Video není dostupné.
Omlouváme se.

How SSH key Works ?

Sdílet
Vložit
  • čas přidán 7. 08. 2024
  • What is SSH key pair? Why we need SSH key? How SSH key works? Authentication via ssh key pair.
    Generate and Use SSH key : goo.gl/hK9h54
    Become My Patron here goo.gl/NcvDQh
    You can donate any amount via Paypal follow this link goo.gl/JhWsKC
    ==============================================
    Deploy Laravel on Digital Ocean Full series:
    1. Log Into Server via SSH ?
    • Deploy Laravel on Digi...
    2. High Server Security
    • Deploy Laravel on Digi...
    3. Install LEMP stack on Ubuntu server
    • Deploy Laravel on Digi...
    4. Install Laravel via Github on server
    • Deploy Laravel on Digi...
    ==============================================
    Join Our Slack Community - goo.gl/pqCjZH
    --You May Also Like --
    Real Time Chat Series - goo.gl/ri42FD
    Git ans Github series - goo.gl/BXyPxf
    Blog with Admin panel Series - goo.gl/S5JGyt
    Laravel Authentication Series: Multi Auth - goo.gl/TyCLlX
    Vue Beginner To advanced Series - goo.gl/1bjdGg
    Sublime Text Best Package Series - goo.gl/6phTPP
    Laravel Ajax Todo Project - goo.gl/p2xTPW
    Laravel 5.4 Full Beginner Playlist - goo.gl/zpKzhM
    Laravel 5.3 Hindi Beginner Tutorials - goo.gl/Kb3ikd
    Full Playlist for the "Laravel 5.3 Hindi Beginner Tutorials" Series: • Laravel 5.3 Hindi Begi...
    ==================FOLLOW ME ==================
    Subscribe for New Releases!
    Twitter - / bitfumes
    Facebook - / bitfumes
    Instagram - / bitfumes
    (ask me questions!)
    -- QUESTIONS? --
    Leave a comment below and I or someone else can help you.
    For quick questions you may also want to ask me on Twitter, I respond almost immediately.
    Email me support@bitfumes.com
    Thanks for all your support!
    LARAVEL 5.4 Tutorial | Cara Instal LARAVEL 5,4 dari awal Part 1 | Bitfumes
    Laravel 5.4 Tutorial | Come installare laravel 5,4 da zero Parte 1 | Bitfumes
    ~-~~-~~~-~~-~
    Please watch: "Laravel 5.4 Tutorial | Email From Server (Godaddy) #3 | Part 26 | Bitfumes"
    • Laravel 5.4 Tutorial |...
    ~-~~-~~~-~~-~
    que es api
    ما هو أبي
    o que é api

Komentáře • 176

  • @danielbaharestani8197
    @danielbaharestani8197 Před 4 lety +63

    The client doesn't send the secret back to the server, because the secret could be stollen this way. It uses the secret to encrypt the rest of the communication.

    • @danielbaharestani8197
      @danielbaharestani8197 Před 4 lety +7

      ​@@NetworkInfo No verification is needed because the rest of the communication will be encrypted. If the client was not able to get access to the key, it wouldn't be able to continue the communication. The fact that client can now send encrypted messages to server and the server can decrypt them proves that the client was legit hence able to get access to the secret key.

    • @rakeshshiva625
      @rakeshshiva625 Před 4 lety

      There is only one secret key. So is it symmetric encryption.

    • @perminusgaita
      @perminusgaita Před 4 lety +1

      so the server sends back its public key so that the client can encrypt the rest of the data is sends?

    • @dnilbhr
      @dnilbhr Před 4 lety +2

      @@rakeshshiva625 there are two, the server's public key will be used by client to encrypt the message and the server's private key will be used by the server to decrypt them, so asymmetric.

    • @dnilbhr
      @dnilbhr Před 4 lety +1

      @@perminusgaita correct

  • @braindeveloperdimensional5579

    great explanation!
    Your video provided the most important fragments of information which other videos lack,
    for ex:- you mentioned the key being a cipher and you explained which software are used in these different OSes.
    Thanks And
    Keep up the good work!

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching bro, please like BitFumes on facebook to get latest updates.

  • @Itisbane
    @Itisbane Před 5 lety +2

    Great and simple explanations! Thank you.

  • @FredericoButzke
    @FredericoButzke Před 6 lety +1

    Good lesson. You explained it very well. Thank you!

  • @duladuda9891
    @duladuda9891 Před 4 lety

    Lovely video still valid in 2020. Shame most techies fail to explain this in a simple way as you have done thanks.

  • @adamyoussef6880
    @adamyoussef6880 Před 5 lety +1

    Thanks, great video! It helped me to get the idea of SSH.

  • @saurabhmaheshwari6430
    @saurabhmaheshwari6430 Před 5 lety +1

    Nicely explained.Thanks!!

  • @sandhyab9577
    @sandhyab9577 Před 5 lety

    Great explanation..thank you!!

  • @ophelia6207
    @ophelia6207 Před 4 lety

    This is great, you're explaining in such a good way!! Thanks a lot

  • @erdenebilegb.379
    @erdenebilegb.379 Před 4 lety

    The best explanation I have come across! Thanks :')

  • @MegaPruddy
    @MegaPruddy Před 6 lety +2

    Thank you for a wonderful explanation. Bless your heart...

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching, please like BItfumes on facebook/twitter to get latest updates.

  • @WizardImon
    @WizardImon Před 4 lety

    Excellent Specking and Explaining Style. Keep it up brother

  • @MrDragoon73
    @MrDragoon73 Před 4 lety +1

    Great video!!! explaining in a simple way a difficult subject

    • @Bitfumes
      @Bitfumes  Před 4 lety

      Thanks for your love and support, keep learning. Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.
      bitfumes.com

  • @SHANUSHAH
    @SHANUSHAH Před 6 lety +1

    You opened my eyes to SSH , great explanation

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching, please like BItfumes on facebook to get latest updates.

  • @lerubikscubetherubikscube2813

    Just what I needed, thanks! :D

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching bro, please like Bitfumes on facebook to get latest updates,

  • @bzaruk
    @bzaruk Před 5 lety

    Awesome explanation!!!

  • @asmatarunnum3071
    @asmatarunnum3071 Před 4 lety

    Wow how simple u made it ........ simply awesome Plz make Somme more videos of this kind

  • @mohamedsahil5132
    @mohamedsahil5132 Před 5 lety +6

    How client share that top secret key with server ?
    It might get change during sharing and server will never verify that user

  • @MrRIIISEN
    @MrRIIISEN Před 4 lety

    Thanks for this. Very helpful.

  • @RaoulsRandomVideos
    @RaoulsRandomVideos Před 5 lety +2

    Thanks a lot. This is exactly the information I was looking for. Most videos assume I already know what a public and private key is so thanks for clearing everything from the ground up.

  • @EncikHoovy
    @EncikHoovy Před 4 lety

    Tq bro, you really explained it in a clear way and easy to understand . Tqtq so much

  • @RezhwScene
    @RezhwScene Před 3 lety

    What a great explanation! Thank you!

  • @kso35
    @kso35 Před 3 lety

    This was great!!! Thank you!!!

  • @carlavirhuez4785
    @carlavirhuez4785 Před 4 lety

    Best video about SSH keys. Thanks a lot!!

  • @toriolaakinyele6023
    @toriolaakinyele6023 Před 4 lety

    Many thanks for the summarized explanation!

  • @exlr8in
    @exlr8in Před 3 lety

    Correct me if I am wrong please? The step that I always missed understood was section 4:36....
    1. A public key is created by the client
    2. And some how this newly created client public key is provided to the server to keep
    3. Then when the client ssh(s) into the server, it sends the public key it has while connecting
    4. The server receives the connection request "and" compares the public key being received with the once the server has on a list
    5. If the keys match, then the server sends "its own" public key back the client
    6. The client accepts the servers public key and connection is made
    If the process describe above is correct, then this means that servers have to have a way of accepting (someone approves) public keys from clients (step number 2 above) so that it compares when being used?

  • @khandakertoihid2100
    @khandakertoihid2100 Před 3 lety

    Thanks for clear view in easy way! 😊

  • @arqumanwaar.6244
    @arqumanwaar.6244 Před 4 lety

    Great video... Excellent work

  • @riskyfauziah570
    @riskyfauziah570 Před 4 lety

    Thanks a lot :)
    this video help me to understand how SSH works :)

  • @VikasChauhan1809
    @VikasChauhan1809 Před 4 lety

    seriously man
    you made it so easy
    thanks 👌👌

  • @sandeepgupta1724
    @sandeepgupta1724 Před 2 lety

    you have explained it very well. Thanks a lot.

  • @divyanshchandelcse1618

    Thankyou for great explaination

  • @be-kreidly1515
    @be-kreidly1515 Před rokem

    amazing explanation! 2 times better than the universities when they explain it. More videos like this please

  • @paragkotekar1763
    @paragkotekar1763 Před 3 lety

    Very well described. and good use of real time IMAGEs.
    Only a genius can think of such details.
    Thanks

  • @hassibabdouli2578
    @hassibabdouli2578 Před 6 lety

    Thanks for the good explanation

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching bro, keep learning. Please like Bitfumes on facebook to get latest updates.

  • @CoolBishop1997
    @CoolBishop1997 Před 4 lety

    thank you for the very clear tuto

  • @mahmutaydn4378
    @mahmutaydn4378 Před 7 měsíci

    thank your for explanation.however, client send topsecret key without hashing? what happens if somebody gets this open topsecret key during sending client to server?

  • @nishankbani3257
    @nishankbani3257 Před 6 lety

    Clear explanation. Thanks.

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks bro for watching, keep learning.

  • @adrianavargova
    @adrianavargova Před 5 lety

    Thank you, it's a bit clearer now.

    • @Bitfumes
      @Bitfumes  Před 5 lety

      thanks for watching, please check bitfumes.com/courses for more advanced courses

  • @PouyaAtaei
    @PouyaAtaei Před 2 lety

    great video, thanks.

  • @marcinkaliszewski2326

    Great explanation! Thx :-)

  • @bhupeshbhuraria5060
    @bhupeshbhuraria5060 Před 2 lety

    Very well explained

  • @leonbecker6140
    @leonbecker6140 Před 4 lety

    Great explanation. 👍

  • @zael7848
    @zael7848 Před 3 lety

    Very clear explanation, thanks!

    • @Bitfumes
      @Bitfumes  Před 3 lety +1

      Thanks for your love and support, keep learning. Subscribe to bitfumes newsletters
      bitfumes.com/newsletters

  • @sahanam705
    @sahanam705 Před rokem

    Well explained

  • @prasannakumar1625
    @prasannakumar1625 Před 2 lety

    Thanku easy to understand terminology

  • @bembem3063
    @bembem3063 Před 4 lety

    If I have just a LapTop and want to use a SSH just for security can I just Enable the Open ssh on my LapTop. Or do I have to have a server to configure the ssh? I just can't get it right.

  • @zubairwali222
    @zubairwali222 Před 4 lety

    Nice explanation

  • @feruzaabrham2365
    @feruzaabrham2365 Před 5 lety

    is host based authentication and secure shell are the same?

  • @bama2619
    @bama2619 Před 2 lety

    Clear explanation! Thank you! Please, make examples!))

  • @Darklaki1
    @Darklaki1 Před 4 lety

    thank you very much sir

  • @dadduchandak4337
    @dadduchandak4337 Před 5 lety +1

    How server generate the SSH certificate in Linux?? Pls reply ASAP

  • @venkateshthirunagiri85

    Excellent Explination bro
    Great 🙏

    • @Bitfumes
      @Bitfumes  Před 4 lety

      Thanks for watching bro, keep learning.
      For full course checkout bitfumes.com

  • @subhasissahu9142
    @subhasissahu9142 Před 4 lety

    Would you make a video highlighting difference between the working of SSH and SSL

  • @rameshrudra2387
    @rameshrudra2387 Před 4 lety

    Simple and concise

  • @IboKnowsBest
    @IboKnowsBest Před 4 lety

    nice video :-)
    thanks.

  • @pandeykailashify
    @pandeykailashify Před 5 lety

    Very good presentation

    • @Bitfumes
      @Bitfumes  Před 5 lety

      Thanks for watching, please like Bitfumes on facebook/twitter for more updates.

  • @abhinavkumar-se2fd
    @abhinavkumar-se2fd Před 3 lety

    Great explanation...... I have a question. When I am already on a linux machine and from there if I want to ssh any other linux machine then I do "ssh -i key.pem ". Here key.pem is private key. In this case how handshake happen as I am not sending Public key ?

  • @acerlmt
    @acerlmt Před 5 lety

    But what if mitm send back compromised data, encrypted with your public key? Is this possible? And then get your password of server and other info.

  • @hpandeymail
    @hpandeymail Před 4 lety +2

    Thanks for the details.. one query how does it know the first time which public key to pick for a new request .. what is that id against which the public key is picked for the authentication purpose

    • @thespai4227
      @thespai4227 Před 2 lety

      I have the same question, did you finally get the answer?

  • @pritimadhukumar5121
    @pritimadhukumar5121 Před 5 lety

    Sweet and short.. Well done

    • @Bitfumes
      @Bitfumes  Před 5 lety

      thanks for watching, please check bitfumes.com/courses for more advanced courses

  • @SriRam-iu1rz
    @SriRam-iu1rz Před rokem

    you say that the service is only available when the system starts , is it possible for a admin to use Wake-On-LAN in a Client system while the system in in off and establish the tunnel

  • @gsganguli
    @gsganguli Před 6 lety +1

    Good explanation

    • @Bitfumes
      @Bitfumes  Před 6 lety

      Thanks for watching bro, please like Bitfumes on facebook/twitter to get latest updates.

  • @akashbidap
    @akashbidap Před 2 lety

    Nice video very helpful

  • @ignaspan
    @ignaspan Před 4 lety

    How does client encrypt data locked with public key, by using the private key?

  • @sandeepbansal9555
    @sandeepbansal9555 Před 2 lety +1

    Amazing explanation! :)

    • @Bitfumes
      @Bitfumes  Před 2 lety

      Thanks for your love and support, keep learning. Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.
      bitfumes.com

  • @the-moocow
    @the-moocow Před 3 lety

    Good video

  • @mednagurero3550
    @mednagurero3550 Před 2 lety

    thank you

  • @fozilkholboev5291
    @fozilkholboev5291 Před 3 lety

    wow great can you tell me difference between Bash language and puTTY and Command line command prompt. also what connection is there between Bash and Linux.
    Thanks in advance

  • @bzaruk
    @bzaruk Před 5 lety

    @Bitfumes Webnologies
    Great explanation!
    But I have a question, if I am a MITM, I can catch the encrypted "top secret" message from the server (in this state I cannot read the message or get the private key) - but when I am able to catch the decrypted "top secret" that the client send back to the server, I now have the encrypted "top secret" message and the decrypted "top secret" message, and now I can figure out the private key... am I wrong? there is something I miss here?

    • @_sayone_
      @_sayone_ Před 11 měsíci

      encryption algorithm which is used in SSH is RSA and it is really hard to guess it, the key itself could be AES-256 encrypted, so it will take few million years to guess

  • @granand
    @granand Před 5 lety

    I am lost here, Okay remote computer uses public key to encrypt a secret key which is a key to SSH. Well public key is known and so what's the point ...I am lost, please help

  • @ashutoshchauhan4928
    @ashutoshchauhan4928 Před 5 lety +2

    Private key can't be shared and private key can only decrypt the data
    So once, the secure tunnel is established,
    Does the data sent from client is encrypted using public key?
    If yes then, how can server decrypt the data, as it does not have the private key of client??

    • @charismaticaazim
      @charismaticaazim Před 5 lety

      Data is encrypted using the public key. The secret key shared is encrypted using the clients public key, which can only be decrypted using the clients private key

  • @dnilbhr
    @dnilbhr Před 5 lety +1

    What if the decrepted top secret is stolen while being sent back to the server?

  • @nabeelyousafpasha
    @nabeelyousafpasha Před 3 lety

    Thanks 🙏 and Respect from Pakistan 🇵🇰

  • @seek12341
    @seek12341 Před 5 lety

    Clear explanatoin...

  • @SuperJosba
    @SuperJosba Před 3 lety

    It’s symmetric encryption but the key is transmitted via asymmetrical encryption

  • @rajasekharbonthala
    @rajasekharbonthala Před 6 lety +4

    In the video it is mentioned that at last the secret is sent back to server so server can identify the client. This secret can hacked. How it is avoided. Adding that to the video would make it complete.

    • @wimrotor
      @wimrotor Před 5 lety +1

      Is the client going to encrypt this secret with the public key provided by the server?

    • @juanjosecastro2178
      @juanjosecastro2178 Před 4 lety

      @@wimrotor i have the same exact doubt.. when the client send back the callenge to the server, the client encrypts that challenge into de pub key ???

  • @All_and_normal
    @All_and_normal Před 2 lety

    Nice

  • @kennyjohnsen5161
    @kennyjohnsen5161 Před 5 lety

    Does SSH helps to Prevents websites from seeing the computer IP Address?

    • @Bitfumes
      @Bitfumes  Před 5 lety

      nope, it is just an authorization mechanism to access system data from remove system

  • @tapassamui7886
    @tapassamui7886 Před 4 lety

    If I use password authentication for ssh session then how the data gets encrypted? In password authentication the client's public key is not present in server.

    • @tapassamui7886
      @tapassamui7886 Před 4 lety

      @@NetworkInfo I believe ssh channel is first established then authentication process starts. Ssh server and client first set up a secret key using Diffie Hellman algorithm and then that key is used to encrypt the channel. Next it asked for authentication method, either password based or ssh key based. That's why ssh key is not necessary for ssh connection. And we will always share client key into server, generating public private key is not necessary in server. For SSL it's different where server's public key is shared with client.

  • @RAVIKUMAR-ef4wo
    @RAVIKUMAR-ef4wo Před 5 lety

    awesome

  • @raghavendrac7773
    @raghavendrac7773 Před 5 lety

    Sir, its nice presentation with little diversion!. you said, "Symmetrical encryption can’t be done on remote servers". But you didn't continue the need for SSH with proper justification.

    • @robdoubletrouble
      @robdoubletrouble Před 4 lety

      it is the same key everywhere - hence, sharing it becomes increasingly risky
      with asymmetrical encryption, identity and uniqueness is assigned to a caller

  • @prakashsubramanian4671

    Thankyou friend

    • @Bitfumes
      @Bitfumes  Před 4 lety

      Thanks for your love and support, keep learning.
      Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.

  • @mindstrenght2592
    @mindstrenght2592 Před 4 lety

    Can you please explain how to use SSH on android smartphone

  • @Spacetime23
    @Spacetime23 Před 8 měsíci

    4 videos dekhne ke baad... ab jaake kuch samajh main aaya ...!!! this video gave me a clear picture.... Maybe I have a low IQ..

  • @shreyasrivastava7712
    @shreyasrivastava7712 Před 5 lety +1

    Thanku sir

    • @Bitfumes
      @Bitfumes  Před 5 lety

      Thanks for watching, Please subscribe to bitfumes' course section. bitfumes.com/courses

  • @Nabilliban14
    @Nabilliban14 Před 5 lety +4

    When sending the Top Secret Key back to the server, can't someone intercept it and send it over to the server before you get yours to the server, thus not verifying the correct user?

    • @Vaaaaadim
      @Vaaaaadim Před 4 lety

      Old comment but,
      I think that would be correct. But at that point I don't think any protocol can help you. It is very well the case in practice that services can be denied e.g. DDOS(not that that is the scenario you describe). The point of having such protocols is not to guarantee that the sender and receiver can communicate, but instead that when communication occurs, an interceptor would not be able to extract any useful information.
      Even without some malicious actor, we can't guarantee that communication works out. Sometimes packets of data just drop czcams.com/video/7rLROSYcQU8/video.html. You can't even guarantee that two computers are absolutely sure that they both agree on something (The Two Generals Problem) czcams.com/video/IP-rGJKSZ3s/video.html
      A single computer can't even have guarantees about it's current state, like stray cosmic rays can hit the silicon to flip bits.
      Anyways, though we have a lot of things we can't guarantee, one can attempt to produce the most robust solution possible given the circumstances(and, with some assumptions, prove that it is secure), or we can produce a solution which we believe to have a low probability of failing. Like, it is incredibly unlikely that cosmic rays do flip bits in memory, but even if this was an issue there are ways of using redundancy to lower the probability that we read corrupted data(coding theory and information theory). Quicksort is an example of an algorithm where we choose to take our chances, it hinges on selecting a random pivot, and on average it is a very fast algorithm but if you give it a really inconvenient input list it will have the same time complexity as the naive sorting algorithms(Bubblesort, SelectionSort, etc).
      To put out one last caveat, we don't even know if cryptography is actually bulletproof :)
      It's still an open question as to whether P = NP, but if it is and we find a good algorithm for
      solving NP problems, then we also have a good algorithm for breaking cryptography.
      Noone's cracked P vs NP yet though, and modern cryptography isn't cracked yet either(or maybe it is and some people have kept that secret really well), soooooooooooooooooooooooooooooooooo it's probably safe.
      Rant aside, SSH and all other protocols can't guarantee service, but if it is observed that the service is consistently being denied and it's an issue, then either the user or the people who provide the service should investigate and figure out what the root cause is.

    • @yordanibonilla5859
      @yordanibonilla5859 Před 4 lety +2

      Server gets your public key
      Server encrypts a [challenge] with your public key
      You decrypt the challenge with your private key(as only your private key will unlock what the private key you shared locked) and send back the challenge
      Server verified the challenge and established a tunnel

    • @Vaaaaadim
      @Vaaaaadim Před 4 lety

      @@yordanibonilla5859 I see, but the question Nabil asks still applies. Basically the situation would become, what if an interceptor responds to the challenge before you do(with an invalid response), resulting in the challenge being failed and you not being verified.
      Ah, but upon rereading the original comment, it says "not verifying the correct user". I interpreted it as the interceptor preventing you from being verified, rather then the interceptor being verified pretending to be you. But ya, given this procedure they can't beat the challenge the server provides.

    • @yordanibonilla5859
      @yordanibonilla5859 Před 4 lety

      @@Vaaaaadim Right and if they the interceptor did send the correct challenge by intercepting yours and it so happens to get there before you wouldn't they just be doing you a favor verifying ya lol?

    • @Vaaaaadim
      @Vaaaaadim Před 4 lety +1

      @@yordanibonilla5859 Oh, right, duh. It wouldn't help them to beat the challenge on your behalf.

  • @arunj343
    @arunj343 Před 4 lety

    nice

  • @OmGSoaM
    @OmGSoaM Před 5 lety +2

    Update: Windows 10: PowerShell got a ssh-client plugin! Same syntax like Linux

  • @kuqezi294
    @kuqezi294 Před 4 lety +1

    This video is not completely correct ! There is an missing part with the Diffie-Hellmann for the symmetric key wich is used to encrypt the communication. The asymmetric keys are only used for authentication.

  • @laso9593
    @laso9593 Před 11 měsíci

    Can I get this ppt?

  • @latertheidiot
    @latertheidiot Před 3 lety

    Well the animations are cool but how does the server know your private key so that you can decrypt with your private key

    • @Bitfumes
      @Bitfumes  Před 3 lety

      you need to put the private key manually or automatically

    • @latertheidiot
      @latertheidiot Před 3 lety

      @@Bitfumes I searched more about this and found out that the pair of the public and private key are some how mathematically connected, but there is no way to derive one key from another. Whatever is encrypted by public key can only be decrypted by the paired private key.

  • @ErikDaGreat
    @ErikDaGreat Před 6 lety

    when did u get private key?

  • @yihou6433
    @yihou6433 Před 2 lety

    The "SSH Working" part gives a wrong explanation. The SSH public key authentication is signature-based challenge response protocol, which can be found in SSH protocol on section 7. The public key encryption and public signature are totally two different things.

    • @huijunxie3460
      @huijunxie3460 Před 2 lety

      I agree. In general the CZcams video gives a very nice illustration on how SSH keys works. however, I don't agree with the top secret explanation. The "top secret" is a "challenge" generated by server to prove client has a proof of possession of the private key. Once decrypted, client signs the clear text version of the top secret with its private key and sends back to server. Server uses client's public key to authenticate the top secret by verifying the signature. Once the verification is successful, the security channel is established.

  • @MrLittle0inker
    @MrLittle0inker Před 6 lety

    :D Man, I just can't get over the phonetic. Anyway, I like it in a different wa! y!

    • @Bitfumes
      @Bitfumes  Před 6 lety

      THanks for watching bro, please like Bitfumes on facebook to get latest updates.

  • @talkingbiscuit4787
    @talkingbiscuit4787 Před 2 lety

    the legendary indian programmer

  • @ashish4165
    @ashish4165 Před 5 lety +7

    change the title == symmetric and asymmentric key.....

  • @vanthuanluong9398
    @vanthuanluong9398 Před 3 lety

    what if hacker catch that Top secret key and send it to the server himself?

  • @N00BRIUM
    @N00BRIUM Před 6 lety +6

    Server gets your public key
    Server encrypts a challenge with your public key
    You decrypt the challenge with your private key and send back the challenge
    Server verified the challenge and established a tunnel

    • @manojprajapati932
      @manojprajapati932 Před 5 lety +1

      After connection established we go to folder .ssh(of server) and copy all private keys( which will be encrypted by client public key) and get it into our system 😂 finally we hacked it.

    • @chintaraghu7060
      @chintaraghu7060 Před 5 lety

      @@manojprajapati932 lol

    • @alfonsiuspietra7769
      @alfonsiuspietra7769 Před 4 lety

      You decrypt the challenge with your private key and send back the challenge
      how?
      user only have public key, only the server have private key