SSL Handshake Protocol ll Information and Cyber Security Course Explained in Hindi

Поділитися
Вставка
  • Опубліковано 3 лис 2024

КОМЕНТАРІ • 93

  • @shahrukhmulla3996
    @shahrukhmulla3996 5 років тому +22

    Finally jo dundh raha tha mil gaya ... thanks bhai .... easily samjh gaya .

  • @vineetjadhav7875
    @vineetjadhav7875 2 роки тому +6

    His way of explaining the concept is damn!!!

  • @zahramirza1146
    @zahramirza1146 10 місяців тому +6

    Exam in few hours. Dil jeet liya aapne. Hugeeee respect!

  • @rajashajeelahmed3192
    @rajashajeelahmed3192 3 роки тому +1

    SSL have two methods of handshake this one is two way .. You explain it perfectly ..

  • @MohitkumaryadavECE--
    @MohitkumaryadavECE-- 3 роки тому

    bohot hi jyada achi videos hai bhaiya... do video dekha hu dono ekdum ache se samjh aa gayi... kal agar pass hua toh sirf aapki wajah se hounga

  • @tanayjindal4130
    @tanayjindal4130 9 місяців тому

    you are the best man . i have my exams after 5 hours .huge respect

  • @yashkulkarni6932
    @yashkulkarni6932 4 роки тому +4

    A Big Fan of yours.. Easy explanation ..Best Content .Simply amazing..Thank You Sir

  • @prashantsharma3708
    @prashantsharma3708 5 років тому +10

    Thank you sir. Please add RSA and Elgamal Digital signature scheme, it would help us a lot.

  • @sapnashah4971
    @sapnashah4971 2 роки тому +2

    Very informative and very easy explanation .Your teaching skill is amazing.Thank you so much sir

  • @supriya9947
    @supriya9947 3 роки тому

    Suprb, Maine bahut video dekha hai is topic main, but aj full samaj aa gaya, Thanks

  • @salmanzahoor2284
    @salmanzahoor2284 4 роки тому +3

    Explain the concept and reasoning, why we need Session and Connections, two
    different things in SSL (what purpose(s) solved by session and what purpose(s)
    addressed by connection)

    • @khareprateek19
      @khareprateek19 4 роки тому

      Session is like a memory or you can say a cache so if you have a valid session id or cookie you can resume the communication between the client and server.

    • @RajivKumar-ee7xv
      @RajivKumar-ee7xv 3 роки тому

      Connection is as at layer 4 with TCP. Session is at SSL/application level.

  • @ashwinishewale7451
    @ashwinishewale7451 5 років тому +1

    Thank u very much sir ji. . Learn ho nahi raha tha... Now all concepts are clear... 🙏

  • @thoratvaibhav9926
    @thoratvaibhav9926 5 років тому +3

    Aapka video vake hi kamal ka hota hai... sir

  • @jairathor5820
    @jairathor5820 5 років тому

    Bhot hard baba ,Maja aagaya itna ache see explain kiye ho ,Shandaar Jabardast Jindabad... Check point p videos banaeye baba plz

  • @RiteshMalakar-n8y
    @RiteshMalakar-n8y 4 місяці тому

    thanks bro..very easy to understand..

  • @atulrajpoot3593
    @atulrajpoot3593 3 роки тому +1

    👌👌👌 very informative lecture in easy way... thanks bro

  • @chatrughanprasad7778
    @chatrughanprasad7778 4 роки тому

    Exceptional SSL Handshake!

  • @manishparmar4400
    @manishparmar4400 3 роки тому

    Kitana easyl shikhate.ho dil se love u

  • @Devisingh-wb9tw
    @Devisingh-wb9tw 11 місяців тому

    thank you sir , you are great

  • @CreaTeach98
    @CreaTeach98 4 роки тому +3

    Sir bahoot sara missing h , premaster secret key generated by client and by using the public key of server it's sent the data...phr se bna lo video

  • @Keterkarker
    @Keterkarker 2 роки тому

    Thank you sir i was so stressed.

  • @Nirajkantisamal
    @Nirajkantisamal Рік тому

    Nice and clear . Thank you for this knowledge sharing

  • @rahulsakpal1618
    @rahulsakpal1618 4 роки тому

    Superb keep going it was clear explanation. Very good

  • @anujacodkar8968
    @anujacodkar8968 5 років тому +2

    Thank you Sir!!😊😊

  • @amritanath3856
    @amritanath3856 5 років тому +1

    Ty sir for making learning soo easy

  • @BhawaniSingh-jc7cw
    @BhawaniSingh-jc7cw 4 роки тому

    Like your way of explanation ...Thanks

  • @imshashwatmishra3077
    @imshashwatmishra3077 4 роки тому +1

    Thank u sir for your amazing teaching methods👍🏻

  • @sandeeppatil9892
    @sandeeppatil9892 3 роки тому

    Really nice explanation....Thanks Bhai

  • @bikashbehera251
    @bikashbehera251 4 роки тому

    u r the BEST

  • @shaziyasultana4373
    @shaziyasultana4373 3 роки тому

    It would have been more useful if it shown in real time...however nice explanation.

  • @manishparmar4400
    @manishparmar4400 3 роки тому

    Bhai tum.bahot ache ho

  • @chiragshilwant886
    @chiragshilwant886 5 років тому

    Ek no video

  • @jigneshraval6880
    @jigneshraval6880 3 роки тому

    Thank you sir

  • @dipankardey1044
    @dipankardey1044 11 місяців тому

    The server needs to authenticate itself providing the SSL certificate to the client, but client side pe koyi certificate install hota hai kya? When we're hitting any https website, generally the server sends the certificate to the client, it shows the certificate was issued to xyz org by abc authority. However I read somewhere the mutual exchange also can be done, in that case how does the client generates the SSL certificate for itself? Is this what is called self-signed?

  • @imashish86
    @imashish86 4 роки тому

    Fantastic!!!

  • @ranker9947
    @ranker9947 5 років тому +2

    Sir please upload cloud computing lectures

  • @aidataverse
    @aidataverse 2 роки тому

    Very good

  • @bhagyashrivispute1719
    @bhagyashrivispute1719 5 років тому +1

    Please sir upload 6 unit video of ics

  • @kshitijdhanvijay6517
    @kshitijdhanvijay6517 5 років тому

    Thank you. Please add pretty good privacy(PGP) video.

    • @sudhirpatil6240
      @sudhirpatil6240 5 років тому +2

      Lecture kele aste na college la 😂😂

  • @gauravchimanji6920
    @gauravchimanji6920 3 роки тому

    Great Video..!! But one question in phase 1 does client send the session ID? but how can client send the session ID?

    • @koneru06
      @koneru06 3 роки тому +1

      why dont you just get the pcap file and check, you u people become silly

  • @sidducs
    @sidducs 5 років тому +1

    Jabardast

  • @Shantanu_lrnr
    @Shantanu_lrnr 2 роки тому

    Thanks 😊 sir.......

  • @gawasniraj
    @gawasniraj 4 роки тому +1

    Nice explanation. Thanks Sir. One small query, under phase 3 it is mentioned as client certificate who/what it is referring to? I mean who generate client certificate, does all system (client) have its own default certificate or we have to create and install on client. Thanks in advance

    • @umangverma3660
      @umangverma3660 3 роки тому

      USINGX. 509

    • @RajivKumar-ee7xv
      @RajivKumar-ee7xv 3 роки тому +1

      It is optional (server to ask for client certificate and client to send it) and it is only used in 2 way SSL. This is generally used in corporate website on managed client devices like laptop, Android phone, IPAD etc, where company's PKI issues certificates to clients and then they use it to connect to some SSL application which is available only for those users with client certificates.
      In general internet browsing, like google, yahoo, Facebook etc. client certificate is not used.

    • @gawasniraj
      @gawasniraj 3 роки тому

      @@RajivKumar-ee7xv Thanks 🙏🙏👍😊🇮🇳

    • @sibgatulhassan8099
      @sibgatulhassan8099 10 місяців тому

      client cert is not necessary

  • @ravishekhar1428
    @ravishekhar1428 4 роки тому

    I am unable to get session_id in the first step. Because after a successful authentication server actually provides session-id to the client. please explain

  • @aghnasheikh5056
    @aghnasheikh5056 4 роки тому

    thanks for saving me

  • @viinodgehlot8260
    @viinodgehlot8260 11 місяців тому

    Where is Symmetric and asymmetric key.. CA validation

  • @ajayvasava6004
    @ajayvasava6004 Рік тому

    hello sir, my question is when the client sends data to the server for the first time how can the client encrypt that data because the client can't send plaintext to the server and in the first time client doesn't have the server's public key to encrypt that data from plaintext to ciphertext, so how can client encrypt data in first transmission ???

  • @dhanunjay3510
    @dhanunjay3510 5 років тому

    Clear picture of SSL Hand shake

  • @naveedahmadbani6910
    @naveedahmadbani6910 4 роки тому

    brother ur mixing cipher suite and compression method

  • @gauravchimanji6920
    @gauravchimanji6920 3 роки тому

    In Phase 3 how client send certificate ? Client Doesn't have certificate of its own

  • @chinmayiathavale1315
    @chinmayiathavale1315 4 роки тому

    aap PGP pe bhi ek video bana sakate hai kya

  • @shivit9680
    @shivit9680 5 років тому

    Sir diffie Hellman explain with example.....plzzz exam h

  • @GildwareTechnologies
    @GildwareTechnologies Рік тому +2

    The SSL Handshake Protocol is a crucial part of establishing a secure connection between a client and a server using the SSL/TLS cryptographic protocols. It ensures that both parties can securely exchange encryption keys, verify each other's identity through digital certificates, and establish a secure communication channel. Let's delve into the details of the SSL Handshake Protocol:
    SSL Handshake Protocol Process:
    Client Hello: The SSL Handshake begins with the client (such as a web browser) sending a "Client Hello" message to the server. This message includes the client's supported SSL/TLS versions, a random number (Client Random), and a list of supported cryptographic algorithms.
    Server Hello: Upon receiving the "Client Hello," the server responds with a "Server Hello" message. In this message, the server selects the highest supported SSL/TLS version and cryptographic algorithm from the client's list. It also generates its random number (Server Random) and sends its digital certificate, which includes the server's public key.
    Certificate Validation: The client verifies the server's digital certificate to ensure the authenticity of the server's identity. It checks if the certificate is valid, has not expired, and is issued by a trusted Certificate Authority (CA).
    Key Exchange: After the certificate validation, the client generates a pre-master secret and encrypts it with the server's public key from the digital certificate. This encrypted pre-master secret is sent back to the server.
    Key Derivation: Both the client and the server now use their random numbers (Client Random and Server Random) and the pre-master secret to independently derive the master secret, which will be used to generate session keys for encryption and decryption.
    Session Keys: The client and server generate the session keys based on the master secret and the negotiated cryptographic algorithm. These session keys are used to encrypt and decrypt data during the secure communication.
    Finished Messages: The client and server exchange "Finished" messages to confirm that the handshake is complete and that both parties have established a secure connection.
    Information and Cyber Security Implications:
    The SSL Handshake Protocol is critical for ensuring the confidentiality, integrity, and authenticity of data transmitted over the internet. By using digital certificates and encryption, the SSL Handshake protects against eavesdropping, man-in-the-middle attacks, and data tampering.
    Confidentiality: The handshake process establishes a secure encrypted channel between the client and server, ensuring that data transmitted between them is protected from unauthorized access.
    Integrity: The handshake includes the exchange of cryptographic hashes that allow both parties to verify the integrity of the data. This prevents data from being altered or tampered with during transmission.
    Authentication: The server's digital certificate provides authentication, ensuring that the client is connecting to the correct server and not an impostor.
    Key Exchange Security: The SSL Handshake ensures that the encryption keys used for secure communication are exchanged securely and cannot be intercepted by attackers.
    Perfect Forward Secrecy (PFS): Many modern SSL/TLS configurations support PFS, which ensures that even if the long-term private key is compromised in the future, past communications remain secure.
    In conclusion, the SSL Handshake Protocol is a fundamental process in establishing secure connections over the internet. It plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data transmitted between clients and servers. Understanding the SSL Handshake and its implications is essential for information and cyber security professionals to implement robust security measures and protect sensitive data from potential threats and attacks.

  • @patilabhijit007
    @patilabhijit007 4 роки тому +1

    Not exactly correct. Kindly read the exact protocol

  • @shonulis2946
    @shonulis2946 5 років тому

    Ty sir kal hamara security ka exam h ...

    • @haridasgupta1814
      @haridasgupta1814 5 років тому

      Same here bro ,from csjm University

    • @shonulis2946
      @shonulis2946 5 років тому

      @@haridasgupta1814 bro ..heheh ..I'm girl ...ohk ..all the best

    • @sudhirpatil6240
      @sudhirpatil6240 5 років тому

      Mera bhi hai kal exam ...Jai SPPU

  • @zohaibtariq-software-engineer
    @zohaibtariq-software-engineer 3 роки тому

    Plz show practical in php

  • @rajannw
    @rajannw 2 роки тому

    change cipher spec matlab??

  • @unlimitedshorts8990
    @unlimitedshorts8990 7 місяців тому +1

    Sir without beard apa acche dikhate ho young 😢

  • @ashwinthankachan9451
    @ashwinthankachan9451 2 роки тому

    Damn ur too good !

  • @niveditamisra6492
    @niveditamisra6492 Рік тому

    Tls handshake bataiye

  • @armansayed290
    @armansayed290 4 місяці тому

  • @HardikPatelhardsome
    @HardikPatelhardsome 9 місяців тому

    thik se samjha bhai... kyu itni halbali kar rha hai 5 min me! symmetric and asymmetric cryptography then symmetric key created and send by client to sever for further actual data communication.

  • @Subha-i2f
    @Subha-i2f 10 місяців тому

    Sir u look like Rohit Sharma

  • @yashdoshi2355
    @yashdoshi2355 10 місяців тому

    khushi likes this.

  • @apooru241
    @apooru241 4 роки тому

    client ko certificate kahan se mlta hai???

    • @khareprateek19
      @khareprateek19 4 роки тому

      Client gets its certificate by its CA or domain PKI

  • @kavyan3759
    @kavyan3759 4 роки тому

    Chiper spec I didn't understand phase 3 n 4

  • @roshanyadav2078
    @roshanyadav2078 Рік тому

    Not understood

  • @meowwithmaya
    @meowwithmaya 4 роки тому

    don't spread wrong information. please check it nd be sure. u r not right. please correct ur self.

  • @asingh4090
    @asingh4090 3 роки тому

    Superficial video, there is no packet level information

  • @pramodkumarw
    @pramodkumarw 2 роки тому

    maza nahi aaya sir ji in 5 min

  • @arpitkaushik9555
    @arpitkaushik9555 5 років тому +1

    sir may i go to toilet.

  • @mohanbharadwaj111
    @mohanbharadwaj111 2 роки тому +6

    complete non sense ! no info on how the server cert is validated how the keys are formed and encapuslated .data went from server to client n client to server finish🙏

    • @Tharkiराबण
      @Tharkiराबण 11 місяців тому +1

      Bro basic structure explain Kiya h 😊

    • @thecrazygamer7334
      @thecrazygamer7334 5 місяців тому +4

      You really want to learn whole syllabus in just one 5 min video😂

  • @govi4565
    @govi4565 3 роки тому

    Thank you sir

  • @satishsomase8559
    @satishsomase8559 5 років тому

    😍

  • @bavaleshakthi2961
    @bavaleshakthi2961 4 роки тому

    Thank you sir

  • @rohangiri4732
    @rohangiri4732 4 роки тому

    Thanks sir ☺️