This video is pure gold. I work in the IT industry and it's hard to find a better explanation than this about TLS.
@joseguillermo17902 жыл бұрын
I agree. Insane domain of the topic.
@slashingbison250311 ай бұрын
Yeah its excellent, its a guy who knows what he is talking about in a simple way to an IT tech who always gets overwhelmed by encryption
@samiwebdevАй бұрын
I searched lots of resources to understand the full picture behind TLS. This is the best explanation ever
@gram.4 жыл бұрын
I like the way this guy talks and explains things, duno what it is. He obviously really knows his stuff to be able to explain it so well and simplify it enough for me to understand!😊 Thanks
@mo994 жыл бұрын
Didn't study Computer Science but I really wish I had someone like Sir Dr Mike Pound at my university. Those folk at Nottingham are lucky
@Hasi293473 жыл бұрын
He seems like he enjoy what he is doing and that is reflected on his presentations.
@markstevens76993 жыл бұрын
Some days I spend 8 hours listening to the playlist of only him. He makes everything he says make sense, even if you don't get it the first timr
@toast_on_toast12702 жыл бұрын
To me it seems like he's explaining from a design perspective, that is "how the protocol addresses the problem", and has the knowledge to back it up. I think it's the correct level of abstraction to explain the problem clearly with only the important details.
@larsrosenkilde78722 жыл бұрын
He's got passion for computer science...
@MathewCrane4 жыл бұрын
I would be interested in a separate video about TLS 1.3 versus 1.2, especially related to Encrypted SNI (ESNI) and how if affects transparent proxies and other security tools
@maverickmaverick52 жыл бұрын
@Dr Mike - same request.
@yes-ni1od2 жыл бұрын
ESNI is being replaced with ECH, both still very young protocols
@sghost1283 жыл бұрын
11:28 this is an underrated piece of editing right here.
@yasyasmarangoz35774 жыл бұрын
I like how he screams at the start.
@swine134 жыл бұрын
I THOUGHT EVERYONE STARTed conversations that way?
@yasyasmarangoz35774 жыл бұрын
@@swine13 lol 😂
@danieljaszczyszczykoeczews26164 жыл бұрын
yeah such a sudden portion of british accent :D
@yasyasmarangoz35774 жыл бұрын
@@danieljaszczyszczykoeczews2616 Yup ^^
@SkytraxX13 жыл бұрын
Class clown are we? 🤡
@ramuthra14 жыл бұрын
Cryptography is such a cool subject. Absolutely love it when Mike is on!
@belledelphine43134 жыл бұрын
I am in rabbit hole, he said in every video "that's what we talk about last time" so I am looking for last video and again and again and again... HELP :D
@MrMarkgyuro4 жыл бұрын
if you search for numberphile cryptography you ll find the whole playlist in this topic
@WilliamAndrea4 жыл бұрын
I believe these are all of them, chronologically. LMK if I missed any. Apr 18, 2014 | Heartbleed, Running the Code Jul 22, 2014 | Public Key Cryptography Oct 23, 2015 | Man in the Middle Attacks & Superfish Mar 22, 2016 | Secure Web Browsing Mar 30, 2017 | End to End Encryption (E2EE) Apr 11, 2017 | SHA: Secure Hashing Algorithm Dec 15, 2017 | Secret Key Exchange (Diffie-Hellman) Dec 29, 2017 | Key Exchange Problems Jan 16, 2018 | Elliptic Curves Aug 14, 2019 | Almost All Web Encryption Works Like This (SP Networks) Nov 20, 2019 | One Encryption Standard to Rule Them All! Nov 22, 2019 | AES Explained (Advanced Encryption Standard) Oct 23, 2020 | Transport Layer Security (TLS)
@WujuStyler3 жыл бұрын
@@WilliamAndrea best comment ever, thanks
@fanllawf3 жыл бұрын
@@WilliamAndrea Thank you so much. If a blank sheet of paper wants to learn this, would watching the series in release chronological order be appropriate?
@WilliamAndrea3 жыл бұрын
@@fanllawf I guess so, yeah. You could probably skip the first one.
@rickelmonoggin4 жыл бұрын
It's very convenient that you created these videos just when I decided to start learning TLS. Very clear and easy to understand. Only bad thing is that the adverts come at rather annoying times.
@jackc37274 жыл бұрын
Nothing better than a Friday Pounding.
@coldblaze1004 жыл бұрын
I-
@WmSrite-pi8ck4 жыл бұрын
That sounds so homosexual. (Not that there's anything wrong with that.)
@zaaap04 жыл бұрын
giggity
@jackc37274 жыл бұрын
@@WmSrite-pi8ck What do you mean? Getting Pounded isn't sexual.
@WmSrite-pi8ck4 жыл бұрын
@@jackc3727 Maybe not where you're from.
@romel3043 жыл бұрын
Thank you for explaining with context and really breaking it down. It’s the context and bit of history on how something came to being is what makes things interesting. Thousand kudos.
@hafidmrhailaf808410 ай бұрын
The best explanation, that someone could find on the Internet. Thank you Michael
@sreeramrm7997 Жыл бұрын
This video is pure fantastic.Hey after the handshake the client and server uses symmetric key encryption.
@kristoffseisler21634 жыл бұрын
I forgive the camera man for hollering in to the mic so that it distorted like that cause he got Mike Pound on
@MelroyvandenBerg4 жыл бұрын
He really should wear a microphone
@almightyhydra4 жыл бұрын
New record for advert: 2:15. Two of them, of course, after two at the start. 2030: videos are now entirely adverts, no content. 2040: content is back, but only videos containing nothing but adverts are accepted
@Twisted_Code4 жыл бұрын
not even just product placement. It has to be full on "paid programming" level of advertisement. But wait, there's more! Comment today and we'll throw in this free sub to a channel you'll never watch again!
@lawrencedoliveiro91044 жыл бұрын
youtube-dl is still available.
@vicentelouvet71604 жыл бұрын
KZbin-dl
@LayMyBurdenDown4 жыл бұрын
you just reinvented the "info-mercial" :)
@ream884 жыл бұрын
KZbin Premium
@giosuecarducci53184 жыл бұрын
This guy explaining is awesome and inspired me to do my thesis on ROCA attack. you rock
@azizlol19073 жыл бұрын
what a energetic man, wish had a teacher like him. I could learn from him till I die
@Jesseeeeee4 жыл бұрын
I wanna hear Dr Mike say "My name is Pound, Mike Pound"
@F1ghteR414 жыл бұрын
I think this video can serve as a sort of hub or strarting point for many Dr. Pound's videos, both existing and upcoming. Basically it lists in one string a lot of topics he covered, which is quite convenient.
@ashwanipundir5352 жыл бұрын
Wow ! I wish he was my teacher in college! I am glad that I found this channel. Thank you 🙏🏻
@TheRealLughnatic4 жыл бұрын
That was the most concise explanation of TLS 1.3 I have ever heard.
@credence77777772 жыл бұрын
it was for TLS 1.2
@TheRealLughnatic2 жыл бұрын
@@credence7777777 He discusses TLS 1.3 towards the end of the video.
@pjsixhundred4 жыл бұрын
Perfect candidate for a TV Tech Show which goes into more depth on how things work.
@warlockpaladin22612 жыл бұрын
I miss TechTV. 😭
@damonhage74514 жыл бұрын
Man I could have really used this when working on a project a year ago.
@yawarjamal9094 жыл бұрын
Dr. Pound + CS + Accent = Complete Package Thanks Computerphile as always
@Shadowwand Жыл бұрын
MQTT is a service that provides detailed connection session storage. Since the same device connecting to the server can use the same connection states, so it can immediate resume receiving topics with retained information.
@MidKnight_Reign4 жыл бұрын
Client and Server: [does handshake things] Client and Server: "We done? Here's a transcript of what we just said, encrypted. We'll talk again under this encryption kthxbye. [they both check what they sent against what they received. They don't match] Client and Server: "..." (uhh I'm just gonna NOPE RIGHT TF OUT OF THIS ONE!) Attacker: "Aw shucks."
@YourMJK4 жыл бұрын
But it's still susceptible to MitM attacks that simply communicate with both in TLS, if you can't verify that the public key you get actually belongs to the party you thing you're speaking to. Which you can't for sure, unless you trust a CA or meet in person and compare keys.
@Ruhigengeist4 жыл бұрын
I'd love to see a video on ACME considering it's largely replaced most of how servers set up trust now. I understand pretty solidly how it all works (I help maintain the Caddy project) but I'm sure it would help for more of the public to understand how this all works. i.e. how the ACME challenges replace the legacy method of paying for certificates, etc.
@CubeApril4 жыл бұрын
Say hi to Matt for me. :)
@rashidxd4 жыл бұрын
Everyone: We can't do handshakes TCP: SYN
@Twisted_Code4 жыл бұрын
ACK (dammit you beat me to it by 1 hour)
@BenjaminCronce4 жыл бұрын
The internet is full of syn.
@Acorn_Anomaly4 жыл бұрын
@@Twisted_Code You missed the SYN/ACK. :P
@Twisted_Code4 жыл бұрын
@@Acorn_Anomaly dammit well what do I know. I have no practical experience with handshakes (yet). I only know how to reply at all because college courses LOL TBH, said inexperience is part of the reason I clicked this video... That and of course I was going to make the handshake joke if nobody had already
@kebman4 жыл бұрын
ACK ACK ACK, said the Martian.
@Ribby004 жыл бұрын
Mike Pound for president. Mike Pound 2020.
@nkershaw2 жыл бұрын
I'm a fan. well explained. not rigid. and you guys come across as human. which is hard to do when teaching anything, especially computers.
@juliadow54003 жыл бұрын
I love how he can talk about something boring with such enthusiasm. He makes it interesting.
@NeunEinser4 жыл бұрын
Finding a website that supports 1.3 was easy. I am on it right now.
@TotalImmort7l4 жыл бұрын
KZbin use QUIC, not TLS.
@NeunEinser4 жыл бұрын
@@TotalImmort7l It says TLS 1.3 on the padlock tho
@TotalImmort7l4 жыл бұрын
@@NeunEinser which device are you using? On a phone, it shows QUIC.
@NeunEinser4 жыл бұрын
@@TotalImmort7l Desktop, Win 10, Firefox
@danielgrace78874 жыл бұрын
It sounds like you could use a different suite of ciphers in the future, and this system would be all that's ever needed for these communications.
@psidianculpa59293 жыл бұрын
This is the KZbin I we need to be watching.
@IboKnowsBest4 жыл бұрын
WTF I was just studying that thingy and boom! Couldn't timed better ^^
@qzbnyv4 жыл бұрын
+1 to that. I was looking for videos on it about a month back and wasn’t happy with any of them really. Happy to have Dr. Mike Pounder showing us how it’s done
@lakshminarasimmanv4 жыл бұрын
Google also tracks and read minds.
@BlueyMcPhluey4 жыл бұрын
@@qzbnyv I could have really used this at the end of August when I was writing a paper on this 😂
@qzbnyv4 жыл бұрын
@@lakshminarasimmanv Well, I know KZbin creators often make their videos based around general internet search terms frequency as a way of being timely and catching wind from trends. I haven’t looked into what the KZbin creator dashboard looks like these days, but I wonder if Google has an API that could easily display “People who watch Computerphile regularly have been searching for” stats.
@creature_of_fur4 жыл бұрын
I dunno why but this video reminded me of something I read an article about long time ago - encrypted calculations. Essentially these allow you to perform various operations on ciphertext(like addition and multiplication) as if it was plaintext, but without actually knowing the values. The formal name for these is homomorphic encryption systems. It would be cool if you did a video on them
@bloodd113 жыл бұрын
Thank you to share this knowledge. Dr Pound explain so clear this matters. Thank you for this channels and this videos. Greetings from Argentina.
@MAli-wu4rx4 жыл бұрын
Excellent instructor, excellent KZbin channel ! As a medical doctor I find this stuff amusing.
@SuperAvenger963 жыл бұрын
Hey Guys! It would be great to see you guys doing the promised difference between TLS1.2 and 1.3. I really like your videos! They are great to understand the basics of computer science and I like to watch videos related to the toppics i have in my master course. Greetings from Germany!
@wedusk4 жыл бұрын
Love the videos with Dr. Pound. Hope you guys make one on IPSec.
@anonymousvevo8697 Жыл бұрын
the only voice i like to hear, amazing explanations =)
@YannStoneman2 жыл бұрын
It would be awesome if you created a playlist of all these TLS-handshake related videos mentioned and linked to it in the description of this video.
@M1stersupersonic84 жыл бұрын
Huh. The new TLS session after inactivity would definitely explain why tabs reload after I've been tabbed away from them for a while. Learn something new everyday!
@silkwesir14444 жыл бұрын
that should not explain it. there's something else going on which triggers the reload. otherwise you would just look at the page as you loaded it last.
@hundehausen4 жыл бұрын
Is see Dr Mike Pound, I hit like.
@AI7KTD4 жыл бұрын
13:55 two roundtrips (assuming you're 200ms away from a server) would be 800ms
@WujuStyler3 жыл бұрын
I came to the comments looking for this hahah
@bourbonwarrior16183 жыл бұрын
Mike may have not described it clearly but network latency is measured by Round Trip Time. So his 400ms is correct.
@klightspeed4 жыл бұрын
As an aside, 2:22 the example cipher suite just happens to be one of the ones that Windows 7 and Windows 8 do not support - it only supports those parameters if an ECDSA certificate is used - so 6:20 the server will respond with a failure message when using e.g. the Windows TLS libraries to communicate with such a server.
@akshay-kumar-007 Жыл бұрын
Hey @Computerphile great video and I always come back here to refresh my memory about how TLS works. Can you also do an extension video of this with mTLS? Thanks
@maksymmryhlod30933 жыл бұрын
Very simple and clear explanation.
@SamiCSc4 жыл бұрын
WOW! I love this channel and he explains everything well. Keep up the good work 🙏
@waynesrealworld58013 жыл бұрын
Thank-you for these post they are helpful, informative, and just plain entertaining
@Alchemetica4 жыл бұрын
Does Computerphile have merch? Say a black T-Shirt with a print of Bob an Alice in Mike's Graphics exchanging keys.
@jlxip4 жыл бұрын
Great video! I do have a question that has been bothering me for a while, though. Why are both RSA and ECDH used? The server sends the certificate, couldn't the client just encrypt a randomly generated AES key with the server's RSA public key, send it, and skip Diffie-Hellman?
@leogama34224 жыл бұрын
RSA encryption is too slow for on-the-fly encryption (and in massive amounts for the server) like web traffic...
@jlxip4 жыл бұрын
@@leogama3422 True, however: - Both the client and the server only have to use it once per connection. - They are already using it anyway since the server signs stuff, and as far as I know, encrypting and signing are equivalent operations in RSA. The server currently signs doing PKCS#1, powering to 'd'. The client checks the signature powering to 'e'. This is equivalent to encryption, but in reverse order, isn't it?
@jlxip4 жыл бұрын
To anyone that might read this, I just got it. The handshake I proposed is called "RSA key-exchange". Its problem is that it does not offer forward secrecy, so all previous traffic, if recorded, could be decrypted if the server's RSA key is compromised. ECDHE prevents this: previous communications will never be decrypted, even though future ones could.
@kramer3d4 жыл бұрын
so awesome that Jared from Silicon Valley is on the channel
@SaiKrishnanSathiarthi4 жыл бұрын
🤣🤣🤣
@vjself3 жыл бұрын
Your videos are absolutely fantastic.
@petersuvara4 жыл бұрын
Far easier and clearer when shown via the iPad instead of a paper based drawing. Stick with that. (More colours too)
@miked25603 жыл бұрын
Awesome video! What is the best way to see the full exchange--Wireshark?
@rikschaaf4 жыл бұрын
Can you do a video on the single round-trip next?
@LincolnChamberlin4 жыл бұрын
This dude is one of my faves
@Flankymanga4 жыл бұрын
Excellent explanation Dr.Pound. :) i mean i thought i know TLS 1.3 but it seems i was wrong. I did not know about the Finish message.
@Maxmekker424 жыл бұрын
these videos are gold a couple weeks before exams
@Elias_Az4 жыл бұрын
The thumbnail is just a classic x)
@charleslondon99004 жыл бұрын
I love your videos, your doodles could be better, but it is great to have a British expert on KZbin. I have one picky comment on this video , and that is that you have not mentioned "Transport Layer Security". I just wonder if sometimes just explaining the acronym might help some people. I am in IT security and I know we use abbreviations and in-terms like words, it's only natural, but I think saying the whole word might help us sometimes. Thank you for your great work on this channel, your a fantastic team.
@marioh99264 жыл бұрын
Very much thanks for your excellent explanation, Mike. I appreciate a lot your work.
@calistan54314 жыл бұрын
Incredibly helpful for my Sec+ studies thank you!
@zhaowentao60364 жыл бұрын
Even the background image looks like that paper!
@NoahElRhandour4 жыл бұрын
true xD
@TheTheThewillow3 жыл бұрын
Frodo explaining TLS, who would of knew. Thank you very informative
@drugndrop9244 жыл бұрын
I'be been waiting some wireshark capturing till the end
@petersonjr8015 Жыл бұрын
Thanks for your explanation of TLS. My question: Why do the client and server not just use the opposite public keys to encrypt and their private keys to decrypt all the communication. Why the need for more keys e.g session keys etc ?
@lisasun8596 Жыл бұрын
They are using Elliptic-curve Diffie-Hellman when they use their public/private key pairs. ECDH is fairly fast, but session keys use even faster cryptography like AES. If the cryptography is faster, loading the website would also be faster.
@gandelgerlant565 Жыл бұрын
Another problem with using it is that if someone takes over the private key, they can decipher all previous communication, but with Diffie Helmand a new key is generated each session
@liuqingwang4408 Жыл бұрын
Perfect Forward Secrecy is the keyword here
@maxinator80ify Жыл бұрын
Asymmetric cryptography is great, but slow and demanding. One operation or RSA is much more complicated than one AES operation for example. Symmetric crypto is MUCH more efficient and also has some bonus features, like automatically included integrity checking. Therefore it makes sense to use public key crypto for exchanging a key, which is then used in symmetric crypto shenaningans. This way, we make use of the best of both worlds and get great security as well as great performance.
@mcnamaraky4 жыл бұрын
Thank you sirs. We all appreciate ya.
@deepbluedrone4 жыл бұрын
Awesome 👏 Thanks for these videos
@benjamin112352 жыл бұрын
You mentioned TLS 1.3, now you have to do a video about it!
@Twisted_Code4 жыл бұрын
anyone else notice that the clip from at 8:40 says "obi one" rather than Obi Wan? surely someone had at least noticed it and commented on the previous video, even if no one (besides me) noticed today.
@MarcCastellsBallesta4 жыл бұрын
I understand almost nothing. I'm barely interested in subject. But they explain stuff so well...
@randName4 жыл бұрын
2:27 would be the perfect place to add an info card to the Kindle Text Problem video
@timgeldof77202 жыл бұрын
Thank you very much for your clear explanation! Interesting stuff!
@AterNyctos4 жыл бұрын
5:26 Basically my reaction everytime haha Great video!
@simonchapman3 жыл бұрын
love the editing. Get him up for a BAFTA
@terryl.flannery56493 жыл бұрын
Bafta
@msscash7294 жыл бұрын
I love your channel, the content is just incredible. English subtitles are missing ... this needs to be easily accessible.
@philivey43004 жыл бұрын
I love there videos, please keep them coming
@shehyaazkhannayazi27263 жыл бұрын
Thank you for this amazing video !! Could you please do a video on Certificate Transparency and IKP in the future ?
@alsorew4 жыл бұрын
Wash your TLS Hands after TLS Handshake with TLS Soap.
@sergioramirez51438 күн бұрын
Badum tss 😂
@evang82594 жыл бұрын
This helps me understand something in my job as tech support. Thanks!
@freedomfeind4 жыл бұрын
Can you do a video on the mathematical algorithms used in encryption? Euler, Extended Euclidean, matrices, multiplicative inverses, etc. There are a lot of college students who are looking for these videos and there are not that many and the videos available are not very well explained. I'm sure you will gain a lot of traffic if you do this.
@clebfelm41702 жыл бұрын
Great work
@chinmay94024 жыл бұрын
like the vids by dr Mike. Please do a video on honeypot, seems like an interesting thing. Thanks :)
@honpaul22033 жыл бұрын
Great, again and again! 👌
@heidiemiliaholappa4 жыл бұрын
Funny and educational stuff. Thanks!
@adedejiemmanuel14 жыл бұрын
In what sequence will TCP handshake and TLS handshake happen? Which one happens first in a connection?
@philipchief44062 жыл бұрын
always prefer an england accent to a north america one. excellent class!
@martin1b3 жыл бұрын
Love the greenbar 'paper'
@ishaanbhalla3962 жыл бұрын
He disses on big corp hard and I love it
@bobbyboygaming2157 Жыл бұрын
amazing videos
@gasparem164 жыл бұрын
keep up the good work! awesome learning videos!
@ShockerThere113 жыл бұрын
Whenever I read this name, I can't help but hear Moss saying "peter-phile".
@ColinRichardson4 жыл бұрын
Will there be episode on TLS vs QUIC ? As these have solidified and filled in a few gaps I had about TLS.. I know nothing about QUIC except it's UDP..
@black_platypus4 жыл бұрын
But now, of course, we need to implement something like the *_TLS Upwards Nod_* or the *_TLS Raised Eyebrow_*
@lawrencedoliveiro91044 жыл бұрын
TLS elbow-bump FTW!
@Shadow819894 жыл бұрын
@@lawrencedoliveiro9104 TLS-footshake maybe?
@Gooberslot4 жыл бұрын
I hope he takes this series all the way to installing a server that supports TLS.
@kallikantzaros4 жыл бұрын
just when I needed it.
@Bobbel888Ай бұрын
8:30 Is this correct? Thought RSA can be "proxied".