Master Encryption Basics: Public Key, SSL & Cipher Suites ๐Ÿ”

Discover essential encryption techniques to secure your network! Learn about Public Key Encryption, SSL, and Cipher Suites in this easy-to-understand guide. Perfect for beginners wanting to boost their cybersecurity knowledge.

Master Encryption Basics: Public Key, SSL & Cipher Suites ๐Ÿ”
Network Direction
17.4K views โ€ข Nov 12, 2019
Master Encryption Basics: Public Key, SSL & Cipher Suites ๐Ÿ”

About this video

Learn how to keep your Network secure by understanding the basics of Public Key Encryption, SSL and Cipher Suites. This video is for you!

Thereโ€™s symmetric cryptography, and asymmetric cryptography (Also called public key encryption). And they work in different ways. Symmetric uses keys that are shared with all parties that need to encrypt and decrypt the information. Sharing the keys among everyone can be tricky to do securely.

On the other hand, asymmetric encryption is completely different. This uses a pair of keys, public and private, which are always used together. Either can encrypt, but the other is used to decrypt. The problem is that this is a very slow process.

Good thing we can combine the two to get the best of both worlds. We can use public key encryption to generate and share private keys (as well as perform authentication), and then we can use these keys with a symmetric cipher for the bulk of the secret information.

These ciphers, along with a security protocol (like SSL, TLS, Kerberos, IPSec), a mode of operation, and a hashing algorithm, make up a cipher suite.

But itโ€™s probably easier to understand with an example, such as an HTTPS connection between a client and a web server.

The client and server will send a โ€˜client helloโ€™ and โ€˜server helloโ€™ message, which includes random numbers, suitable cipher suites, and the serverโ€™s certificate.

If they agree to proceed, the client can then generate the pre-master key, encrypt it with the servers' public key, and send it. Both sides can then use their three numbers to generate session keys, which are used with the symmetric cipher for the bulk of encryption.

But any of these ciphers can be found to be insecure in the future. There are a few tricks to learn to keep your systems secure...


Overview of this video:

0:00 Introduction

0:26 Symmetric vs Asymmetric (public key encryption)

3:36 Security Protocols and Cipher Suites

6:23 An SSL Connection

9:07 Staying Secure


Links, for more information:
https://www.ssl.com/article/ssl-tls-handshake-overview/

https://security.stackexchange.com/questions/20803/how-does-ssl-tls-work/20847#20847

https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html

https://cheatsheetseries.owasp.org/cheatsheets/TLS_Cipher_String_Cheat_Sheet.html

https://www.ssllabs.com/ssltest/


(Affiliate Link) Network Security book:
https://click.linksynergy.com/link?id=RL4E*8CmbSY&offerid=145238.1193272&type=2&murl=http%3A%2F%2Fwww.informit.com%2Ftitle%2F9780137156375


Patreon information: https://networkdirection.net/patreon/


LET'S CONNECT

๐ŸŒ https://www.youtube.com/c/networkdirection

๐ŸŒ https://twitter.com/NetwrkDirection

๐ŸŒ https://www.patreon.com/NetworkDirection

๐ŸŒ https://www.networkdirection.net

#NetworkDirection
#cybersecurity
#cryptography

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

17.4K

Likes

349

Duration

11:59

Published

Nov 12, 2019

User Reviews

4.6
(3)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.