You can't do security without THIS
Every secure communication protocol will at some point require some sort of Key Exchange. In this video we discuss the concept of a Key Exchange, and illustrate the problem that a Key Exchange is trying to solve. We then explain simply how that problem is solved. Finally, we introduce the two algorithms that can be used to do the actual math of a Key Exchange: RSA and DH. Which will each be covered in the next couple of lessons. // CHAPTERS 0:00 - Intro 0:20 - The Key Exchange Problem 1:17 - The solution 1:34 - What is a Shared Secret? 2:52 - Shared Secret vs Secret Key 3:21 - Two Key Exchange Algorithms: RSA & DH // FULL SERIES - Cryptography Essentials // This video is part of a 16-part series covering the essentials of modern Cryptography. Explained simply, and technically accurate. The full series is available here: 📋 https://www.youtube.com/playlist?list=PLIFyRwBY_4bQvq5PuJASilkHSVGLZtceZ ( or use the shortcut pracnet.net/ce ) 00 Series Introduction 01 Hashing 02 Keys / Secret Keys 03 Symmetric Cryptography 04 Encryption 05 MAC / HMAC 06 Pseudo Random Function 07 Asymmetric Cryptography 08 Asymmetric Encryption (RSA) 09 Signatures 10 RSA Signatures 11 DSA Signatures 12 Key Exchanges 13 RSA Key Exchanges 14 DH Key Exchanges 15 Elliptic Curve Cryptography // ADDITIONAL RESOURCES // Pseudo Random Function: Symmetric Encryption: Data Integrity / MAC and HMACs: // SUPPORT PRACTICAL NETWORKING // If this content benefited you, then here are TOTALLY FREE ways to show your appreciation: - 👍 Like to help this video reach more viewers - 💬 Comment to boost the channel's visibility - 🔔 Subscribe to help me attract sponsors (this is the number they care about)
Download
0 formatsNo download links available.