7 Cryptography Concepts EVERY Developer Should Know

preview_player
Показать описание

🔗 Resources

📚 Chapters

00:00 What is Cryptography
00:52 Brief History of Cryptography
01:41 1. Hash
04:07 2. Salt
05:47 3. HMAC
06:35 4. Symmetric Encryption.
08:19 5. Keypairs
09:29 6. Asymmetric Encryption
10:22 7. Signing
11:31 Hacking Challenge

🔥 Get More Content - Upgrade to PRO

Use code lORhwXd2 for 25% off your first payment.

🎨 My Editor Settings

- Atom One Dark
- vscode-icons
- Fira Code Font

🔖 Topics Covered

- Cryptography for Developers Basics
- Crypto algorithms: SHA, MD5, argon2, scrypt
- How password salt works
- Encryption vs Signing
- Difference between Asymmetric vs Symmetric Encryption
- How hacking works and hacks are prevented
Рекомендации по теме
Комментарии
Автор

I really appreciate that you came back on your past mistake of using md5

prowhiskey
Автор

9:44 Actually, HTTPS uses asymmetric encryption to establish the identity of the parties and to exchange a symmetric key. Then symmetric encryption is used since it's faster

alessiocosenza
Автор

How to create a great YouTube channel?

Step 1: automatically know what the viewers want in the next video
Step 2: squeeze the complex content in shortest possible duration
Step 3: throw in some smooth humour without changing the tone
Step 4: throw in some cool animations
Step 5: use dark background

💯% perfection!

MrSamkots
Автор

So whose password are we collectively brute-forcing for you in the challenge? :D

hannes-
Автор

Once you deep dive into cryptography you find that, even the strongest encryption algorithm in the world is weak if the user input is weak. The best course of action is to have an input that does not come from the user (I mean a generated password like a sha-512 hash). Ideally that entry is stored on the client device.

DenisTRUFFAUT
Автор

Jeff wants to crack his girlfriend's password and put it as a challenge on his youtube channel. Well played bro!

danvilela
Автор

10 hours of this topic at uni and I understood things about 80% of the way. I'm confident that if I watched this I would've been at 100% in 12 minutes.

GalacticApple
Автор

@02:08 you said that the hash is unique, given that the result has a fixed length you can't map infinite strings to a fixed length string without loosing unicity

brucewayne
Автор

I’m currently taking intro to security and this is exactly what we are learning. Thank you for explaining it so succinctly and with amazing visuals and code

bytesizedfeed
Автор

Another important feature of hash algos is that similar inputs yield very different outputs, that way, you cannot guess that your getting close.

orzhovthief
Автор

I think this the first YouTube video where I actually set playback time to value lower than 1

artemabovian
Автор

Awesome sum up of crypto concepts for developers in under 12 minutes, really to the point, impressive

rahesc
Автор

@ around 02:12 argon2 is listed as a hashing algorithm. It's more accurate to refer to it as PBKDF (Password Based Key Derivation Function), especially since you stated that hashing algorithms need to be fast to compute. Argon2 doesn't fit that description. It's acceptably fast to compute (It's orders of magnitude slower than say sha256) and that's by design, so that it becomes unfeasible to brute force them. It's also designed to account for increases in computational power over the years as you can make it harder to compute by increasing the amount of memory used to generate the derivative.

tranquility
Автор

Thanks for making theses videos. You're creating a mind map for developers to get a grasp of the vast technology landscape - props to you, your content is truly unique and high quality too.

tutorjonas
Автор

The quality of this video is literally perfect...

abhyan
Автор

I really love every single video you post, they're so useful but this one... Wow!
Thanks for sharing your knowledge 🤙🏼

johncardozo
Автор

Great start. I'd also add that the Public/Private Certificate is actually used to negotiate a random symmetric key which is used once the channel is opened. Why? Public/Private encryption is SLOW.

This would be a great segway into Diffie-Hellman key exchange.

baddrivers
Автор

It would be cool if you could create more videos like this to explain more every concept.. awesome work!

marcosandreslerin
Автор

Nice video, it covers a lot of really important topics in a easy to understand way

prowhiskey
Автор

You make hard concepts very easy. Thank you for the great contents.

ArpitKumarSuman