How Encryption Works

preview_player
Показать описание
Ever wondered how encryption really works? In this video I explore all the key types you might find!

Note corrections at end of Chapters!

🔎 Looking for content on a particular topic? Search the channel. If I have something it will be there!

▬▬▬▬▬▬ C H A P T E R S ⏰ ▬▬▬▬▬▬
0:00 - Introduction
1:12 - Everything is encrypted!
1:57 - Why encrypt?
4:06 - Browser "secure"
6:25 - Cipher information of a connection
9:30 - Pack capture and TCP handshake
10:52 - HTTP, TLS and HTTPS
12:55 - Cheesecake Factory and TLS 1.2
14:13 - Types of encryption - Symmetric
17:19 - Enter Modulus
21:45 - Asymmetric encryption
27:55 - TLS handshake - Client Hello
34:03 - Server Hello
38:39 - Certificate
46:30 - Server Key Exchange
48:48 - Server Hello Done
49:23 - Client Key Exchange, Change Cipher Spec and Encrypted Handshake
51:26 - Server Change Cipher Spec and Encrypted Handshake
52:36 - TLS Record Protocol to send data
55:16 - How to share a secret
56:05 - Why not just use RSA?
58:07 - Diffie-Hellman with colors
1:02:06 - Diffie-Hellman with math
1:09:55 - Diffie-Hellman with elliptic curves
1:15:10 - Adding g to itself on a curve
1:17:47 - Curves in a finite field
1:31:05 - Named curves
1:33:28 - How its used
1:38:15 - Pre-master secret to master secret
1:41:22 - Shawn the terrible person
1:42:00 - ECDHE WITH RSA
1:43:55 - Using two very big prime numbers
1:50:22 - Using RSA and a test
1:55:29 - Hash with SHA
2:03:24 - WE HAVE A SHARED SECRET
2:04:24 - Advanced Encryption Standard
2:06:10 - Key scheduler to round keys
2:06:55 - A round
2:12:10 - Multiple rounds and final output
2:14:29 - AES ECB problem
2:16:28 - Cipher Block Chaining
2:18:40 - Counter mode
2:23:29 - Shawn and Tim still a problem
2:24:30 - Galois Counter Mode to save us
2:30:05 - And done!
2:32:40 - TLS 1.3 differences
2:37:00 - Summary and close

Correction:
24:05 Meant to write KPub not KPriv lol

▬▬▬▬▬▬ K E Y L I N K S 🔗 ▬▬▬▬▬▬
► Whiteboard:

▬▬▬▬▬▬ Want to learn more? 🚀 ▬▬▬▬▬▬
📖 Recommended Learning Path for Azure
🥇 Certification Content Repository
📅 Weekly Azure Update
☁ Azure Master Class
⚙ DevOps Master Class
💻 PowerShell Master Class
🎓 Certification Cram Videos
🧠 Mentoring Content
❔ Questions? Maybe I answered it in my FAQ
👕 Cure Childhood Cancer Charity T-Shirt Channel Store

#johnsavillstechnicaltraining #onboardtoazure #security #encryption
Рекомендации по теме
Комментарии
Автор

Ready to learn all about encryption? Let's go! Please make sure to read the description for the chapters and key information about this video and others.

⚠ P L E A S E N O T E ⚠

🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.

Thanks for watching!
🤙

NTFAQGuy
Автор

Thank you sir! Loving the recent rounds of fundamental type explainers too! These core topics aren't going anywhere, so it's great to flush out the library. As always, keep up the great work!

steveng.
Автор

This is superb!! A whole 2 and a half hours on encryption alone, and just when it's relevant for me. John has outdone himself as always. Thanks for making such amazing content for free on youtube!

DreamingWithEyesWide
Автор

I got through it (admittedly a tough subject and a ton of interruptions) and feel like I understand it. Not sure I could explain it as well, but, helps out a lot. Thank you John for making it simpler for less technical folks.

butterflyc
Автор

I have been using encryption for many years and did not know few things until I watched this video - for sure the best ! Thanks heaps John!

HMSydney
Автор

Thanks to you, I remembered what a modular arithmetic is.

dinamik
Автор

My favourite line was "only when we combine our private parts does it work" :) Great work John as always

ashleymooreful
Автор

I hope you're doing great John, you deserve every bit of happiness!

gwaaz
Автор

Brilliant, this comes at the best possible time... just when I was deep-diving into securing SBCs and removing old ciphers and stuff.
Wonderful refresher for the experienced and wonderful explanation for the newcomers.
Muchas cracias!

Cromeman
Автор

Oooh... Late night entertainment 🤣🤣 Buckle in boys and girls... I will definitely be forwarding this on to my colleagues...

ZATennisFan
Автор

Excellent job! Very clear and informative. Really appreciate your dedication to making these sessions.

vincesmith
Автор

Ooh looking forward to watching and digesting this one!

demonsrising
Автор

Excellent! Thank you for your effort in making the YouTube learners encryption literate… will need to watch couple of times to absorb the content.

rdx
Автор

My favourite video by far and I haven't finished watching it yet! Thank you for all your efforts on this. I've been after a decent video explaining what goes on under the hood for ages.

davidbaker
Автор

Hi John, thank you very much for bringing such deep content of with so lengthy video. If you have adjustable time these kind of very important and lengthy content is so helpful for us.

KRICHAN_Technologies
Автор

This is great addition to the channel, its not only about Azure now this is great John thanks a lot we appreciate the effort you are making here! really

saif
Автор

fantastic and very useful video John, thank you so much for creating this content and making it available for free.

MaartenVanDamme
Автор

Hi John, so TLS uses symmetric encryption to exchange the actual data, but asymmetric encryption for the initial client and server communication to establish the secure session! Wow, I always thought TLS used asymmetric encryption on the data. Thanks so much for sharing this

philipho
Автор

dame that is a great video i have ever seen. so detailed

Rosepoision
Автор

John, at 24:05 when you talk about confidentiality, shouldn't it be using for encryption the public key instead of the private key?

IulianSandulache