SSL/TLS handshake Protocol
Вставка
- Опубліковано 10 лип 2024
- Please support my channel by becoming a Sunny Classroom member. Your support is much appreciated.
/ sunnyclassroom
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.
Playlist: Advanced Cryptography -
• What is digital signat...
Playlist: Basic Cryptography
• Private Key Encryption...
Please subscribe to my channel!
Please leave comments or questions!
Many thanks,
Sunny Classroom
Great Job Sunny!!
I can't believe how many videos I had to watch until someone actually explained this concept. Every other video was a complete waste of time. I really enjoyed the clear details and breakdown of the process.
Thank you very much for your nice words. I will try my best to keep up with your compliment.
3 years later and these videos are still great learning and reference material. Thanks very much 👍🏾
I put your video on 1,25X speed, and it sounds even better!
I will speed it up: haha.
The speed is perfect for non native English speakers like me... and I think Mr.Sunny but in his mind this.. and this is why he always provide subtitles.
Thank you Mr.Sunny.
Haha
thank you
thanks
Very detailed explained! Thank you for the video. On step 2, the server's digital certificate IS the server's public key, signed by the CA. It brings a lot of confusion to a lot of people not being told clearly that a certificate is just a public key whose ownership has been certified by a CA. So you can basically say that the certificate is what is used to encrypt the client key, once the CA signing it has been verified.
Comment deserves to be pinned to the top. I was wondering why a man in the middle couldn't just eavesdrop and replace the server public key with it's own. Now it makes sense
Yes Certifcate must be encrypted by Public key first. Otherwise anyone can steal the certificate and duplicate it.
Clear; Concise; Comprehensible!
Well Done and Thank You for breaking SSL/TLS, high-level essentials down so amicably. Will check out your other Classroom topics.
Keep it going!
thank you, nice animation which saves me a few hours. this is the best video i've seen about how ssl works.
AGREE
Thank you for your very synthesized videos, very very useful. Master class in 5 minutes about the basic concept of SSL you smashed it!
You are welcome! Thanks a lot for your compliment.
Sunny, you've helped me with a lot of my cryptography assignments. thanks a ton!
I am glad my videos help you.
Thank you for the video! I appreciate you taking your time and getting in depth about this! A lot of videos are too vague/general for my liking.
I love how you explain stuff and everything is to the point and the info is valuable. Thank you! I am subscribing definitely
Thank you very much!
Crisp and clear! Just what I was looking for! Thanks Sunny! It helped!
Very helpful! I was confused by the way my textbook worded this, but this explanation cleared it up for me!
this is the best video i've seen about how ssl works.
Excellent video Sunny ! Simple and to the point !
sunny ! u just revived all i was striving to recall.
Great explanation! Looking forward to more helpful videos about network and security. Thanks!
What a explanation! Really appreciate for expalning this complex topic in very simple way.
2020 and is still one of my favorite video, excelent explanation, thank you so much
Thank you for making concept so crystal clear
Excellent work! Thanks for this!
You are welcome!
V well illustrated, good job
Thank you for this detailed explained tutorial/video!
Awesome explanation sunny! Really clear. Appreciate it and keep up your good work!
Thanks for the great explanation
This is a fabulous explanation!
you are the best in my leaning trip, thanks great video!
Excellent explanation, in simple language. Thanks for taking the time to explain this concept.
The best networking teacher ever. Thanks Sunny!
This is too good, amazing how simple it is
Thanks for the lovely delivery of the information.
very thankfull for your video, they are so clearly!
Thanks Sunny, not just for helpful video but also for easy language.
Thank you very much for explaining in a way that is easy to understand. Watched several videos before this and it was still confusing. Glad that I came across your video. Thank you for your contributions.
You're very welcome!
Thank you. This was very helpful and informative!
Greatly done Sunny...!!!
awesome explanation, Thank you!
thank you for the crystal clear explanation !!!
That's one of the best explanations I've seen. Thank you and congrats!
Great video on the topic. Thanks!
Glad you liked it!
Brilliantly simplified explanation, thanks a lot Sir!
Thank you and you are welcome.
Great video I you explained this in such a simple way and it makes it easy to follow along!
Thank you sir for a great video - I am learning this and at the early days. I come from a network background so dealing with SSL/TLS is a new thing for me. All the best and thanks again.
Jim
I am glad this video is helpful. You are welcome.
Great series of videos. They help immensely with my studies in electrical engineering. Thank You :-D
you are welcome!
Wow Sunny ! awesome crisp explanation :)
Very helpful and useful specially for people like me who wants to recall the concept of trust, digital certs., SSL/TLS handshake and PKI. Thank you so much Mr. Sunny.
great content man! thanks!
My pleasure!
Thank you so much for easy understanding
Probably the best explanation our there in my opinion, fantastic content - thanks!
You are welcome and thank you very much for your nice comment!
fantastic video, thanks very much
awesome video!
Very helpful and clear. Thank you.
Thanks Sunny! Very helpfull indeed!
Good job man, good explanation
great! easy to understand
Ultimate explanation 👏👏
great stuff man
Simple and precise explanation. Good one
thank you for this video!
You're so welcome!
Thank you So much Sunny! Your Videos are Great!!
Thanks a lot!
Best explanation ever! Thank you very much!
Fantastic. I now understand the handshake! thanks
You re welcome !
Good explanation. Thank you.
Well done Mr.Sunny
It wasn't until I stumbled upon your channel have these things become all clear to me. I've been not able to understand how certificate, digital signature, and SSL, HTTPS and the likes works for years. Too many videos articles go into details with the missing pieces at the high-level or not explaining the how at all. Now that I understand it, I can see how horrible many of these materials are at explaining things. Thank you so much. Now I can read other detailed articles with much more clarity. Thanks again!
Now that I know more about this topic. It seems a little too simplified for me. Computerphile gives more details.
thank u so much! this was really helpful :)
Thank you so much Sunny. Your explanation on each topic is clear and concise.
Glad it was helpful!
Very Nice Explanation
Thanks a lot for this amazingly explanation Mr.Sunny , this video was very helpful 💜
you are welcome!
You just help me not fail my exam. Thank you very much
Glad to hear that!
@@sunnyclassroom24 Ohh I got 100% All thanks to you
Excellent explanation sunny thank you for this 👍🏻
Thank you very much, it was very helpful, step by step explanation make the concept understandable.
Nice explanation !
Glad it helped!
Excellent!
Thanks a lot for your kind comment.
Tx you Sunny.
Excellent expilcation !!!
thanks a lot!
you're excellent in teaching, thanks for the simplicity explanation
Glad it was helpful!
I prefer to think of the public key as a portable safe and the private key as the key for the portable safe.
Bob wants to send a message to Jane. Bob asks for Jane's portable safe. Jane gives Bob her portable safe but keeps the key. Bob puts the message in Jane's safe, shuts the door, then sends the portable safe back to Jane. Jane uses her key to open the safe and read Bob's message.
The (private) key never leaves Jane's house, only the portable safe does. The safe is pretty heavy so you don't want to do it every time. So you only do it once at the start, to share a secret cipher to encrypt all subsequent messages.
Bro you single handedly made this make more sense to me than anyone could. Thank you so much.
@@5gun1 Thanks, glad it helped! i always thought the idea of a key unlocking another key was weird, so the idea of a key unlocking a safe just made more sense to me!
Thanks for sharing such a wonderful video..and very helpful..
Well done man. You're really a good teacher.
Thank you for your comments! Check out my other videos please!
nice video thx a lot
Very well explained
Very accurate. Thank you
You are so welcome
Perfect ..... Thank You
well explained, thanks!
Thanks.
Excellent
Excellent 👌
it is crazy that all this is done in a matter of seconds.
yes, even in a millisecond.
@@sunnyclassroom24 true! Also your videos are perfect for visual learners such as myself! Thank you for your hard work!
@@kristophskidoo324 You are welcome!
Update: I wish I saw this years ago.
Best teacher. !
Thank you for your simple yet concise explanation Sir Sunny
Wow great refreshing video. Thanks +1
It really helped! Thanks Guru Ji
Wonderful
Thanks very much
brilliant. thanks
You are welcome!
Nice expained .
THANK YOU SIR .
Very helpful video, thx
You are welcome!
Thanks Sir for your works
You are welcome!
great job
Hi, Excellent video. Simple yet comprehensive. Keep up the good work.