Back to Browse

You can't do security without THIS

8.2K views
Sep 30, 2024
4:09

Every secure communication protocol will at some point require some sort of Key Exchange. In this video we discuss the concept of a Key Exchange, and illustrate the problem that a Key Exchange is trying to solve. We then explain simply how that problem is solved. Finally, we introduce the two algorithms that can be used to do the actual math of a Key Exchange: RSA and DH. Which will each be covered in the next couple of lessons. // CHAPTERS 0:00 - Intro 0:20 - The Key Exchange Problem 1:17 - The solution 1:34 - What is a Shared Secret? 2:52 - Shared Secret vs Secret Key 3:21 - Two Key Exchange Algorithms: RSA & DH // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate. The full series is available here: 📋 https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ ( or use the shortcut pracnet.net/ce ) 00  Series Introduction 01  Hashing 02  Keys / Secret Keys 03  Symmetric Cryptography 04  Encryption 05  MAC / HMAC 06  Pseudo Random Function 07  Asymmetric Cryptography 08  Asymmetric Encryption (RSA) 09  Signatures 10  RSA Signatures 11  DSA Signatures 12  Key Exchanges 13  RSA Key Exchanges 14  DH Key Exchanges 15  Elliptic Curve Cryptography // ADDITIONAL RESOURCES // Pseudo Random Function: Symmetric Encryption: Data Integrity / MAC and HMACs: // SUPPORT PRACTICAL NETWORKING // If this content benefited you, then here are TOTALLY FREE ways to show your appreciation: - 👍 Like to help this video reach more viewers - 💬 Comment to boost the channel's visibility - 🔔 Subscribe to help me attract sponsors (this is the number they care about)

Download

0 formats

No download links available.

You can't do security without THIS | NatokHD