Cryptography 101 for Java developers by Michel Schudel

Поділитися
Вставка
  • Опубліковано 14 січ 2025

КОМЕНТАРІ • 38

  • @dineshagrawalla7062
    @dineshagrawalla7062 2 роки тому +5

    Cryptography at first place sounds so complex but Michel has made it so simple. Any novice would get a good sense of it just in 40 minutes. Thanks Michel.

  • @vishalmate4767
    @vishalmate4767 3 місяці тому

    One of the best till now.

  • @RafaelNascimento-qo1jp
    @RafaelNascimento-qo1jp 4 роки тому +1

    Excelent! The most concise overview of securities API in Java
    thanks!

  • @slr150
    @slr150 4 роки тому +1

    23:28 Diffie-Hellman Exchange (DHE) used out of the box is susceptible to man-in-the-middle attacks. Note that TLS can be configured to use DHE ciphers but, in these situations TLS will sign the DHE shared keys with RSA.

  • @Optimusjf
    @Optimusjf Рік тому

    Thank you very much. The class was excellent.

  • @rafaelleduarte
    @rafaelleduarte Рік тому

    Hi🇧🇷. This class is also an asmr. What a beautiful accent❣️

  • @rajeshrenke6471
    @rajeshrenke6471 3 роки тому

    That was simply great.. In short time covered a lot with examples.. thumbs up!!!

  • @MrMikomi
    @MrMikomi Рік тому

    Great presentation, thanks!

  • @emersontavera9362
    @emersontavera9362 Рік тому

    great talk, just amazing, thank u so much

  • @tanuj128
    @tanuj128 4 роки тому +4

    Ya really, the talk was amazing... though i have worked on them but the way it was present with detail background knowledge was really nice...
    I will store this video for my future references.
    Can I request you to share the presentation also

  • @cs-200-ok
    @cs-200-ok Рік тому

    Awesome exokanation man!!

  • @iamvardhanharsha1992reddy
    @iamvardhanharsha1992reddy 4 роки тому +1

    Great talk

  • @grillbaer
    @grillbaer 5 років тому +4

    Thank you for this great talk! It provides a nice quick overview of the Java classes to start with when using cryptography.
    Shouldn't the RSA PUBLIC key be used in the example to ENCRYPT a message to provide confidentiality? The slide and code use the PRIVATE key for encryption and the PUBLIC key for decryption here?

    • @michelschudel2300
      @michelschudel2300 3 роки тому +4

      It depends on what your want to do. For digital signatures, the sender encrypts using private key and the receiver decrypts using public key, because you want to be sure the sender is actually who he or she says eh/she is. When doing asymmetric encryption, you want to make sure that only the receipient can read your message. So, in that case, you encrupt using the receipient's public key, and he decrypts it using his private key.

    • @michelschudel2300
      @michelschudel2300 3 роки тому

      asymmetric encryption is not really suited for large data because
      1. Encrypted data is about 1,5 the size of the original data
      2. Key of n bytes can only encrypt about n / 5 data in one turn
      3. Symmetric encryption is a large magnitude of times (about 5000) faster than asymmetric encryption.

    • @damonreginald8495
      @damonreginald8495 3 роки тому +1

      I know Im asking the wrong place but does any of you know of a method to get back into an instagram account..?
      I somehow lost my password. I appreciate any assistance you can give me.

    • @kendalljoshua3182
      @kendalljoshua3182 3 роки тому

      @Damon Reginald instablaster :)

    • @damonreginald8495
      @damonreginald8495 3 роки тому

      @Kendall Joshua I really appreciate your reply. I found the site on google and Im trying it out atm.
      I see it takes quite some time so I will get back to you later when my account password hopefully is recovered.

  • @BharCode09
    @BharCode09 4 роки тому +1

    Collision chances are almost square the age of universe= he says "Its takes quite a while, so don't worry" :D. Funny guy I must say! Enjoyed the talk as well the knowledge shared..

  • @זאבאברמוביץ
    @זאבאברמוביץ Рік тому +1

    That was simply great. But I have 1 question:
    When you explained about asymmetric cryptography, you said we encrypt with the private key and decrypt with the public key
    I think it's only in digital signature, When we deal with the asymmetric key we should encrypt with the public key, and the receiver decrypts with the private key, no?
    Thanks

    • @vikaspoddar001
      @vikaspoddar001 3 місяці тому

      No, we put the classification private and public later, on the pair of key
      If I have a pair of keys:
      K1 and K2
      I can encrypt with either K1 or K2.
      If we encrypt with K1 we have to decrypt it with K2 and if encrypted with K2 we have to decrypt it with K1.
      Now, the notion of PRIVATE and PUBLIC key.
      Any of them can be either of it
      K1 - pvt K2 - pub
      K1 - pub K2 - pvt
      Here, based on the scheme who will send the encrypted message is decided

  • @shishirkumar4932
    @shishirkumar4932 4 роки тому +1

    19.9 The decryption might have been happening in some other machine. How will it get the same 'key' object?

    • @michelschudel2300
      @michelschudel2300 3 роки тому +1

      Good question! Symmetric key exchange can be done by using asymmetric encryption or DH-exchange. I hope I explained that a bit further in the session.

  • @nO_d3N1AL
    @nO_d3N1AL Рік тому

    I'd recommend the Computerphile video on the mathematics of Diffie-Hellman for anyone that's interested, it's actually quite elegant :)

  • @fareselamine8115
    @fareselamine8115 3 роки тому

    Very informative and simple video to follow, thank you!
    One quick question though which might sound a bit noob-ish: What's the point behind adding a "name: " before the string inside the parameter of Utils's functions? Whenever I try that out, it gives me errors.
    EDIT: Apparently it's an IntelliJ feature, never used it before so makes sense why I was thrown off by it.

  • @pickkideb
    @pickkideb 3 роки тому

    30:09 Sender encrypts using public key and receiver decrypts using private key. The slide is showing opposite. Can anybody verify this fact?

    • @michelschudel2300
      @michelschudel2300 3 роки тому

      The slide says: sender encrypts using private key. Might have misspoken though, not checked yet... but the slide is the correct one.

    • @philsmart11
      @philsmart11 3 роки тому

      The slide looks the wrong way round to me. Encrypt with a private key would lead to a digital signature.

  • @marianpazdzioch5437
    @marianpazdzioch5437 Рік тому +2

    Enigma was cracked by Polish mathematics, not by Turing FFS!

  • @alisonlapoint2094
    @alisonlapoint2094 2 роки тому

    Exept Alice is blocked from hash

  • @homeofcreation
    @homeofcreation Рік тому

    the world wants to know.

  • @alisonlapoint2094
    @alisonlapoint2094 2 роки тому

    What if a bill of legislation has amended a hash and a block key. That is coded me as $ine & die dead and can't get id amd Evan if I did the hash will not let me inter it in and confirm in the s

  • @horsthorstmann7921
    @horsthorstmann7921 2 роки тому +1

    Very nice Video, but one hint: The public key ist not shorter than the private key because it is an asymmetric method. It is shorter because the private key consists all informations/numbers and the public key only a part of it.
    With OpenSSL you normally generate a (private) key. And with a second call you exctract the public key from this private key.