Tech Talk: What is Public Key Infrastructure (PKI)?

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 พ.ย. 2024

ความคิดเห็น • 194

  • @sofianeini
    @sofianeini 2 ปีที่แล้ว +146

    4:47 secrets are encrypted with Public keys and decrypted by Private keys.... The other way around would expose the secret.

    • @homebarista
      @homebarista 2 ปีที่แล้ว +35

      I wondered how long it would take for someone to point that out! 😅
      You're correct, in the case of sending a symmetric encryption key I was responding to, the SENDER would encrypt it with the public key of the RECEIVER and then the receiver would decrypt it with THEIR private key. If the SENDER used their private key to encrypt it, then anyone could decrypt it using the [presumably well-known] public key of the sender.

    • @wizard_in_oz
      @wizard_in_oz 2 ปีที่แล้ว +22

      Talking on a simplistic level, the problem is solved by the
      1) client generating the symmetric key,
      2) encrypting it with the server's public key and
      3) sending it to the sever, which then can
      4) decrypt the encrypted symmetric key with it's private key.
      5) Thereafter, the communication can proceed in an encrypted manner (encrypted with the exchanged symmetric key)

    • @sofianeini
      @sofianeini 2 ปีที่แล้ว +6

      @@wizard_in_oz absolutely, and this is exactly how SSL/TLS ,SSH tunnels are created for example.

    • @michaelf2646
      @michaelf2646 2 ปีที่แล้ว +2

      100% Correct. Wonder why none of these guys presenting caught that. 😂

    • @homebarista
      @homebarista 2 ปีที่แล้ว +17

      ​ @Michael F ​Sigh! When I'm speaking spontaneously and rapidly, I sometimes use the wrong word. Senior moment? Jeff obviously knows security - he even teaches it at our local university. Either he missed my error in the moment or was being kind.

  • @Dalai33
    @Dalai33 9 หลายเดือนก่อน +56

    Why no one else in the earth has explained this to me this very simple way? 90k college loan and still watching youtube. Thank you IBM and the gentleman on the right. You are such an awesome free thinking teacher

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน +6

      I’m glad this explanation made sense to you!

  • @NassimDhaher
    @NassimDhaher ปีที่แล้ว +7

    I know PKI but keep forgetting it, once or twice a year I come to these videos to remind me. Thanks for the objective content.

  • @earthling_parth
    @earthling_parth 2 ปีที่แล้ว +55

    This was one of the best explanations of PKI that I've heard. Amazing job guys 👏

    • @jeffcrume
      @jeffcrume 2 ปีที่แล้ว +1

      Thanks so much for the kind words of encouragement! It’s a complicated topic and I had to take some liberties with the explanations in order to fit the time constraints, but, hopefully, it shed some light on a really fascinating, but gorpy, topic

    • @nishantdalvi9470
      @nishantdalvi9470 7 หลายเดือนก่อน

      @@jeffcrume Hey in this video it is been said that any one key can be arbitrarily chosen as a public key but i was under the impression that once the key pairs are generated they are specifically private and public because of the derivation of one key from the another i.e. We can't derive the private via the help of public key if we possess it but we can derive public key with the help of private key which distinguishes these key from each other and we can't randomly select any one key as the public from the available pair

  • @15LVV
    @15LVV 9 หลายเดือนก่อน +9

    Observation that I found amusing. In order for their writing to be read by us, they rendered the video horizontally reversed. But here's the cool thing. The guy on the left was so committed to the reversal process, he swapped his wedding ring to his right hand, so it would show left in the video. I pose this concept for discussion and debate. ;)

  • @Michaelno
    @Michaelno ปีที่แล้ว +5

    Studying Cyber Security, this video really helped me get a visual. The book was slow and dry.

  • @angelotalabert4942
    @angelotalabert4942 2 ปีที่แล้ว +15

    this one was definitely great the conversation style makes it easy to digest

  • @manawardhana
    @manawardhana 2 ปีที่แล้ว +8

    Simplicity and brevity at their best! Thank you!

  • @waliedahmed5030
    @waliedahmed5030 5 หลายเดือนก่อน

    This is the best channel for explaining cybersecurity concepts.

  • @SNDVeteran
    @SNDVeteran 2 ปีที่แล้ว +3

    Learned this in network defense essentials and this is a execellent video for briefly explaining cyptography.

  • @REZAZIMohamedabdessamed
    @REZAZIMohamedabdessamed ปีที่แล้ว +2

    This is really a good and clean approach of clarifying the term!

  • @ankithakur8838
    @ankithakur8838 3 หลายเดือนก่อน

    loved how simply the topic is explained..

  • @1VArtt
    @1VArtt 9 หลายเดือนก่อน

    A very clear audio simulation of nails on a chalkboard. Thank you

  • @sitrakaforler8696
    @sitrakaforler8696 2 ปีที่แล้ว +3

    More pedagogy than during my bachelor 😭
    Keep it up!!!!!

  • @andrewa3216
    @andrewa3216 2 ปีที่แล้ว +10

    It should be noted that once you establish an asymmetric connection with a website it then switches to symmetric. If it stayed asymmetric the entire time that would be a lot of bandwidth and SLOW

    • @jeffcrume
      @jeffcrume 2 ปีที่แล้ว +2

      Exactly right. Asymmetric is used to solve the key distribution problem but symmetric is used to encrypt the bulk of the data

  • @leebobtheblob87
    @leebobtheblob87 ปีที่แล้ว

    1:48 root user - key
    2:01 hw : secure
    2:40 public key is telling world how to coommunicate w me
    3:10 : public / private is chosen

  • @when_life_gives_you_limes
    @when_life_gives_you_limes 2 ปีที่แล้ว +2

    A very concise talk about PKI. Awesome!

  • @lou-j4p
    @lou-j4p 7 หลายเดือนก่อน +1

    Great explanation to clear any confusion with this topic, much appreciated!

  • @kiranvadlamudi8213
    @kiranvadlamudi8213 4 หลายเดือนก่อน

    Started understanding more and more. These concepts are most important. Thanks for the video.

  • @dancalmusic
    @dancalmusic 6 หลายเดือนก่อน +1

    Jeff Crume, as usual an awesome teacher

  • @s.gardner7576
    @s.gardner7576 2 ปีที่แล้ว +4

    This is some very clear and really exciting stuff. Haven't seen many people break this down in such a way making it so easy to understand. Good stuff guys!

  • @ahyi9350
    @ahyi9350 2 ปีที่แล้ว +3

    I used to learn this the hard way. This conversation is awesome and easy to digest!

  • @StopWhining491
    @StopWhining491 2 ปีที่แล้ว +1

    Very clear explanation; thanks for somewhat demystifying PKI.

  • @Hybrid_Netowrks
    @Hybrid_Netowrks 8 หลายเดือนก่อน +3

    On timeline 4:40 to 4:47 the guy is wrongly interpreting the usecase. The client actually generates a session key / Sym key and encrypt it with the public key of the peer end and then the peer end decrypt it with it's private key to acquire the session key/Sym key. Additionally, the peer generates a session key/Sym key and encrypt it with the session/Sym key that it just decrypted and send that key to the other side. Now, what happens is that one side use its own Session/Sym key for decryption and the other side key for encryption.

    • @nishantdalvi9470
      @nishantdalvi9470 7 หลายเดือนก่อน

      Hey i even noted one more thing i.e. It is been said in that video that any one key can be arbitrarily chosen as a public key but i was under the impression that once the key pairs are generated they are specifically private and public because of the derivation of one key from the another i.e. We can't derive the private via the help of public key if we possess it but we can derive public key with the help of private key which distinguishes these key from each other and we can't randomly select any one key as the public from the available pair but yes both can use for encryption as well as decryption at the same time

  • @rsssl
    @rsssl 9 หลายเดือนก่อน

    This conversational style is more educative than monologues.

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน

      So glad you liked it!

  • @lynnette2263
    @lynnette2263 2 ปีที่แล้ว +1

    Thank you!! I’m learning this in class right now!

  • @diavarezable
    @diavarezable 3 หลายเดือนก่อน

    That was the best explanation of pki that I have come across so far. Thank you for that! I'm an interested lay person and would like to advance my knowledge in that topic. Would you have any recommendations for topics and/or titles I could read? Thanks!

  • @ianjonas7380
    @ianjonas7380 9 วันที่ผ่านมา

    What an amazingly clear and uaeful video. Thanks so much

  • @AnujTechShorts
    @AnujTechShorts 2 ปีที่แล้ว +1

    the best explanation , and the conversation is relatable

  • @techlearner4806
    @techlearner4806 3 หลายเดือนก่อน

    When technology was evolving in the world, IBM was giant in technology.

  • @dkRiseUp
    @dkRiseUp ปีที่แล้ว

    Thank you for that vivid explanation

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน

      You’re welcome!

  • @ikebipe
    @ikebipe 7 หลายเดือนก่อน

    Are there any courses by him, this is freaking awesome. So clearly explained.

  • @GeorginaWandell
    @GeorginaWandell 11 วันที่ผ่านมา

    Thanks for sharing such valuable information! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

  • @arthur_pendragon
    @arthur_pendragon ปีที่แล้ว +1

    This really cool, concise and great talk

  • @AlbertLeng
    @AlbertLeng 2 ปีที่แล้ว +2

    I like how you use interaction between novice and expert to make it more fun and understable

  • @zoul-karneinekabore8449
    @zoul-karneinekabore8449 5 หลายเดือนก่อน +1

    That was a very clear explaination .

  • @zamilmastaliyev6967
    @zamilmastaliyev6967 ปีที่แล้ว +1

    We want tmore content like this :)

  • @Cyber_Jagat
    @Cyber_Jagat ปีที่แล้ว +1

    Awesome explanation. Understandable

  • @rahulkushwaha04
    @rahulkushwaha04 6 หลายเดือนก่อน

    Now its getting clear. Thankyou very much

  • @BOOSTEDDUDE
    @BOOSTEDDUDE 7 หลายเดือนก่อน

    Great explanation. Thanks. I'm really interested in cryptography and certificates and learning a lot of valuable information.

  • @egyrapper
    @egyrapper 2 ปีที่แล้ว +1

    Excellent explanation

  • @SlitheringDemon
    @SlitheringDemon 5 หลายเดือนก่อน

    EXCELLENT! LOVED THIS EXPLANATION

  • @lserranov
    @lserranov 10 วันที่ผ่านมา

    This is pretty good info, thanks for sharing!

  • @magneticalex9078
    @magneticalex9078 2 ปีที่แล้ว +1

    Guys this is awesome!

  • @i_am_dumb1070
    @i_am_dumb1070 ปีที่แล้ว +1

    Very informative thankyou 👍 😊

  • @michaelmorrison3614
    @michaelmorrison3614 2 ปีที่แล้ว +1

    Wow....this is amazing content!! Well done! Thank you

  • @mahankrishnan3046
    @mahankrishnan3046 2 ปีที่แล้ว +1

    Very Well explained. Thanks a lot.

  • @xkorbekx
    @xkorbekx 9 หลายเดือนก่อน

    my understanding: so a digital signature can only be created by encrypting the hash with pvt key? its a way of affirming that this is last known hash for a message/file. encryption during the digital signature process has nothing to do with protecting a secret. since the key pair is mathematically related , the only pub key that can used to decrypt the hash is the pub key related to the pvt key that encypted it, thereby verifying integrity of sender and hash.

    • @nishantdalvi9470
      @nishantdalvi9470 7 หลายเดือนก่อน

      Hey in this video it is been said that any one key can be arbitrarily chosen as a public key but i was under the impression that once the key pairs are generated they are specifically private and public because of the derivation of one key from the another i.e. We can't derive the private via the help of public key if we possess it but we can derive public key with the help of private key which distinguishes these key from each other and we can't randomly select any one key as the public from the available pair

  • @ron46135
    @ron46135 2 ปีที่แล้ว +1

    Great video, look forward to more of these

  • @Arpan_Vala
    @Arpan_Vala ปีที่แล้ว +1

    Thank you

  • @akashagarwal6390
    @akashagarwal6390 10 หลายเดือนก่อน

    this is really good

  • @Sulmanification
    @Sulmanification 2 ปีที่แล้ว +1

    Very very good, thanks.

  • @kennethcarvalho3684
    @kennethcarvalho3684 ปีที่แล้ว +2

    Wish I could understand things as quickly as the guy with glasses

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      I do too! He’s a sharp guy, for sure!

    • @edwarddonatus5888
      @edwarddonatus5888 8 หลายเดือนก่อน

      If you are a Web developer it's sure you must understand faster because this is included in the day to day life of website developers.🎉

  • @veraaesthetics
    @veraaesthetics ปีที่แล้ว +1

    I'm learning PKI for the first time and I'm having trouble with the explanation about encrypting the symmetric key using the private key and then having the recipient decrypt it using the sender's public key. Since the public key is public, can't an unintended recipient intercept the symmetric key and now decrypt it. I though we should always be encrypting with the public key and decrypting with the non-shared key (private) to prevent this problem...

    • @homebarista
      @homebarista ปีที่แล้ว +1

      First of all, be sure to read the pinned comment above as I misstated public/private in the video. That may be the source of your confusion. Sorry about that! But to clarify, there's two issues at play here: (1) How do you know the message you received is actually from who you think it is? (2) How do you establish secure communication with someone?
      For (1), you as the receiver of a message from SND know that *must* have originated from SND if you're able to decrypt it with SND's public key, because only SND has their [private] key that was used to encrypt it.
      Let's say for (2), SND wants to establish a secure connection with RCV. To start, SND creates a unique SND-to-RCV session ID "ZZZ" and wants to send it to RCV. So, SND uses RCV's public key to encrypt the session ID ZZZ, encrypts that with their own (SND's) private key, then sends the "package" to RCV. It's true that someone *could* intercept that package and use SND's public key to decrypt it, but all that would get them was RCV's (encrypted) session ID, which is worthless to the interceptor. On the other hand, RCV can decrypt the package using SND's public key *and* they can also decrypt the message to retrieve the session ID using their private key since SND used RCV's public key to encrypt it. Once this is complete, both SND and RCV share a session ID that nobody else knows; that can be used to establish a secure connection with both parties knowing the other end is who they claim to be.
      Another easier way to think of it is a message encrypted with a public key can only be decrypted with the associated private key. Thus you can use this asymmetry to prove that a message did in fact originate with the owner of the public/private key, because any tampering along the way would render the message gibberish when decrypted.
      Did I get it right, @jeffcrume?

  • @jantoth4699
    @jantoth4699 2 ปีที่แล้ว +2

    Great video! Can you also do some video on a real world scenario and elaborate on private/public keys with let's say self signed certificate using your own CA by using openssl for example ? Thx

    • @homebarista
      @homebarista 2 ปีที่แล้ว

      I haven't implemented my own CA, but a quick search "how to create certificate authority openssl" yielded step-by-step tutorials. For those following along, this is different than just creating a self-signed certificate (no CA) that you might do for testing. Most browsers will refuse to connect to a site using one, unless you specify a command line/configuration setting to disable it.

  • @leonnetto9725
    @leonnetto9725 ปีที่แล้ว +1

    8:30 I'm pretty sure you're not decrypting the Digital Signature with the public key, or at all for that matter. It's just there for verification purposes.

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      In order to verify, you do need to decrypt the dig sig so that you can compare the hash value from the sender (encrypted with their private key) and compare it to your calculated value using the same hashing algorithm

    • @leonnetto9725
      @leonnetto9725 ปีที่แล้ว

      @@jeffcrume thanks Jeff. I looked it up after I commented and you're right. Probably should have deleted my comment lol.

  • @joistaus
    @joistaus 2 ปีที่แล้ว +1

    Thank you for this awesome explanation

    • @IBMTechnology
      @IBMTechnology  2 ปีที่แล้ว +1

      Thanks! If you'd like to see other topics on Tech Talk, let us know!

  • @dollarblitz
    @dollarblitz 10 หลายเดือนก่อน

    Great video, is it relevant to ask where SSL certificates come into play within this context?

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน

      Yes, SSL (now TLS) encryption is based on these concepts as well

  • @MohsenJebelli145
    @MohsenJebelli145 9 หลายเดือนก่อน

    fantastic job !

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน

      Thanks!

  • @deankinyua2365
    @deankinyua2365 27 วันที่ผ่านมา

    i love these 2 men♥

  • @jorge-hernandez-ramirez
    @jorge-hernandez-ramirez 2 ปีที่แล้ว +1

    Thanks guys!!! great job!!

  • @mayureshbadgujar8312
    @mayureshbadgujar8312 2 ปีที่แล้ว +1

    Really helpful

  • @HirokoBijan
    @HirokoBijan 2 หลายเดือนก่อน

    Great video as always! 👍 I’ve got a question: 🤨 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). Not sure how to use them, would appreciate help. 🙏

  • @JanixBorja8888
    @JanixBorja8888 13 วันที่ผ่านมา

    Correction on 4:50 decrypt it with your private key.

  • @AngryFox9
    @AngryFox9 2 ปีที่แล้ว +1

    What if i’d like to build a portal that is secured with multiple access levels on a private server?

  • @awaneendra
    @awaneendra 2 ปีที่แล้ว +1

    Amazing stuff. Thanks!

  • @ХайёмОдинаев-я7я
    @ХайёмОдинаев-я7я ปีที่แล้ว +1

    In GPG you can create multiple public keys for encrypting, signing and sth else based on ONE private key. If so why do you say in video, that both can be used as for en/decrypt the other. And there can be only two of them?

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      I was giving a single, theoretical example. You’re referring to a very legitimate practical example which implements the same concepts as multiple instances. “In theory, there is difference between theory and practice. In practice, there is.” 😊

  • @babthooka
    @babthooka 9 หลายเดือนก่อน +1

    Wow guys! You're BOTH left handed - what are the odds!!

    • @Cooliofamily
      @Cooliofamily 7 หลายเดือนก่อน

      And they’re writing backwards!!

  • @random-characters4162
    @random-characters4162 ปีที่แล้ว

    the line at 8:26 confuses me a bit. Because CA uses his Private Key. But the line goes from the user's Private Key

    • @IBMTechnology
      @IBMTechnology  ปีที่แล้ว

      See the pinned comment above for a discussion of the correction.

  • @fidelpalma6629
    @fidelpalma6629 2 ปีที่แล้ว +1

    This is awesome. Like, suscribe, click on the bell and whatever else you want. I'm going to watch more of your videos.

  • @m4heshd
    @m4heshd ปีที่แล้ว +1

    The guy with the glasses listened very carefully and still got things wrong. The other guy just went with it.

    • @homebarista
      @homebarista ปีที่แล้ว +1

      This is the guy with glasses. When I speak spontaneously, I sometimes make verbal mistakes like this. Sorry! I realized it was incorrect in the playback, but decided to leave it as-is. It took a few days for a viewer to correct me. 😉Another viewer pointed out a misstatement (?) by Jeff w.r.t. asymmetric keys. See the pinned comment for the viewers calling out these misstatements and our corrections.

    • @m4heshd
      @m4heshd ปีที่แล้ว

      @@homebarista I understand. I'm sorry for leaving a rude comment. It took a response from you to realize my own bitterness.

  • @TamilonlineS-vh7bo
    @TamilonlineS-vh7bo 8 หลายเดือนก่อน

    Thanks for sharing

  • @nikoruhe54
    @nikoruhe54 2 ปีที่แล้ว +1

    Does IBM offer any type of managed PKI products?

    • @IBMTechnology
      @IBMTechnology  2 ปีที่แล้ว

      No. However, IBM does have tools that do encryption and use PKI (Guardium Data Encryption plus all the PKI that is baked into our products and OSs).

    • @jeffcrume
      @jeffcrume 2 ปีที่แล้ว

      IBM offers crypto capabilities of this sort on the mainframe as part of the security services in the OS. Also, crypto accelerator cards from IBM help speed up operation and keep keys secure

  • @abinthomas6390
    @abinthomas6390 9 หลายเดือนก่อน

    The second guy got caught in the weeds of asymmetric vs symmetric keys. Those are two completely different systems. No one uses symmetric keys anymore because RSA became popularized by Rivest, Shamir, and Aldman in their algorithm. RSA broadcasts the public keys and a message can be encoded so the private key can decode the message. The private key is not broadcasted. But anyone can send a message using the public keys to the server which can be decoded by the private key.

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน +2

      Every time you login to a secure web site, you use symmetric encryption as well as asymmetric

  • @Asudragon
    @Asudragon 14 วันที่ผ่านมา

    But where does the RA come to play? i thought you sent info to the RA, they then confirm your details and then tell the CA to create and issue the certificate

  • @WartimeFriction
    @WartimeFriction 2 ปีที่แล้ว +1

    Great video, really helped reinforce some concepts as I look to get certified and into the industry. Thanks!

  • @cur1ousss2047
    @cur1ousss2047 2 ปีที่แล้ว +1

    thanks a ton for content

  • @alonbegin8044
    @alonbegin8044 2 ปีที่แล้ว

    a qustion more basic that I didn't felt answered..what problem this security answered to the end user?
    I felt like an example (or story) of daily use with secure key and the one without that can finalize my understanding on the topic

    • @homebarista
      @homebarista 2 ปีที่แล้ว +2

      Here's a simple end user example: Programs like email and browsers use encryption in order to ensure that communications cannot be read by anyone other than the intended party. Symmetric cryptography is how we secure the message and asymmetric crytography/PKI is how we exchange the symmetric keys so that the only the intended parties can read the messages [thanks to Jeff Crume for improving on my initial answer].

  • @edwarddonatus5888
    @edwarddonatus5888 8 หลายเดือนก่อน

    As a web developer you will understand faster the explanation of PKI.

    • @nishantdalvi9470
      @nishantdalvi9470 7 หลายเดือนก่อน

      Hey in this video it is been said that any one key can be arbitrarily chosen as a public key but i was under the impression that once the key pairs are generated they are specifically private and public because of the derivation of one key from the another i.e. We can't derive the private via the help of public key if we possess it but we can derive public key with the help of private key which distinguishes these key from each other and we can't randomly select any one key as the public from the available pair but yes both can use for encryption as well as decryption at the same time

  • @marspark6351
    @marspark6351 ปีที่แล้ว +1

    I understand the certificate can be trusted because it was issued by the CA. But how does the CA evaluate that the public key is legit in the first place to create the certificate? Aren't we back to the initial question of "how do we know that the public key is trustworthy?"

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      The CA is responsible to issue the certs (and sign them with its private key). The public keys for trusted, well known CAs are hardcoded into browsers and other software so that they can verify that certificates are authentic and have been signed by a trusted third party

  • @kwreck0022
    @kwreck0022 2 ปีที่แล้ว +1

    Nice!!!!!!

  • @xiaofei5556
    @xiaofei5556 2 ปีที่แล้ว

    It seems not right at the last step, isn't it? The final signature should be signed by CA private key instead of any end users', right?

    • @moitanka947
      @moitanka947 2 ปีที่แล้ว

      That is correct.

  • @bolajikasim3805
    @bolajikasim3805 3 วันที่ผ่านมา

    the first guy need to allow the main guy to explain

  • @TheMaxKids
    @TheMaxKids 2 ปีที่แล้ว

    What are you writing on??? That looks 👍

    • @homebarista
      @homebarista 2 ปีที่แล้ว +1

      We're writing on a glass pane that is directly in front of us. Since we're on the other side of the glass, the writing is backwards from the viewpoint of the camera, so we flip the image in post-production. That's why it appears that I'm left-handed when in fact I'm right-handed.

    • @TheMaxKids
      @TheMaxKids 2 ปีที่แล้ว

      @@homebarista thanks, mate!

  • @WandaChandler-b7q
    @WandaChandler-b7q หลายเดือนก่อน

    Efrain Throughway

  • @FourthRoot
    @FourthRoot 5 หลายเดือนก่อน

    You wouldn't want to encrypt your symmetric key with your private key and then send it out. Then, anyone with the public key code decrypt it and obtain your symmetric key. Instead, you would request your contact to use their public key to encrypt a symmetric key and send that to you.

    • @herdenq
      @herdenq 5 หลายเดือนก่อน

      Not quite :)
      You want to encrypt the symmetric key with the public key of the entity you are communicating with, so that they can decrypt with their private key

    • @herdenq
      @herdenq 5 หลายเดือนก่อน

      Or, your contact would encrypt the symmetric key with your public key, so that you can decrypt with your private

    • @herdenq
      @herdenq 5 หลายเดือนก่อน

      That's TLS 1.2, though. 1.3 never sends the symmetric key over a network.

  • @ogulcankaya945
    @ogulcankaya945 6 วันที่ผ่านมา

    Every day that goes by, Bitcoin proves its worth. 🌐

  • @danielgx83
    @danielgx83 ปีที่แล้ว

    my problem with IBM explanations is that they never really gives examples from AD on prem environment in windows server or ubuntu server, they will just give you the theory behind it , i would eve dare to say its a metaphor because nobody can really see how it is done in AD CA Environment in enterprise levels .
    they only give you the concept because they themself never actually done that.

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน +1

      My goal with the video was to cover the concepts that would be applicable across all platforms. Vendor-specific implementations may be better explained by those vendors

  • @ButlerAbigail
    @ButlerAbigail 2 หลายเดือนก่อน

    762 Ibrahim Common

  • @JoseMartin-n7b
    @JoseMartin-n7b 2 หลายเดือนก่อน

    Justus Fork

  • @LeroyTosoisie
    @LeroyTosoisie หลายเดือนก่อน

    17409 Aidan Forges

  • @CarolYoung-k3u
    @CarolYoung-k3u หลายเดือนก่อน

    0972 Beer Terrace

  • @Reem.alhamimi
    @Reem.alhamimi หลายเดือนก่อน

    WOWWWWWWWWWWWW

  • @milindrepote2268
    @milindrepote2268 หลายเดือนก่อน

    i would never encrypt the symmetric key with private asymmetric key but with my recipient's public asymmetric key so that only he can decrypt it using his private asymmetric key and no one else . In this video it is said the other way round using his own private key to encrypt the symmetric key but then anyone can use his public key to decrypt that and get the symmetric key .

  • @TerryAdelaide
    @TerryAdelaide 2 หลายเดือนก่อน

    1424 Leonel Ports

  • @MooreMorgan-h7l
    @MooreMorgan-h7l 2 หลายเดือนก่อน

    937 O'Conner Tunnel

  • @BowmanDeQuincey-b1i
    @BowmanDeQuincey-b1i 2 หลายเดือนก่อน

    Murray Burgs

  • @LynchTracy-u5q
    @LynchTracy-u5q 2 หลายเดือนก่อน

    Magdalen Ports

  • @WhittierElliot-f3b
    @WhittierElliot-f3b หลายเดือนก่อน

    Rodriguez Amy Lewis Larry Thompson Larry

  • @SamRodney-e2b
    @SamRodney-e2b 2 หลายเดือนก่อน

    Newell Summit