SSL/TLS handshake Protocol
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.
Playlist: Advanced Cryptography –
Playlist: Basic Cryptography
Please subscribe to my channel!
Please leave comments or questions!
Many thanks,
Sunny Classroom
Hi Sunny. Hope you had a good Christmas!
Crisp and clear! Just what I was looking for! Thanks Sunny! It helped!
Isn't server public key part of the certificate? at 3:31 it's listed as a separate item on the list.
starts at 2:47 . You're welcome!
Excellent 👌
I have a question. When you mentions "secret key", it's refered to the public or private key? or both?
Ssl domain link 👉 https://affiliates.ssl.com/711.html ok 💕💕💓💕
When it comes to the TCP/IP model, there is no Network layer but the Internet layer. Anyway, I enjoy watching your videos and subscribed your channel.
awesome
Great tutorial my dude, despite of your accent. You speak slow and clear for better understanding.
Thanks a lot.. this concept is cleared now. I can move to the next one now :p
Great explanation.
컴프 숙제 때문에 왔습니다
You just help me not fail my exam. Thank you very much
Hurro
Great Job Sunny Yaar…..You save my at Least 2 Hours
you're excellent in teaching, thanks for the simplicity explanation
great content man! thanks!
Best explanation ever! Thank you very much!
Binod
thank you for this video!
Why would the client need to communicate with CA? The whole point of certificates is to not have to do it, right? I also heard that there are other methods of authetication in TLS than the presented RSA. What is with Deffie-Hellmann?
I’m afraid this video is not complete 😐
Hey, if I’m wrong please answer me!
Great
Thank you so much Sunny. Your explanation on each topic is clear and concise.
Thank you for great explanation!
I would like to know this is asymmetric or Symmetric cryptography?
Thank you very much for explaining in a way that is easy to understand. Watched several videos before this and it was still confusing. Glad that I came across your video. Thank you for your contributions.
wonderful
Why do they use a symmetric shared key? Why dont they both have public keys of their own, and their own private keys?
Very accurate. Thank you
Done thanks
2:50 protocol example
Client encrypts a shared symmetric key with the server’s public key (after verifying the servers identity with a CA)
Nice explanation !
Sunny, I have a question.. Does SSL handshake happens for each request or will there be any session which browser maintains
Form your explanation it seems like they just share the secret key right away. But in reality, they agree on a premaster secret and shared secret key is generated from it. (Diffie Hellman)
Great video on the topic. Thanks!
Architects need to read this https://dzone.com/articles/the-case-for-serving-multiple-httpsssl-certificate
我第一次在youtube上听见技术类视频,用中国口音
Great info keep up the good work ✊🏽✊🏽✊🏽✊🏽✊🏽✊🏽✊🏽✊🏽
Excellent video Sunny ! Simple and to the point !
Hi, Sunny, thanks for the wonderful explaination. One quick question in mind. So in the video, the client verify the server by checking its public certificate. But how does the server check the validity of the client?
Awesome explanation sunny! Really clear. Appreciate it and keep up your good work!
Why would the browser ever talk to the CA? Doesn't it have a list of trusted CAs and their respective public keys locally?
THANK YOU SIR .
2020 and is still one of my favorite video, excelent explanation, thank you so much
Greatly done Sunny…!!!