Around 5:20, you say that You request Alice's certificate from CA. This is incorrect. In SSL/TLS, You never ask Alice's certificate from CA. During the handshake, Alice sends her certificate to You and You verify Alice's certificate from the CA's Root Certificate.
+Subash Manikandan Mr., that is true for SSL (a particular implementation of a PKI concept), but could it be that she is just giving a general definition of the PKI concept? Am i wrong? Cheers.
+decasT , yes I guess she was giving general information about PKI. the point of Lucas is correct and is great to keep that in mind, since some other users that are just starting on the PKI world may get confuse. However it is a great video to understand PKI basics, we are all human looking for perfection but we make mistakes.
Excellent explanation. Have to understand the fundamental concept of the Asymmetric key exchange. Maybe some people get it without exploration, but even so, it helps to understand everything with the CA and RA roles.
Still a question, that means there is some relation between public and private key. Else a msg encrypted with public key cant be decrypted with private key.
you created your own private key to use to decrypt messages that other ppl are sending to you. these messages they sent to you were encrypted with your public key on their computer before they sent them.
One of the BEST video at explaining a subject! very clear, precise/detailed, visual presentation 100%. SIMPLY AMAZING!
The best video explaining PKI! Thank you!
Great video, felt like someone glued the understanding of PKI. I can explain it even in my sleep. Thank you
Thank you... First time i got clear picture on PKI by this video
Great video, informative, and you have a perfect voice for instruction.
Very helpful and more informative thanks for sharing the video
Around 5:20, you say that You request Alice's certificate from CA. This is incorrect. In SSL/TLS, You never ask Alice's certificate from CA. During the handshake, Alice sends her certificate to You and You verify Alice's certificate from the CA's Root Certificate.
You are correct!
+Subash Manikandan Mr., that is true for SSL (a particular implementation of a PKI concept), but could it be that she is just giving a general definition of the PKI concept? Am i wrong? Cheers.
+decasT , yes I guess she was giving general information about PKI. the point of Lucas is correct and is great to keep that in mind, since some other users that are just starting on the PKI world may get confuse. However it is a great video to understand PKI basics, we are all human looking for perfection but we make mistakes.
She says this. If you watch the video again at 5:07
A bit of a moot point really.
During SSL, you initiate the handshake so technically it is you who is asking and Alice is sending.
Excellent explanation. Have to understand the fundamental concept of the Asymmetric key exchange. Maybe some people get it without exploration, but even so, it helps to understand everything with the CA and RA roles.
The way she says Beautiful isn't it while highlighting the hexadecimal bits. I just fell in love.
Very nice video tutorial, explained in really simple words. Thanks
Thank you. You explained some of the material better than Cisco net academy
Top notch presentation. Thank you.
Hats Off !! Explanation is top notch!!!
great video. Very clear explanation about PKI. Thankyou
Excellent video!
thank you for this amazing, Excellent presentation
this video is nice...
Contains all the important information and concept :D
Used it to repeat the stuff I learned for class
Very nice video, in a brief and precise manner, thanks for uploading, you made my day!!
Great video. Concepts were very well explained
Very well explained. Thanks for the video and sharing it.
She is Great! Thanks make a lot sense now!
Thank you, this really help me!
great video
Nicely explained and nice voice
Very nicely explained...thanks.
At 8:42, why would expired certs be on the CRL?
Great job explained concepts. Would love to see some real world examples at ta terminal of how to go about each of these concepts.
BEST TEACHER EVER!
Ok
Nice video. It really helped me a lot.
Great Video..Thanks a lot.
very well explained....
RadwanoVetch Great video well done thanks for posting my classmates at College got a lot of help out of it
Real nice one.
just got it correctly ..thank you so much
nicest part about this video is her VOICE :)
Where are the other videos? Thanks for posting this one. It was a big help.
app.pluralsight.com/author/lisa-szpunar
Great video
Nice easy explanation
Still a question, that means there is some relation between public and private key. Else a msg encrypted with public key cant be decrypted with private key.
Hell yeah makes sense now thanks!
Thanks a lot Mam so much !!!
Thank you for your sharing :)
Is PKI compatible with HAProxy?
love this.think you.
How is it decided that which CA to contact ? On what basis ?
If I created both the public key, and the private key; then how is it that only Alice has the private key?
you created your own private key to use to decrypt messages that other ppl are sending to you. these messages they sent to you were encrypted with your public key on their computer before they sent them.
thank you .....
can you send this ppt actually, I have an presentation in this week about public key infrastructure.
Thanks
thanks
that awkward moment that no one noticed 5:50