Главная

Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS




Video quality The size Download

Информация о Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS


Название :  Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS
Продолжительность :   12.33
Дата публикации :  
Просмотров :   131 rb


Кадры Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS





Описание Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS



Коментарии Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS



Atharv
This video is awesome in explaining this concept and how hashing and encryption come together in PKI as this was what Ive been struggling to grasp in terms of the complete image! Awesome job
Comment from : Atharv


Maniac Views
Very helpful video
Comment from : Maniac Views


Airtist
Very good clear explanation Thanks
Comment from : Airtist


Eddie Valencia
Hey Jim and Pam from The Office!
Comment from : Eddie Valencia


Aquib Mohd
Why can't anyone use Pam's public key to decrypt?? 1:17
Comment from : Aquib Mohd


Bitfluent
Concise, simple, and visual Great video!
Comment from : Bitfluent


Uttpal kant
Just wow, u explained everything so well
Comment from : Uttpal kant


Ersoy Yildirim
Such a perfect and clear explanation
Comment from : Ersoy Yildirim


Thống Trần Lê Quốc
amazing!!!
Comment from : Thống Trần Lê Quốc


SOGUIREL
I finally I understood the difference between public key and private key and their use EVERY THING ENCRYPTED WITH A PERSON X PUBLIC KEY WILL ONLY BE DECRYPTED ONLY WITH THAT PERSON PRIVATE KEY BECAUSE HE IS THE ONLY ONE IN THE WORLD TO THAT PRIVATE KEY BECAUSE PRIVATE KEYS ARE NOT SHARED
Comment from : SOGUIREL


Sahil Jaiswal
Can you please tell if we also pass the hash algo along with the message and the sign? I am confused as to how here Jim would use same hash algo
Comment from : Sahil Jaiswal


Flavio Moreira
Golden content
Comment from : Flavio Moreira


Tihomir Vachkov
Eurica! Finally I got it !!!!!! Thank you very much dude !!!!!
Comment from : Tihomir Vachkov


Blank Blank
Perfect explanationbrThanks so much
Comment from : Blank Blank


Shalini Negi
Thank you for the video
Comment from : Shalini Negi


Guj Sehambi
hi, at 3:12 you make a point to say that this method is good for integrity, but not for the first method at 1:40, you say this method is only good for confidentiality So is the first method not good for integrity? because the only one who can decrypt it is Pam's private key, right?
Comment from : Guj Sehambi


István Szabó
Truly well done 😉
Comment from : István Szabó


Chacopino
Excellent explanation!! Thank you very much!!
Comment from : Chacopino


Rob
I have taken many tutorials online, watched many educational videos but your tutorial is so different You are a great teacher sir I dont understand how but the topic is explained in depth and at the same time in a very brief and concise waybrThank you very much! Keep up the good work!
Comment from : Rob


António Gonçalves
Best video yet, BY FAR All well explained, and following all the principals that we should have in count when learning encryption and informatic security
Comment from : António Gonçalves


KaidJohar Dudhiawala
superbly explained
Comment from : KaidJohar Dudhiawala


Shankar
After watching other some 100 channels vodes, I was hopeless to understand about actual tsl Now I could easily get it at single shot about it I knew it's always who teaches make difference but not the other wayb
Comment from : Shankar


Bryan Quinto
clearest explanation ive watched thanks!
Comment from : Bryan Quinto


Hieu Nguyen
Thank you so much!!! Now it is understandable for me <3
Comment from : Hieu Nguyen


Ellokah Error
Unfortunately, the explanation of the signature as the result of an encryption by the secret key is a common misconception 2:21
Comment from : Ellokah Error


Deadly Commando
the video was fire
Comment from : Deadly Commando


Ali
seeing your videos everyone will switch his/her career to networking 😍
Comment from : Ali


Arjay Tilos
Hi, How did Jim got the public key of PAM? Can you explain how trust works on this processbrThank you
Comment from : Arjay Tilos


sgwong513
agree, this is the best video series explain how the ssl/tls and encryption works
Comment from : sgwong513


Sush Utagi
Thanks for the great explanation my man!
Comment from : Sush Utagi


Mudit Goyal
Can you make a video on 80211i key management?
Comment from : Mudit Goyal


GylbarD
finally super clear
Comment from : GylbarD


Tom Nguyen
FINALLY sometime who actually understand and know how to explain things PROPERLY
Comment from : Tom Nguyen


bablu shaw
In 2:30, are you sure public key can be used to decrypt a message?
Comment from : bablu shaw


Rene
First time someone explained properly why the various techniques are what they are This field has a lot of idiots
Comment from : Rene


Daniel Chen
greate video
Comment from : Daniel Chen


Lawrence
Good Teacher! Very rare to see someone taking difficult concepts and making it simple for others to understand better
Comment from : Lawrence


Ben Tabarzadi
I have never comment for any video EVER! but you are amazing! Simple, short and sweet! THANK YOU SO MUCH! WOW!
Comment from : Ben Tabarzadi


amir mohammadi
i give up vote only to 10 of videos and this video is one of them
Comment from : amir mohammadi


Wong kai zheng
I dont get it A copy of the message is being hashed The ciphertext is being encrypted by private key to become signature The signature is attached to the message and send to the recipent Isnt the message is in plain text?
Comment from : Wong kai zheng


Deep Woods Engineering
Thanks, very clear
Comment from : Deep Woods Engineering


Alex L
Thank you so much for your explanation It is very clear and accurate 🎉🎉🎉
Comment from : Alex L


Mister Shirokov
You are a great tutor and you’ve just got a subscriber, good sir I’ve read tens of articles about ASE and this video is way better than any of them combined (although some were more about the actual functions than the general idea)
Comment from : Mister Shirokov


rajesh rama
The best explanation I came across after a lot of readingThanks a lot sir
Comment from : rajesh rama


ananta akash podder
This is the BESTTT lecture to Public & Private key & how TLS works Thanks a Lot Man 😊❤️😊
Comment from : ananta akash podder


Sagar Jadhav
But how Jim will get Pam's public key to decrypt the message ? Is public key sent with message data ?
Comment from : Sagar Jadhav


K S
In the case of signatures, 9:34 how does Jim know the right hash algorithm to use? Pam might've used SHA-256, how does Jim know to use SHA-256?
Comment from : K S


Shaneakia Jefferson-Abhulimen
Solid solid SOLIDDDD video Thanks !!!
Comment from : Shaneakia Jefferson-Abhulimen


UB
Super work - probably the best SSL videos on Youtube
Comment from : UB


UB
excellentgreat work
Comment from : UB


Vicki-ann Thornton
great video! I only have one question - why does Pam have her eyes closed?
Comment from : Vicki-ann Thornton


karmega kannan
the content you explain is in order and clear to the subject easily understandable
Comment from : karmega kannan


Kwame Owusu
I finally get it lmao I was like how did they get the symmetric keys?!??!
Comment from : Kwame Owusu


Nityoday Tekchandani
Great video!
Comment from : Nityoday Tekchandani


Po
Best explaination I had seen out there! Thanks!
Comment from : Po


Pranjit Kalita
a message was sent from person A to person B by encrypting the message using A's public key, however B faced issues decrypting message What could have gone wrong and how to rectify the problem?
Comment from : Pranjit Kalita


Amrit Prusty
I have struggled for years understanding the concept of Public -Private key This video explained so many concepts with so much ease
Comment from : Amrit Prusty


Atul Surjuse
This is one of the best explanation of the difficult subjectI was struggling to understand the base of this topicNow it's clearedThank you very much!!
Comment from : Atul Surjuse


Xtreme Wolve
Cant thank you enough for sharing this
Comment from : Xtreme Wolve


Sravana Kumar
Wow, great explanation, easily understandable
Comment from : Sravana Kumar


Yousef Imran
My god, I can't believe I had to search so long for a video that makes sense for beginners Subscribed
Comment from : Yousef Imran


Aditya E
You explain really well, after going through few videos and still not grasping the concept your video and explanation helped me understand this concept well Thank you for this video
Comment from : Aditya E


Arutsudar A
08:40 Signatures
Comment from : Arutsudar A


Caius Iulius Caesar
Thank you, thank you, thank you! I finally got how it all works!
Comment from : Caius Iulius Caesar


RR
Nice explanation
Comment from : RR


Nelson Filipe
Fantastic!
Comment from : Nelson Filipe


Mirai Hajar
thank u so much , that was very usefulll
Comment from : Mirai Hajar


Scott Sparling
Ed, you are absolutely the BEST! I'm finishing a 2 year degree at Edmonds and feel like I've learned little (all during covid, virtual) and frequently refer back to your amazing instruction You def have the calling of a professor (not to mention your obvious chops as an engineer)
Comment from : Scott Sparling


Nathan Boom!!
Great video
Comment from : Nathan Boom!!


Vaishnavi Chawale
Grt
Comment from : Vaishnavi Chawale


Vaishnavi Chawale
Grg
Comment from : Vaishnavi Chawale


Tsvetan
So, is this how, figuratively speaking, bitcoin works?
Comment from : Tsvetan


NY Borat
Thank you so much Good explanation
Comment from : NY Borat


Vesna
Here is a thing though - you can always steal someone's private key :) So how do you REALLY know the private key is THE private key????
Comment from : Vesna


Jugjiwan Seewooruttun
Great explanation! Thank you
Comment from : Jugjiwan Seewooruttun


lee herfel
thanks
Comment from : lee herfel


El Barto
el barto was here
Comment from : El Barto


Periklis Karagiannis
This video is awesome, Congratulations !!!!!
Comment from : Periklis Karagiannis


sandhya chowdhary
Thank you so so much for the great explanation 😊
Comment from : sandhya chowdhary


sandhya chowdhary
Amazingly tutorial 👍the best all my doubts are cleared
Comment from : sandhya chowdhary


IAmACoder
Thanks man, amazing explanation
Comment from : IAmACoder


Marcelo
Great and clear explanation! Thanks!
Comment from : Marcelo



Похожие на Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS видео

What are addresses, public keys u0026 private keys? Cryptography explained | Bitpanda Academy Lesson 7 What are addresses, public keys u0026 private keys? Cryptography explained | Bitpanda Academy Lesson 7
РѕС‚ : Bitpanda Global
Download Full Episodes | The Most Watched videos of all time
What are Public Keys u0026 Private Keys in #Crypto #cryptowallet What are Public Keys u0026 Private Keys in #Crypto #cryptowallet
РѕС‚ : Sahicoin
Download Full Episodes | The Most Watched videos of all time
Ethereum - Tutorial 3 - Private Keys, Public Keys, and Account Addresses Ethereum - Tutorial 3 - Private Keys, Public Keys, and Account Addresses
РѕС‚ : thenewboston
Download Full Episodes | The Most Watched videos of all time
What are Public Keys and Private Keys in Cryptocurrency What are Public Keys and Private Keys in Cryptocurrency
РѕС‚ : G Charles
Download Full Episodes | The Most Watched videos of all time
Public Keys vs Private Keys ? Crypto Wallets Explained! ? (In 50 Seconds! ?) #cryptocurrency Public Keys vs Private Keys ? Crypto Wallets Explained! ? (In 50 Seconds! ?) #cryptocurrency
РѕС‚ : Crypto Casey
Download Full Episodes | The Most Watched videos of all time
GET IT FOR FREE Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin GET IT FOR FREE Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin
РѕС‚ : Premacy Sounds Entertainment
Download Full Episodes | The Most Watched videos of all time
How to solve the Private Key Puzzle - Find your Bitcoin Private Key How to solve the Private Key Puzzle - Find your Bitcoin Private Key
РѕС‚ : Brand KEY
Download Full Episodes | The Most Watched videos of all time
FREE DOWNLOAD Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin FREE DOWNLOAD Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin
РѕС‚ : Alejandro Zuleta
Download Full Episodes | The Most Watched videos of all time
How To Get Private Key Of Dogecoin Wallet | Find Private Key How To Get Private Key Of Dogecoin Wallet | Find Private Key
РѕС‚ : Crypto Wallets Info
Download Full Episodes | The Most Watched videos of all time
Was sind private u0026 public keys? | Blocktrainer 1x1 Was sind private u0026 public keys? | Blocktrainer 1x1
РѕС‚ : Blocktrainer
Download Full Episodes | The Most Watched videos of all time