An important point that's worth mentioning, otherwise the server-hello phase would be insecure, the client and server both have a trusted authority they could rely on for authenticating each other. The client verifies the server's SSL certificate with the certificate authority that issued it. This confirms that the server is who it says it is, and that the client is interacting with the actual owner of the domain.
@brucewayne24802 жыл бұрын
Yes because a certificate authority verified a domain owner and signed its data with its private key, that signature is included in the certificate , and the public key of known certificate authorities are stored in the browser
@lanyloh98762 жыл бұрын
I was wondering about this. Thank you!
@lawrencedoliveiro91042 жыл бұрын
The client has a list of CA certs that it trusts, so it will accept any server cert that is signed by one of them. TLS can also be used for two-way authentication. Also for secure communication between different parts of your own organization, you can create your own CA cert and install that at the endpoints so they can trust each other.
@alexandermiasoiedov6637 Жыл бұрын
How does the server know that the client is not the hacker that sits in the middle? Namely, how does the server knows that session_key is authentic and generated by the client, but not by the hacker in the middle?
@igwejk Жыл бұрын
@@alexandermiasoiedov6637 The man in the middle should not be capable of decrypting the client's message.
@barbobrien931810 ай бұрын
Comprehensive and easy to understand. The best part is that the video was short!
@miehaga7444 Жыл бұрын
I love the audience of this channel, very polite, graceful and intellectual.
@ashu7pathak8 ай бұрын
Thanks.
@ReflectionOcean Жыл бұрын
HTTPS is HTTP + TLS (Transport Layer Security) TLS is a handshake process between the client and server with asymmetric encryption to exchange a session key used for Data Transmission with symmetric encryption.
@noorzanayasmin7806 Жыл бұрын
is the key the SSL certificate verified by Certificate Authority?
@faultboy Жыл бұрын
You also watched the video? Interesting!
@geeksified Жыл бұрын
@@noorzanayasmin7806 SSL cert is the certificate you bought from your hosting or anywhere you bought it from, which contains the public key, and when you create your csr, you will be given with the verified private key that can only be paired with your public key.
@PannasastraSR Жыл бұрын
Your explanation is easy to understand than watch the video
@nikhil182 Жыл бұрын
Good summary of the video!
@danielkrastev6786 Жыл бұрын
Best animation aesthetics ever. Pure joy to watch.
@cassianocampes2 жыл бұрын
Direct to the point, clean, and easy to understand. Great content!
@SantoshKumari-d8r2 ай бұрын
I love how the audience effectively participating in Comments Sharing knowledge. That's the beauty of well educated environment.
@mouhssineannouri549710 ай бұрын
The session key isn't directly swapped between the client and server, even with asymmetric encryption. Instead, they exchange a random string of bytes, often referred to as a 'pre-master secret' or 'nonce', which serves as the basis for generating the session key on both ends using the algorithms previously agreed upon in the cipher suite exchange.
@يعقوبالدويك10 ай бұрын
yo my moroccan bro can we contact thru fb or ig or whatsapp?
@lemonade2345-j4e8 ай бұрын
I can tell that you are a scientist. Wouldn't surprise me if you had a PHD. Really an articulate presentation with virtually no flutter. A rare sight on YT.
@NitroBrewbell21 күн бұрын
The easiest explanation of a complex topic ever done in less than 6 mins !
@asn65001 Жыл бұрын
I like that you didn't mention TLS 1.1 and below. No need to teach something that's going out the door. And thanks for pointing out the ciphers. In teaching others about TLS, I've found ciphers to be the hardest concept for people to grasp.
@jackscalibur Жыл бұрын
I think that everyone needs to understand the ciphers involved, but most people aren't going to be concerned with the technical details of the cryptographic algorithms.
@ameyapatil113910 ай бұрын
This was so so helpful straight to the point ! Worth every second ❤
@goldfishbrainjohn24622 жыл бұрын
Ordered your both system interview books, volume 1 and 2. Can't wait to read the books!
@siddharthamohan63828 ай бұрын
Are the books worth it?
@goldfishbrainjohn24628 ай бұрын
@@siddharthamohan6382 Definitely.
@cybrainx729 ай бұрын
You missed the phase where Client has to validate is Certificate is signed by the trusted CA.
@alaakhaleel91373 ай бұрын
Thank you bro, as my father always said, clean and easy, I want your room clean and attitude easy.
@ivanmatveev4313 Жыл бұрын
Amazing!! The best video about HTTPs, I ever seen before!
@magic_pink_horse2 жыл бұрын
You're the best presenter for this kind of stuff!
@helgarudersleben480 Жыл бұрын
bytebytego team, i would like to thank you for your videos - they are not only illustrated really well, they are really informative!
@patricknelson2 жыл бұрын
Bravo. 👏 This is a very succinct high level explanation. I’m already somewhat familiar with the handshake, but this does a fantastic job summarizing things in an approachable fashion without diving into too much detail. Great thing is, there’s still plenty more to dive into as well and this provides a well structured guide on how to do that.
@javalisidda7983 Жыл бұрын
🎉
@nishantdalvi9470 Жыл бұрын
Yeah even I was confused about the how does certificate check and key exchange serially happens this video cleared my doubt
@anshumansahu84762 жыл бұрын
It is very nice and clean exlaination without messing up terminology..great job
@ARMOTISARMOTIS Жыл бұрын
it was really great fast and everything important was in this video thank you I watched more than 7 videos and put more than 1 hour to find you :) Thanks I understood everything clearly :)
@SimpleLivingHigherThinkingАй бұрын
Awesome video short ,clear , easy to understand thank you !!! 😀
@EricRodriguez-uu6gj6 ай бұрын
You are very professional with your videos and your teaching; is a suggestion you should do a video with an A.I voice
@itscheckmate878 Жыл бұрын
Best explanation I found on utube about TLS and ssl
@Djsanddy10 ай бұрын
short and sweet tutorials really loving your channel
@rembautimes880811 ай бұрын
Excellent channel, well illustrated. A must watch for those in tech risk like me
@EbonySeraphim11 ай бұрын
Along with the top comment here, I think it is helpful to understand that step #2 Certificate Check involves the client cross referencing that the DNS name they resolved matches the hostname presented on the server's certificate. Otherwise, the TLS handshake will (appropriately) fail because even though the server certifcate may be valid and trusted, the server presenting it is not truly associated with it.
@hanshima_2 ай бұрын
Wow... that is important and helped me today. I was having some problems with a broker and was receiving invalid IP error.
@Passersby986 ай бұрын
Bro's animation and explaination are superb. 👍
@vitordeoliveira6139 Жыл бұрын
question: Diffie-Hellman (DH) is used for key exchange, the client and server exchange public keys and use them to generate a shared secret key that is used for symmetric encryption. Yes he share a public key also...
@misteroy9 Жыл бұрын
Exactly, that's also my surprise he said it doesn't transfer the public key over the network. @ByteByteGo could you explain it?
@tatianamarinmarulanda69586 ай бұрын
Love ALL your videos and channel! You rock!!!
@tesla17722 жыл бұрын
great explantion and to the point. also tls 1.3 solves forward secrecy problem of tsl1.2
@oah84652 жыл бұрын
hands down, you nailed it.
@jeffg46862 жыл бұрын
one of the best videos for overview on this.
@skytechbits2 ай бұрын
Love the cool channel name. Thanks for the great info.
@johnw.87822 жыл бұрын
As always, great job. Looking forward to the next book.
@bala007raju Жыл бұрын
so nicely explained , Thanks lot , Glad I found this video and channel . thanks again
@simranjeetsingh88643 күн бұрын
Thank you, you explain it very well
@user-yz7ts2fq9m Жыл бұрын
wow, great and clear explanation! Thank you very much!
Thanks for the video. I think you could have explained more about what TLS and SSL are specifically, but thanks for explaining in detail how HTTPS works.
@thebesttechnical3608Ай бұрын
Very informative video. Thanks
@sbj08802 жыл бұрын
Very well explained - I love how soothing and insightful it is to go through your videos. How do you record these videos..curious? Thank you.
@munteanionut39938 ай бұрын
Thanks a lot! This is very useful! 03:47 it s hard to follow due to -I think- you using indefinite artical "a" (as in "a symmetric") vs the way "asymmetric" is pronounced. Also the fact that you added "symmetric encryption" to the diagram AFTER you mentioned your point. Sorry for nit-picking, just hope this would help anyone else
@ricp Жыл бұрын
Great expalantion, thanks!
@unique_ruler_memes30034 ай бұрын
And one more main reason for not using symmetric key is : When server sends the public key only to the client. Not the private key.. so the client only can encrypt the data using public key it has received with the certificate, not able to decrypt any data came from the server. Thats why we use seasion key exchange..
@stephenh9483Ай бұрын
"Client Hello" LOL hilarious. Computers really do appreciate kindness
@MrJaved1232 жыл бұрын
Fantastic explanation.. Thank you
@lensimonchang Жыл бұрын
very clear elaboration and good sharing!, Appreciate!
@JJVee4272 жыл бұрын
Simple, very well explained, thank you!
@ait-bendaoudmohammed9262Ай бұрын
5:30 about diffie hellman I think you wanted to say "Without ever transmitting over the network the private key" the public key is of course shared using a trusted CA...
@yash1152 Жыл бұрын
4:41 >_"as with most optimizations; it's a bit harder to explain"_ glad go be reminded of it (:
@ovidiuandrei6013 Жыл бұрын
Very good explanation. Thanks man !
@QueeeeenZ2 жыл бұрын
HTTPS is not a protocol technically, it is a scheme. The protocols used are actually called HTTP and TLS.
@siddharthsorout3446 Жыл бұрын
bytebytego team, i would like to thank you for your videos , really informative!
@s.m.hconstantin3887 Жыл бұрын
incredible video That helped me a lot Thanks
@rodolfocabralneves82794 күн бұрын
Does the client create a private key and share it with the server in the key exchange process?
@behrad9712 Жыл бұрын
Thank you very much!🙏👌
@chriseddisford1834 Жыл бұрын
Excellent video! Very well explained.
@prashanthb6521 Жыл бұрын
This is excellent explanation.
Жыл бұрын
Very nice visuals!
@juanmayen21 Жыл бұрын
Thanks so much for this video.
@hemanthkumartirupati Жыл бұрын
Excellent explanation
@venkybabu81402 жыл бұрын
Public keys were trapped sometimes and that's why no public keys travel. Mostly by NAT re-config. SSL means a set of algorithms accepted between with certificate means that the binary coded files used for decryption. Key means algorithm. Why public and private keys means that public used for encryption of the algorithm of choice and private is end to end algorithm transfer and use. About a thousand algorithm exchanges for a single transaction. So don't try.
@ilromape Жыл бұрын
very nice explanation. Thx
@aquarius2642 Жыл бұрын
Wonderful video explaining the internal working of SSL TLS. This got me wondering that about what other questions related to HTTPS SSL TLS do web developers need to know the answers to to be able to do their jobs. I doubt they need the internals of how HTTPS SSL TLS work. Web developers just need to understand 1. Libraries that enable http requests and responses - client side and server side. 2. What are the steps in getting a certificate 3. what sort of attack are prevented through this kind of encryption 4. what are the libraries objects methods that enable https on both client side and server side 5. what are the steps relevant to setting up https tls and ssl on self hosted and cloud hosted servers
@nicolepierce25172 жыл бұрын
Very interesting need to know
@Mandrickgmaing3 Жыл бұрын
Thanks man. Good lesson
@hjxy2012 Жыл бұрын
Thank you. And how do you draw these magic architecture pictures?
@zhujunwang16672 жыл бұрын
Really good one! Thanks a lot!
@Bobbel8883 ай бұрын
1:03 Assymetric encryption alone can be proxied, at least in cases ECC and RSA. Where does the protocol prevent a man-in-the-middle attack ?
@zixuanzhao60438 ай бұрын
DH alone is prone to man-in-the middle attack. So the certification verification is vitally important which the video doesn't cover much. Basically the server send a signature which is some private-key encrypted digestion of server identity information. The client then verify the public key through chain-of-trust by layers of authorities that issue certifications (system root authority is trusted unconditionally unless your local system is messed up). Using the verified public key the client decrypt the signature and compare the result to the digest generated through the negotiated digest/hash algorithm. If everything checks out, the server identity is trusted because only the private key owner is able to generate that signature.
@davidmoody247010 ай бұрын
Great video, thanks.
@lucasguaru Жыл бұрын
I have a question. When this hand shake happens? It does for the first request and keep this connection stablished for the next calls or it does for every request? Im having difficult to imagine it if we have clusters, if the connection is kept alive.
@caiohenrique55872 жыл бұрын
How do you make those video animations ?
@Art-kz6zf6 ай бұрын
How does the client identify itself in the subsequent requests in the phase 4? Does the server need to keep in memory all the thousands of client specific session keys?
@vincat84 Жыл бұрын
great video! thanks!!
@algovec4024 Жыл бұрын
Great video thank you!
@rl6382 Жыл бұрын
Sir.... how does your channel NOT HAVE 20M SUBS???!?!?!?!
@pjchender2 жыл бұрын
This is super clear! Thank you!
@aidataverse2 жыл бұрын
Very useful information
@danish61928 ай бұрын
Great, just please add Certificate Verification as well
@hlexjava Жыл бұрын
Question - so if we have private key. We can decrypt tcpdump file?
@jhfyt053911 ай бұрын
amazing explanation
@pramithasdhakal53677 ай бұрын
Is not storing the session key on client side, e.g. browser, unsafe?
@shortest-nerdev-eugene2 жыл бұрын
I have a question about TCP Connection while client surfing the web site. As I understood, when client connect to the web server as a first time, then the task, as the video explained, will be proceeded between client and server side. After once the client & the server release their connection, TCP Close, Is the client and the server have to re-proceed the progress? Or the client just can use the exist Asymmetric & Symmetric keys?
@SeviersKain Жыл бұрын
I never wanted to understand those trivial details until I came across developing my own softwares...these things should be taught coherently together, not separately...
@maruthuk2 жыл бұрын
Brilliant!👍
@itskarthickm2 жыл бұрын
May I know which tool that you used for the Illustration or to make the presentation? It is simply impressive and easy to understand..
@tonycheung55322 жыл бұрын
great video
@niuhe2 жыл бұрын
clear and helpful👋
@mahamadoutogola40015 ай бұрын
Thank you 😊
@ruthwikd31110 ай бұрын
Great explanation , but please be loud next time
@smashit0028 ай бұрын
@bytebytego - recently i faced an issue while onboarding a Thanos sidecar (aws account) instance into my Thanos querier (different aws account). The logs showed that the Thanos endpoint cert is from LetsEncrypt and the ThanosQueries is from Route53. Due to it being LetsEncryt it does not recognize the cert authority. How tk fix this?