Encryption Basics | Public Key Encryption | SSL
Learn how to keep your Network secure by understanding the basics of Public Key Encryption, SSL and Cipher Suites. This video is for you! Thereās symmetric ...
š„ Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'bursa deprem'.
About this video
Learn how to keep your Network secure by understanding the basics of Public Key Encryption, SSL and Cipher Suites. This video is for you!
Thereās symmetric cryptography, and asymmetric cryptography (Also called public key encryption). And they work in different ways. Symmetric uses keys that are shared with all parties that need to encrypt and decrypt the information. Sharing the keys among everyone can be tricky to do securely.
On the other hand, asymmetric encryption is completely different. This uses a pair of keys, public and private, which are always used together. Either can encrypt, but the other is used to decrypt. The problem is that this is a very slow process.
Good thing we can combine the two to get the best of both worlds. We can use public key encryption to generate and share private keys (as well as perform authentication), and then we can use these keys with a symmetric cipher for the bulk of the secret information.
These ciphers, along with a security protocol (like SSL, TLS, Kerberos, IPSec), a mode of operation, and a hashing algorithm, make up a cipher suite.
But itās probably easier to understand with an example, such as an HTTPS connection between a client and a web server.
The client and server will send a āclient helloā and āserver helloā message, which includes random numbers, suitable cipher suites, and the serverās certificate.
If they agree to proceed, the client can then generate the pre-master key, encrypt it with the servers' public key, and send it. Both sides can then use their three numbers to generate session keys, which are used with the symmetric cipher for the bulk of encryption.
But any of these ciphers can be found to be insecure in the future. There are a few tricks to learn to keep your systems secure...
Overview of this video:
0:00 Introduction
0:26 Symmetric vs Asymmetric (public key encryption)
3:36 Security Protocols and Cipher Suites
6:23 An SSL Connection
9:07 Staying Secure
Links, for more information:
https://www.ssl.com/article/ssl-tls-handshake-overview/
https://security.stackexchange.com/questions/20803/how-does-ssl-tls-work/20847#20847
https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html
https://cheatsheetseries.owasp.org/cheatsheets/TLS_Cipher_String_Cheat_Sheet.html
https://www.ssllabs.com/ssltest/
(Affiliate Link) Network Security book:
https://click.linksynergy.com/link?id=RL4E*8CmbSY&offerid=145238.1193272&type=2&murl=http%3A%2F%2Fwww.informit.com%2Ftitle%2F9780137156375
Patreon information: https://networkdirection.net/patreon/
LET'S CONNECT
š https://www.youtube.com/c/networkdirection
š https://twitter.com/NetwrkDirection
š https://www.patreon.com/NetworkDirection
š https://www.networkdirection.net
#NetworkDirection
#cybersecurity
#cryptography
Video Information
Views
17.4K
Total views since publication
Likes
349
User likes and reactions
Duration
11:59
Video length
Published
Nov 12, 2019
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Network direction #Encryption #Cryptography #Cipher #Cipher text #Decryption #asymmetric encryption vs symmetric encryption #asymmetric encryption #asymmetric encryption ssl #public key encryption #cryptography basics #encryption basics #Brute force #Algorithm #Protocol #Https #Integrity #Authentication #Aes #Rsa #Des #Tls #Ssl #Sha #Block cipher #Mode of operation #Gcm #Cbc #Hash #Message digest #Public key #Private key #Symmetric #Cipher suite #Server hello #Diffie-hellman #Owasp #ssllabs
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.