Название | : | Public and Private Keys - Signatures u0026 Key Exchanges - Cryptography - Practical TLS |
Продолжительность | : | 12.33 |
Дата публикации | : | |
Просмотров | : | 131 rb |
|
This video is awesome in explaining this concept and how hashing and encryption come together in PKI as this was what Ive been struggling to grasp in terms of the complete image! Awesome job Comment from : Atharv |
|
Very helpful video Comment from : Maniac Views |
|
Very good clear explanation Thanks Comment from : Airtist |
|
Hey Jim and Pam from The Office! Comment from : Eddie Valencia |
|
Why can't anyone use Pam's public key to decrypt?? 1:17 Comment from : Aquib Mohd |
|
Concise, simple, and visual Great video! Comment from : Bitfluent |
|
Just wow, u explained everything so well Comment from : Uttpal kant |
|
Such a perfect and clear explanation Comment from : Ersoy Yildirim |
|
amazing!!! Comment from : Thống Trần Lê Quốc |
|
I finally I understood the difference between public key and private key and their use EVERY THING ENCRYPTED WITH A PERSON X PUBLIC KEY WILL ONLY BE DECRYPTED ONLY WITH THAT PERSON PRIVATE KEY BECAUSE HE IS THE ONLY ONE IN THE WORLD TO THAT PRIVATE KEY BECAUSE PRIVATE KEYS ARE NOT SHARED Comment from : SOGUIREL |
|
Can you please tell if we also pass the hash algo along with the message and the sign? I am confused as to how here Jim would use same hash algo Comment from : Sahil Jaiswal |
|
Golden content Comment from : Flavio Moreira |
|
Eurica! Finally I got it !!!!!! Thank you very much dude !!!!! Comment from : Tihomir Vachkov |
|
Perfect explanationbrThanks so much Comment from : Blank Blank |
|
Thank you for the video Comment from : Shalini Negi |
|
hi, at 3:12 you make a point to say that this method is good for integrity, but not for the first method at 1:40, you say this method is only good for confidentiality So is the first method not good for integrity? because the only one who can decrypt it is Pam's private key, right? Comment from : Guj Sehambi |
|
Truly well done 😉 Comment from : István Szabó |
|
Excellent explanation!! Thank you very much!! Comment from : Chacopino |
|
I have taken many tutorials online, watched many educational videos but your tutorial is so different You are a great teacher sir I dont understand how but the topic is explained in depth and at the same time in a very brief and concise waybrThank you very much! Keep up the good work! Comment from : Rob |
|
Best video yet, BY FAR All well explained, and following all the principals that we should have in count when learning encryption and informatic security Comment from : António Gonçalves |
|
superbly explained Comment from : KaidJohar Dudhiawala |
|
After watching other some 100 channels vodes, I was hopeless to understand about actual tsl Now I could easily get it at single shot about it I knew it's always who teaches make difference but not the other wayb Comment from : Shankar |
|
clearest explanation ive watched thanks! Comment from : Bryan Quinto |
|
Thank you so much!!! Now it is understandable for me <3 Comment from : Hieu Nguyen |
|
Unfortunately, the explanation of the signature as the result of an encryption by the secret key is a common misconception 2:21 Comment from : Ellokah Error |
|
the video was fire Comment from : Deadly Commando |
|
seeing your videos everyone will switch his/her career to networking 😍 Comment from : Ali |
|
Hi, How did Jim got the public key of PAM? Can you explain how trust works on this processbrThank you Comment from : Arjay Tilos |
|
agree, this is the best video series explain how the ssl/tls and encryption works Comment from : sgwong513 |
|
Thanks for the great explanation my man! Comment from : Sush Utagi |
|
Can you make a video on 80211i key management? Comment from : Mudit Goyal |
|
finally super clear Comment from : GylbarD |
|
FINALLY sometime who actually understand and know how to explain things PROPERLY Comment from : Tom Nguyen |
|
In 2:30, are you sure public key can be used to decrypt a message? Comment from : bablu shaw |
|
First time someone explained properly why the various techniques are what they are This field has a lot of idiots Comment from : Rene |
|
greate video Comment from : Daniel Chen |
|
Good Teacher! Very rare to see someone taking difficult concepts and making it simple for others to understand better Comment from : Lawrence |
|
I have never comment for any video EVER! but you are amazing! Simple, short and sweet! THANK YOU SO MUCH! WOW! Comment from : Ben Tabarzadi |
|
i give up vote only to 10 of videos and this video is one of them Comment from : amir mohammadi |
|
I dont get it A copy of the message is being hashed The ciphertext is being encrypted by private key to become signature The signature is attached to the message and send to the recipent Isnt the message is in plain text? Comment from : Wong kai zheng |
|
Thanks, very clear Comment from : Deep Woods Engineering |
|
Thank you so much for your explanation It is very clear and accurate 🎉🎉🎉 Comment from : Alex L |
|
You are a great tutor and you’ve just got a subscriber, good sir I’ve read tens of articles about ASE and this video is way better than any of them combined (although some were more about the actual functions than the general idea) Comment from : Mister Shirokov |
|
The best explanation I came across after a lot of readingThanks a lot sir Comment from : rajesh rama |
|
This is the BESTTT lecture to Public & Private key & how TLS works Thanks a Lot Man 😊❤️😊 Comment from : ananta akash podder |
|
But how Jim will get Pam's public key to decrypt the message ? Is public key sent with message data ? Comment from : Sagar Jadhav |
|
In the case of signatures, 9:34 how does Jim know the right hash algorithm to use? Pam might've used SHA-256, how does Jim know to use SHA-256? Comment from : K S |
|
Solid solid SOLIDDDD video Thanks !!! Comment from : Shaneakia Jefferson-Abhulimen |
|
Super work - probably the best SSL videos on Youtube Comment from : UB |
|
excellentgreat work Comment from : UB |
|
great video! I only have one question - why does Pam have her eyes closed? Comment from : Vicki-ann Thornton |
|
the content you explain is in order and clear to the subject easily understandable Comment from : karmega kannan |
|
I finally get it lmao I was like how did they get the symmetric keys?!??! Comment from : Kwame Owusu |
|
Great video! Comment from : Nityoday Tekchandani |
|
Best explaination I had seen out there! Thanks! Comment from : Po |
|
a message was sent from person A to person B by encrypting the message using A's public key, however B faced issues decrypting message What could have gone wrong and how to rectify the problem? Comment from : Pranjit Kalita |
|
I have struggled for years understanding the concept of Public -Private key This video explained so many concepts with so much ease Comment from : Amrit Prusty |
|
This is one of the best explanation of the difficult subjectI was struggling to understand the base of this topicNow it's clearedThank you very much!! Comment from : Atul Surjuse |
|
Cant thank you enough for sharing this Comment from : Xtreme Wolve |
|
Wow, great explanation, easily understandable Comment from : Sravana Kumar |
|
My god, I can't believe I had to search so long for a video that makes sense for beginners Subscribed Comment from : Yousef Imran |
|
You explain really well, after going through few videos and still not grasping the concept your video and explanation helped me understand this concept well Thank you for this video Comment from : Aditya E |
|
08:40 Signatures Comment from : Arutsudar A |
|
Thank you, thank you, thank you! I finally got how it all works! Comment from : Caius Iulius Caesar |
|
Nice explanation Comment from : RR |
|
Fantastic! Comment from : Nelson Filipe |
|
thank u so much , that was very usefulll Comment from : Mirai Hajar |
|
Ed, you are absolutely the BEST! I'm finishing a 2 year degree at Edmonds and feel like I've learned little (all during covid, virtual) and frequently refer back to your amazing instruction You def have the calling of a professor (not to mention your obvious chops as an engineer) Comment from : Scott Sparling |
|
Great video Comment from : Nathan Boom!! |
|
Grt Comment from : Vaishnavi Chawale |
|
Grg Comment from : Vaishnavi Chawale |
|
So, is this how, figuratively speaking, bitcoin works? Comment from : Tsvetan |
|
Thank you so much Good explanation Comment from : NY Borat |
|
Here is a thing though - you can always steal someone's private key :) So how do you REALLY know the private key is THE private key???? Comment from : Vesna |
|
Great explanation! Thank you Comment from : Jugjiwan Seewooruttun |
|
thanks Comment from : lee herfel |
|
el barto was here Comment from : El Barto |
|
This video is awesome, Congratulations !!!!! Comment from : Periklis Karagiannis |
|
Thank you so so much for the great explanation 😊 Comment from : sandhya chowdhary |
|
Amazingly tutorial 👍the best all my doubts are cleared Comment from : sandhya chowdhary |
|
Thanks man, amazing explanation Comment from : IAmACoder |
|
Great and clear explanation! Thanks! Comment from : Marcelo |
![]() |
What are addresses, public keys u0026 private keys? Cryptography explained | Bitpanda Academy Lesson 7 РѕС‚ : Bitpanda Global Download Full Episodes | The Most Watched videos of all time |
![]() |
What are Public Keys u0026 Private Keys in #Crypto #cryptowallet РѕС‚ : Sahicoin Download Full Episodes | The Most Watched videos of all time |
![]() |
Ethereum - Tutorial 3 - Private Keys, Public Keys, and Account Addresses РѕС‚ : thenewboston Download Full Episodes | The Most Watched videos of all time |
![]() |
What are Public Keys and Private Keys in Cryptocurrency РѕС‚ : G Charles Download Full Episodes | The Most Watched videos of all time |
![]() |
Public Keys vs Private Keys ? Crypto Wallets Explained! ? (In 50 Seconds! ?) #cryptocurrency РѕС‚ : Crypto Casey Download Full Episodes | The Most Watched videos of all time |
![]() |
GET IT FOR FREE Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin РѕС‚ : Premacy Sounds Entertainment Download Full Episodes | The Most Watched videos of all time |
![]() |
How to solve the Private Key Puzzle - Find your Bitcoin Private Key РѕС‚ : Brand KEY Download Full Episodes | The Most Watched videos of all time |
![]() |
FREE DOWNLOAD Bitcoin Private Key Bitcoin Checker ACTIVATE 2023 / Bitcoin Private Key Bitcoin РѕС‚ : Alejandro Zuleta Download Full Episodes | The Most Watched videos of all time |
![]() |
How To Get Private Key Of Dogecoin Wallet | Find Private Key РѕС‚ : Crypto Wallets Info Download Full Episodes | The Most Watched videos of all time |
![]() |
Was sind private u0026 public keys? | Blocktrainer 1x1 РѕС‚ : Blocktrainer Download Full Episodes | The Most Watched videos of all time |