrypting too, if needed), am I wrong?

    • @ubiquicomubiquicom7545
      @ubiquicomubiquicom7545 Před 3 lety +1

      ok, maybe I got it;
      the encryption/decryption function via public/private key can be used this way:
      {plainmessage}---publickey--->{cryptedmessage}---privatekey--->{plainmessage}
      as well as this other way:
      {plainmessage}---privatekey--->{cryptedmessage}---publickey--->{plainmessage}
      hence the authentication is a kind of reverse form of (indeed you stated "turn the asymmetric cryptography around" at 14:08) of asymmetric encryption for communication.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thanks a bunch for the great question, and your follow up, which looks correct. My explanation in the video didn’t distinguish between public key algorithms but implies RSA. The RSA algorithm which provides the ability to encrypt/decrypt in both directions (for signing or confidentiality). DSA and ECDSA only allow for encryption with the private key and decryption with the public key (for signing). Diffie Hellman (DH) works yet another way, where both parties create key pairs and exchange their public keys to generate a symmetric session key (for confidentiality). I hope this doesn’t further confuse things for you but I thought I would provide a little more background.

    • @ritamghosh3550
      @ritamghosh3550 Před rokem

      Thanks for posting the comment, I had the same question. Some part of it is clear now from the reply of Paul. But still I doubt after 16:35 if both parties have public keys already exchanged then why some one will use his private key to encrypt and use an algorithm (like RSA) which can encrypt and decrypt using public key, instead both parties can stick to an algorithm where only private key can decrypt, in that case they can use their partner's public key to encrypt and and send data, and their partner will decrypt using their own private key. Sure I'm missing something.

  • @velmuruganloganathan
    @velmuruganloganathan Před 6 lety

    Excellent!!.

  • @avinashmehtadelhi
    @avinashmehtadelhi Před 5 lety

    great video, any suggestions on how the certificates are published and distributed?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety

      Thank you for the feedback, Avinash. Your question is a big one. Can you give me a little more detail about what specific area you're looking at (client certificates, TLS, etc.)? That will help me provide a better answer.

  • @anonnewuserp9530
    @anonnewuserp9530 Před 6 lety

    Hi Paul,
    This is the best video that I have come across on Keys & certificates.
    I have a doubt. How is the symmetric key generated? Is there any software/tool to generate the key?
    Thanks

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 6 lety

      Good question. A symmetric key is a randomly selected number. In order to "generate" (which really means select) a symmetric key, you want to have a trusted pseudo-random number generator (PRNG)--a program that selects a number in a random enough fashion so that it is difficult to guess. Though software developers could attempt to create their own PRNG, they typically rely on cryptographic libraries, such as OpenSSL or Windows CAPI/CNG, or hardware, such as an HSM or TPM chip. Consequently, when a symmetric key is needed, the program needing it will make a call to the cryptographic library asking for the key. The cryptographic library will use its PRNG functionality to randomly select a number and will return that to the calling program.
      If you're looking for something to generate random numbers, I believe OpenSSL or Windows CAPI/CNG are your best bet, depending on the platform and language you're using for your program.
      I hope that helps (and makes sense).

    • @anonnewuserp9530
      @anonnewuserp9530 Před 6 lety

      Thank you

  • @kavitaray2523
    @kavitaray2523 Před 6 lety

    Can you please help us understanding where exactly chain certificate is involved in SSL handshake. I have concerns... what chain certificate does at server side. I understand what is chain certificate but my question is where you are making use of chain certificate in SSL handshake?
    Why we copy that on server when it not require in Ssl handshake. is there any specific use case of chain certificate
    Browsers have major root CAs and intermediate CAs public keys. Please correct if I am wrong, Whatever I see in the browser, those are not the root certificate and chain/intermediate certificate but they are only public keys of root and chain certs. Next, During the SSL handshake in step two when server responds to the client with his Server hello message.... After that does server send only server certificate or it sends both to the client (server certificate and chain certificate)? Please answer

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 6 lety

      Sorry for the VERY slow response, Kavita. Along with it's own server certificate, the server should return all of the CA certificates between the root and the server certificate to the client during the handshake (in the Certificate message that is sent along with the Server Hello portion of the handshake). The reason that it is a better practice for the server to return the CA certificates in the handshake instead of storing them in the client's trust store is that it provides better flexibility for changing CAs or even revoking CA certificates if a intermediate CA is compromised. This does require that CA certificates (the certificate chain) be loaded onto each TLS server (e.g., the web server).
      A lot of people forget to do this and find connection problems with their TLS clients to the servers. However, loading the CA certificates on servers is a lot easier than placing/maintaining them on each client. It is also possible to place CA chains on a single server and use an extension in the certificate called Authority Information Access (AIA) but it is possible that some TLS clients don't support this method of accessing CA certificates.
      To be clear (based on your question), the CA certificates provided by the server are used by the client the verify the signature on the server's certificate. The client starts with a CA certificate in its trust store (typically a root CA) and uses that to verify the signature on the next CA certificate in the chain, which is then used to verify the next CA certificate, and so on until it verifies the server certificates. You can see an explanation of this in czcams.com/video/lLw0dICMA_Y/video.html (though it only has one intermediate CA certificate in that example)
      I hope this helps. Please tell me if it doesn't make sense and I'll try again to explain differently. Again, sorry for being so slow to respond.

  • @pavanvadhri8567
    @pavanvadhri8567 Před 4 lety +3

    @11:33 How the man in the middle can decrypt the message with his private key? Isn't it possible only with the private key of the intended recepient?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 4 lety +1

      Hi, Pavan. You are correct based on they way you are stating it. However, the MiTM attack assumes that the sender has received the attacker's public key and encrypts their information with that key. That would mean that attacker would be able to decrypt the information with their private key and then re-encrypt with the intended recipient's private key. If the sender is using the intended recipient's public key, it is not possible to perform a MiTM attack without the attacker having a copy of the recipient's private key (as you stated).

    • @VasanthBalakrishnan
      @VasanthBalakrishnan Před 3 lety

      @@PaulTurnerChannel Correction in your third sentence. "That would mean that attacker would be able to decrypt the information with their private key and then re-encrypt with the intended recipient's *PUBLIC* key."

  • @shubhamsingla2120
    @shubhamsingla2120 Před 5 lety

    Also, Can I interchangably use public key for private and vice versa event in case of encypting or decrypting or encrypting is something which only public or private key can and vice versa?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 5 lety +2

      Shubham, Let me attempt to explain how encryption is used with public and private keys. First, it is important to understand that encryption with asymmetric cryptography (where public and private keys are used) is extremely slow.
      Encryption with public keys is used for confidentiality. If I’m going to send an encrypted message to another party, I will: 1) generate a symmetric key; 2) I encrypt the message I wish to send with the symmetric key; 3) encrypt the symmetric key with the public key of the intended recipient (typically retrieved from their certificate); and 4) send the encrypted message and encrypted symmetric key to the recipient. They then decrypt the symmetric key with their private key and decrypt the message with the symmetric key. Two parties can conduct a two way encrypted session by both using the symmetric key that was exchanged in the above example.
      Encryption with private keys is used for authentication. If I wish to digitally sign a message so that someone else knows it came from me. I will: 1) create a hash (message digest) of the message I’m going to send; 2) encrypt the hash of the message with the private key; and 3) send the message and encrypted hash to the intended recipient(s). The recipients can verify it came from me by: 1) creating a hash of the unencrypted message I sent (excluding the encrypted hash); 2) use my public key (again, typically pulled from my certificate) to decrypt the encrypted hash I sent; and 3) compare the hash they created with the one they just decrypted. If the two hashes match, they know that I encrypted the message with my private key (thus authenticating it came from me since I’m the only one who should have the private key matching that public key).
      I hope this answers your question. Please don’t hesitate to follow up with a question if I didn’t answer your inquiry.

  • @prash2905
    @prash2905 Před 3 lety +1

    Great video! Question: since the public and private key are just numbers related to each other based on an algorithm, can't an attacker generate the private key using the public key and use it to decrypt the message?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Sorry for my slow response, Prashanth. Public key algorithms are designed to make it very difficult to derive the private key if you only have the public key. The difficulty and method of determining the private key from the public depends on the algorithm (e.g., factoring for RSA) and the key length (e.g., it is more difficult to factor a 2048 bit key pair than a 512 bit key pair). So, the basic design and assumption of security for a public key algorithm is that you can give out your public key freely without risk of an attacker being able to derive the value of your private key. I hope this helps. If not, please do not hesitate to follow up with another question.

    • @prash2905
      @prash2905 Před 3 lety

      @@PaulTurnerChannel thank you so much Paul.i will subscribe and share.

  • @madandevaiah
    @madandevaiah Před 6 lety

    Helpful !

  • @rakeshudandakar7531
    @rakeshudandakar7531 Před 2 lety +1

    Very good video to understand why the certificates are used ?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 2 lety

      Thank you for your feedback, Rakesh. I’m glad you found it helpful.

  • @FlavioGaming
    @FlavioGaming Před 3 lety +1

    Thanks for the explanation! Isn't it possible for the man in the middle to forge the certificate somehow?

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Hi, Flavio. Good question. The client the application software for the user on the left) will only trust certificates that have been issued by certificate authorities (CAs) that it trusts. The man in the middle would need to get access the private key of one CAs that the client trusts in order to forge a certificate. My other videos on PKI help answer this question visually (instead of me attempting to answer in text). Can you please look at those and see if they answer your question? If not, send me another comment and I will attempt to explain in a response.

    • @FlavioGaming
      @FlavioGaming Před 3 lety

      @@PaulTurnerChannel Thanks for the reply. Will check out those videos soon

  • @tencups2778
    @tencups2778 Před 3 lety

    Thanks for this. But there's a little confusion at the end, where at one point, you have mentioned that encryption is done by sender's private key before sending to receipient. Not sure if I got it wrong.

    • @PaulTurnerChannel
      @PaulTurnerChannel  Před 3 lety +1

      Thanks for your inquiry. You did hear correctly about encrypting with the private key. However, that is not for confidentiality. It is for authentication. Also, it is not the entire message that is encrypted with the private key. The message is hashed and the resulting hash value is encrypted with the private key. For confidentiality, the recipient’s public key (typically from a certificate) is used for encryption (along with a symmetric key). If this still doesn’t make sense, please tell me an I will provide a more detailed answer. I’m working on a video about hashing that should help with this concept.

    • @tencups2778
      @tencups2778 Před 3 lety

      @@PaulTurnerChannel - Thanks a lot Paul. I have just started to learn cryptography. So, I am just beginning to understand encrypting the message using the recipients public key before sending it. I haven't come to hashing yet. I will be waiting for the hashing video. Thankyou 🙌 your videos are very helpful