Finally jo dundh raha tha mil gaya ... thanks bhai .... easily samjh gaya .
@vaibhavkumar3675 Жыл бұрын
Exactly. Reading few moments before exams
@zahramirza114610 ай бұрын
Exam in few hours. Dil jeet liya aapne. Hugeeee respect!
@vineetjadhav78752 жыл бұрын
His way of explaining the concept is damn!!!
@rajashajeelahmed31923 жыл бұрын
SSL have two methods of handshake this one is two way .. You explain it perfectly ..
@MohitkumaryadavECE--3 жыл бұрын
bohot hi jyada achi videos hai bhaiya... do video dekha hu dono ekdum ache se samjh aa gayi... kal agar pass hua toh sirf aapki wajah se hounga
@tanayjindal413010 ай бұрын
you are the best man . i have my exams after 5 hours .huge respect
@yashkulkarni69324 жыл бұрын
A Big Fan of yours.. Easy explanation ..Best Content .Simply amazing..Thank You Sir
@supriya99473 жыл бұрын
Suprb, Maine bahut video dekha hai is topic main, but aj full samaj aa gaya, Thanks
@prashantsharma37085 жыл бұрын
Thank you sir. Please add RSA and Elgamal Digital signature scheme, it would help us a lot.
@sapnashah49712 жыл бұрын
Very informative and very easy explanation .Your teaching skill is amazing.Thank you so much sir
@salmanzahoor22844 жыл бұрын
Explain the concept and reasoning, why we need Session and Connections, two different things in SSL (what purpose(s) solved by session and what purpose(s) addressed by connection)
@khareprateek194 жыл бұрын
Session is like a memory or you can say a cache so if you have a valid session id or cookie you can resume the communication between the client and server.
@RajivKumar-ee7xv3 жыл бұрын
Connection is as at layer 4 with TCP. Session is at SSL/application level.
@thoratvaibhav99265 жыл бұрын
Aapka video vake hi kamal ka hota hai... sir
@ashwinishewale74515 жыл бұрын
Thank u very much sir ji. . Learn ho nahi raha tha... Now all concepts are clear... 🙏
@atulrajpoot35933 жыл бұрын
👌👌👌 very informative lecture in easy way... thanks bro
@chatrughanprasad77784 жыл бұрын
Exceptional SSL Handshake!
@manishparmar44003 жыл бұрын
Kitana easyl shikhate.ho dil se love u
@Nirajkantisamal Жыл бұрын
Nice and clear . Thank you for this knowledge sharing
@jairathor58205 жыл бұрын
Bhot hard baba ,Maja aagaya itna ache see explain kiye ho ,Shandaar Jabardast Jindabad... Check point p videos banaeye baba plz
@CreaTeach984 жыл бұрын
Sir bahoot sara missing h , premaster secret key generated by client and by using the public key of server it's sent the data...phr se bna lo video
@RiteshMalakar-n8y4 ай бұрын
thanks bro..very easy to understand..
@rahulsakpal16184 жыл бұрын
Superb keep going it was clear explanation. Very good
@BhawaniSingh-jc7cw4 жыл бұрын
Like your way of explanation ...Thanks
@Keterkarker2 жыл бұрын
Thank you sir i was so stressed.
@shaziyasultana43733 жыл бұрын
It would have been more useful if it shown in real time...however nice explanation.
@sandeeppatil98923 жыл бұрын
Really nice explanation....Thanks Bhai
@Devisingh-wb9tw11 ай бұрын
thank you sir , you are great
@imshashwatmishra30774 жыл бұрын
Thank u sir for your amazing teaching methods👍🏻
@ranker99475 жыл бұрын
Sir please upload cloud computing lectures
@amritanath38565 жыл бұрын
Ty sir for making learning soo easy
@bhagyashrivispute17195 жыл бұрын
Please sir upload 6 unit video of ics
@anujacodkar89685 жыл бұрын
Thank you Sir!!😊😊
@dipankardey104411 ай бұрын
The server needs to authenticate itself providing the SSL certificate to the client, but client side pe koyi certificate install hota hai kya? When we're hitting any https website, generally the server sends the certificate to the client, it shows the certificate was issued to xyz org by abc authority. However I read somewhere the mutual exchange also can be done, in that case how does the client generates the SSL certificate for itself? Is this what is called self-signed?
@gauravchimanji69203 жыл бұрын
Great Video..!! But one question in phase 1 does client send the session ID? but how can client send the session ID?
@koneru063 жыл бұрын
why dont you just get the pcap file and check, you u people become silly
@gawasniraj4 жыл бұрын
Nice explanation. Thanks Sir. One small query, under phase 3 it is mentioned as client certificate who/what it is referring to? I mean who generate client certificate, does all system (client) have its own default certificate or we have to create and install on client. Thanks in advance
@umangverma36603 жыл бұрын
USINGX. 509
@RajivKumar-ee7xv3 жыл бұрын
It is optional (server to ask for client certificate and client to send it) and it is only used in 2 way SSL. This is generally used in corporate website on managed client devices like laptop, Android phone, IPAD etc, where company's PKI issues certificates to clients and then they use it to connect to some SSL application which is available only for those users with client certificates. In general internet browsing, like google, yahoo, Facebook etc. client certificate is not used.
@gawasniraj3 жыл бұрын
@@RajivKumar-ee7xv Thanks 🙏🙏👍😊🇮🇳
@sibgatulhassan809911 ай бұрын
client cert is not necessary
@chinmayiathavale13154 жыл бұрын
aap PGP pe bhi ek video bana sakate hai kya
@naveedahmadbani69104 жыл бұрын
brother ur mixing cipher suite and compression method
@manishparmar44003 жыл бұрын
Bhai tum.bahot ache ho
@kshitijdhanvijay65175 жыл бұрын
Thank you. Please add pretty good privacy(PGP) video.
@sudhirpatil62405 жыл бұрын
Lecture kele aste na college la 😂😂
@bikashbehera2514 жыл бұрын
u r the BEST
@viinodgehlot826011 ай бұрын
Where is Symmetric and asymmetric key.. CA validation
@gauravchimanji69203 жыл бұрын
In Phase 3 how client send certificate ? Client Doesn't have certificate of its own
@ravishekhar14284 жыл бұрын
I am unable to get session_id in the first step. Because after a successful authentication server actually provides session-id to the client. please explain
@rajannw2 жыл бұрын
change cipher spec matlab??
@ajayvasava6004 Жыл бұрын
hello sir, my question is when the client sends data to the server for the first time how can the client encrypt that data because the client can't send plaintext to the server and in the first time client doesn't have the server's public key to encrypt that data from plaintext to ciphertext, so how can client encrypt data in first transmission ???
@PareeksAcademy10october2001 Жыл бұрын
Here we use deffi helman key exchange method. Please read it🙂
@shivit96805 жыл бұрын
Sir diffie Hellman explain with example.....plzzz exam h
@chiragshilwant8865 жыл бұрын
Ek no video
@zohaibtariq-software-engineer4 жыл бұрын
Plz show practical in php
@dhanunjay35105 жыл бұрын
Clear picture of SSL Hand shake
@aidataverse2 жыл бұрын
Very good
@imashish864 жыл бұрын
Fantastic!!!
@sidducs5 жыл бұрын
Jabardast
@niveditamisra6492 Жыл бұрын
Tls handshake bataiye
@patilabhijit0074 жыл бұрын
Not exactly correct. Kindly read the exact protocol
@shonulis29465 жыл бұрын
Ty sir kal hamara security ka exam h ...
@haridasgupta18145 жыл бұрын
Same here bro ,from csjm University
@shonulis29465 жыл бұрын
@@haridasgupta1814 bro ..heheh ..I'm girl ...ohk ..all the best
@sudhirpatil62405 жыл бұрын
Mera bhi hai kal exam ...Jai SPPU
@unlimitedshorts89907 ай бұрын
Sir without beard apa acche dikhate ho young 😢
@GildwareTechnologies Жыл бұрын
The SSL Handshake Protocol is a crucial part of establishing a secure connection between a client and a server using the SSL/TLS cryptographic protocols. It ensures that both parties can securely exchange encryption keys, verify each other's identity through digital certificates, and establish a secure communication channel. Let's delve into the details of the SSL Handshake Protocol: SSL Handshake Protocol Process: Client Hello: The SSL Handshake begins with the client (such as a web browser) sending a "Client Hello" message to the server. This message includes the client's supported SSL/TLS versions, a random number (Client Random), and a list of supported cryptographic algorithms. Server Hello: Upon receiving the "Client Hello," the server responds with a "Server Hello" message. In this message, the server selects the highest supported SSL/TLS version and cryptographic algorithm from the client's list. It also generates its random number (Server Random) and sends its digital certificate, which includes the server's public key. Certificate Validation: The client verifies the server's digital certificate to ensure the authenticity of the server's identity. It checks if the certificate is valid, has not expired, and is issued by a trusted Certificate Authority (CA). Key Exchange: After the certificate validation, the client generates a pre-master secret and encrypts it with the server's public key from the digital certificate. This encrypted pre-master secret is sent back to the server. Key Derivation: Both the client and the server now use their random numbers (Client Random and Server Random) and the pre-master secret to independently derive the master secret, which will be used to generate session keys for encryption and decryption. Session Keys: The client and server generate the session keys based on the master secret and the negotiated cryptographic algorithm. These session keys are used to encrypt and decrypt data during the secure communication. Finished Messages: The client and server exchange "Finished" messages to confirm that the handshake is complete and that both parties have established a secure connection. Information and Cyber Security Implications: The SSL Handshake Protocol is critical for ensuring the confidentiality, integrity, and authenticity of data transmitted over the internet. By using digital certificates and encryption, the SSL Handshake protects against eavesdropping, man-in-the-middle attacks, and data tampering. Confidentiality: The handshake process establishes a secure encrypted channel between the client and server, ensuring that data transmitted between them is protected from unauthorized access. Integrity: The handshake includes the exchange of cryptographic hashes that allow both parties to verify the integrity of the data. This prevents data from being altered or tampered with during transmission. Authentication: The server's digital certificate provides authentication, ensuring that the client is connecting to the correct server and not an impostor. Key Exchange Security: The SSL Handshake ensures that the encryption keys used for secure communication are exchanged securely and cannot be intercepted by attackers. Perfect Forward Secrecy (PFS): Many modern SSL/TLS configurations support PFS, which ensures that even if the long-term private key is compromised in the future, past communications remain secure. In conclusion, the SSL Handshake Protocol is a fundamental process in establishing secure connections over the internet. It plays a crucial role in ensuring the confidentiality, integrity, and authenticity of data transmitted between clients and servers. Understanding the SSL Handshake and its implications is essential for information and cyber security professionals to implement robust security measures and protect sensitive data from potential threats and attacks.
@apooru2414 жыл бұрын
client ko certificate kahan se mlta hai???
@khareprateek194 жыл бұрын
Client gets its certificate by its CA or domain PKI
@kavyan37594 жыл бұрын
Chiper spec I didn't understand phase 3 n 4
@Shantanu_lrnr2 жыл бұрын
Thanks 😊 sir.......
@aghnasheikh50564 жыл бұрын
thanks for saving me
@bavaleshakthi29614 жыл бұрын
Thank you sir
@ashwinthankachan94512 жыл бұрын
Damn ur too good !
@HardikPatelhardsome10 ай бұрын
thik se samjha bhai... kyu itni halbali kar rha hai 5 min me! symmetric and asymmetric cryptography then symmetric key created and send by client to sever for further actual data communication.
@Subha-i2f11 ай бұрын
Sir u look like Rohit Sharma
@yashdoshi235510 ай бұрын
khushi likes this.
@roshanyadav2078 Жыл бұрын
Not understood
@meowwithmaya4 жыл бұрын
don't spread wrong information. please check it nd be sure. u r not right. please correct ur self.
@umangverma36603 жыл бұрын
Ok ji
@asingh40903 жыл бұрын
Superficial video, there is no packet level information
@satishsomase85595 жыл бұрын
😍
@arpitkaushik95555 жыл бұрын
sir may i go to toilet.
@mohanbharadwaj1112 жыл бұрын
complete non sense ! no info on how the server cert is validated how the keys are formed and encapuslated .data went from server to client n client to server finish🙏
@Tharkiराबण11 ай бұрын
Bro basic structure explain Kiya h 😊
@thecrazygamer73346 ай бұрын
You really want to learn whole syllabus in just one 5 min video😂