You're very welcome =). Could you do me a favor? Do you mind sharing this video on Linked In, Reddit, Twitter, Facebook, or any other social media you use? As an independent creator, that would be an _enormous_ help, and I would appreciate it _greatly_ .
Watched all this playlist, incredibly useful lessons. Information is straightforward and very easy to understand even for those who haven't had any experience with encryption algos (like me). Highly recommended for any IT folks.
A really great explanation of how all things work out in TLS. Thanks for making easily understandable diagrams, explanations. These concepts weren't clear well to me during engineering, and always used to scare the shit out of me. I believe these concepts will help me to atleast read few articles now independently to use these concepts in my work. Thanks again !
This is the one which is connecting all the dots. Awesome. 1) In reality do we use 2 different symmetric keys? Just one symmetric key can do both encryption & hashing, right? 2) Do they negotiate which algorithms to use for encryption & hashing during SSL handshake?
A key is just a string of bits. Yes, you could absolutely use the same key (string of bits) to do both encryption & hashing. But it costs nearly nothing to generate more bits from a starting secret, and makes it twice as hard to brute force if you use two keys, so often the keys are used for only one purpose. In reality, 4 keys are generated, so you have different keys for encryption and hashing, *in each direction*. More details in the full TLS course =). Also, you might enjoy the DH section of this article if you want to learn more: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
@@PracticalNetworking Definitely did enjoy it. I finished half the course in a day. Remaining half is for the next day. So much knowledge in the series. Sincere thanks for this.
This really is a great overview that 'puts together' the full course. It's a great course, especially for those who appreciate visual aids for comprehension and 'putting the pieces together'.
Hello. Great video and great way of explaining this concept. I have question, am i right if i say that https request for web page is sent after client and server establish session keys?
@@mirzadzafic8999 PS, more details on "HTTP conversation" within SSL Tunnel in this video: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-E5bSumTAHZE.html
Trying to buy the TLS course. I am from India. The payment is getting declined using VISA Credit / Debit cards. And paypal payment is kind of getting stuck. Can you please help me get this Cyber Monday sale?
@@PracticalNetworking Never mind, Ed. I tried using a different card and it worked. I had sent you an email before that - please ignore. Looking forward to the course. Please keep up the great work.