Главная
Study mode:
on
1
- Introduction
2
- Everything is encrypted!
3
- Why encrypt?
4
- Browser "secure"
5
- Cipher information of a connection
6
- Pack capture and TCP handshake
7
- HTTP, TLS and HTTPS
8
- Cheesecake Factory and TLS 1.2
9
- Types of encryption - Symmetric
10
- Enter Modulus
11
- Asymmetric encryption
12
- TLS handshake - Client Hello
13
- Server Hello
14
- Certificate
15
- Server Key Exchange
16
- Server Hello Done
17
- Client Key Exchange, Change Cipher Spec and Encrypted Handshake
18
- Server Change Cipher Spec and Encrypted Handshake
19
- TLS Record Protocol to send data
20
- How to share a secret
21
- Why not just use RSA?
22
- Diffie-Hellman with colors
23
- Diffie-Hellman with math
24
- Diffie-Hellman with elliptic curves
25
- Adding g to itself on a curve
26
- Curves in a finite field
27
- Named curves
28
- How its used
29
- Pre-master secret to master secret
30
- Shawn the terrible person
31
- ECDHE WITH RSA
32
- Using two very big prime numbers
33
- Using RSA and a test
34
- Hash with SHA
35
- WE HAVE A SHARED SECRET
36
- Advanced Encryption Standard
37
- Key scheduler to round keys
38
- A round
39
- Multiple rounds and final output
40
- AES ECB problem
41
- Cipher Block Chaining
42
- Counter mode
43
- Shawn and Tim still a problem
44
- Galois Counter Mode to save us
45
- And done!
46
- TLS 1.3 differences
47
- Summary and close
48
Meant to write KPub not KPriv lol
Description:
Dive deep into the world of encryption with this comprehensive 2-hour 38-minute video tutorial. Explore the fundamentals of encryption, including symmetric and asymmetric encryption methods, TLS handshake processes, and advanced concepts like Diffie-Hellman key exchange and elliptic curve cryptography. Learn about the inner workings of encryption algorithms such as RSA, AES, and SHA. Understand the importance of secure communication protocols, cipher block modes, and the evolution from TLS 1.2 to TLS 1.3. Gain practical insights into how encryption is applied in everyday internet browsing and secure data transmission. Perfect for cybersecurity enthusiasts, IT professionals, and anyone interested in understanding the technical aspects of data protection and secure communication.

How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques

John Savill's Technical Training
Add to list
0:00 / 0:00