X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY

  Рет қаралды 121,611

Sundeep Saradhi Kanthety

Sundeep Saradhi Kanthety

Күн бұрын

Пікірлер: 60
@gevi1890
@gevi1890 4 жыл бұрын
BEST X509 video I found. It explains the certificate in details AND how it works in PKI! Excellent! Thank you very much.
@faruk372
@faruk372 3 жыл бұрын
finally !!!!! i love indian people for their videos
@konkipavankonkipavan5286
@konkipavankonkipavan5286 3 жыл бұрын
Nice
@mnihsingh4388
@mnihsingh4388 5 жыл бұрын
Awesome video ND ty sir Kafi help mili😊
@prashanths4455
@prashanths4455 2 жыл бұрын
Sir, Thanks for your excellent explanation
@bharathr7717
@bharathr7717 3 жыл бұрын
If we are appending hascode to plain text i.e user ID and public key then what we hashcoded?
@sans.creates
@sans.creates 2 жыл бұрын
Thank you so much!
@deepeshmohan9165
@deepeshmohan9165 4 жыл бұрын
Thank you for the great tutorial !!
@anuradharavuri9889
@anuradharavuri9889 6 жыл бұрын
Tanq for making this video sir,🤘👍
@mathewkargarzadeh3158
@mathewkargarzadeh3158 5 жыл бұрын
Dear Sandeep. Excellent illustration on x.509. appreciated !!
@sk.1495
@sk.1495 3 жыл бұрын
Awesome..!!
@salman80
@salman80 5 жыл бұрын
I just started watching your videos, sir thanx a lot, your videos doesnt cover all the topics of Comp Sec 501 but they do cover the topics i am having hard time understanding. Love from Pakistani American. Better than Prof Messer but he is helpful as well.
@chandaneshwarilolabattu3148
@chandaneshwarilolabattu3148 3 жыл бұрын
Hey I have the same feeling
@padmaduddu7357
@padmaduddu7357 5 жыл бұрын
Very nice explanation sir
@saibhashyam
@saibhashyam 3 жыл бұрын
generally people assume that only the data encrypted using public key can be decrypted with private key, but the other way also works fine!!
@sarvmardan
@sarvmardan 2 жыл бұрын
07:01 What is that "some hash algorithm"? And is this hash algorithm independent of "key" ? Sha1 is a potential candidate ?
@suryateja2524
@suryateja2524 5 жыл бұрын
Thanks sir(great job).👍😊
@User7999-x3j
@User7999-x3j 5 жыл бұрын
Thank you Sir.
@sarvmardan
@sarvmardan 2 жыл бұрын
20:00 Question: Suppose a certificate is of version1, how come it will have a signature generation algorithm field when version1 doesn't contain a signature at all?
@ME-mp3ne
@ME-mp3ne 4 жыл бұрын
Thank you for your good explanation :D
@entertainmentadda1183
@entertainmentadda1183 3 жыл бұрын
Thank you sir! ❤️
@rahulmedidi6184
@rahulmedidi6184 6 жыл бұрын
Tnq sir...meru chepenedhi veni alagey velli exam lo ras pass aya...tnq sir 😍😍😍
@leelakhathari3526
@leelakhathari3526 4 жыл бұрын
Sir your vedios are so good to gain knowledge ,please also post vedio on public key infrastructure in CNS
@amc1516
@amc1516 5 жыл бұрын
God bless you sir
@akibhasan737
@akibhasan737 3 жыл бұрын
How I will check /compare the hash code provided in certificate fields against all the remaining fields.
@jellychrome
@jellychrome 4 жыл бұрын
Well explained. Question: 9:15. How can anyone with a CA’s public key decrypt something that the CA encrypts using its private key? I thought public keys are only for encryption.
@BornMiner
@BornMiner 4 жыл бұрын
That is how asymmetric encryption works. Anything encrypted using the private key of a pair can be decrypted using the public key of the same pair.
@almeida.cavalcante
@almeida.cavalcante 4 жыл бұрын
Nice lecture! Great! I'd like to SIGN a PDF using PKCS11JS, what about doing a video about all this concepts on practice? Thankyou
@fathimasolapur6075
@fathimasolapur6075 5 жыл бұрын
Thank you sir
@smatilboddu8802
@smatilboddu8802 5 жыл бұрын
That was a awesome explanation sir Thank you sir I will share your videos to all my friends
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
hi that's very nice and thanks for your interest and support towards our channel and keep on following our channel.
@vishals9353
@vishals9353 6 жыл бұрын
Thank you
@pkcombines
@pkcombines 3 жыл бұрын
Sir digital certificate and X.509 certificate is same or different?????!!
@pjophouseofeducation2035
@pjophouseofeducation2035 5 жыл бұрын
nice sir
@nayagraabi
@nayagraabi 5 жыл бұрын
thank u so much sir
@turkishmaid
@turkishmaid 3 жыл бұрын
Great lecture, bro. One thing missing: what would I have to supply and what will be added by the CA? And: how ill I be authenticated with the CA to prove that I actually am the user named in the X.509 certificate-to-be?
@daisonraj9577
@daisonraj9577 6 жыл бұрын
Thanks sir
@COOLZZist
@COOLZZist 6 жыл бұрын
A really good explanation on X.509 Certificate, I have a doubt regard the Subject Unique ID and the serial number as both of them will be unique in every certificate, why would having an extra field help?
@nikhilt3755
@nikhilt3755 5 жыл бұрын
whats use in version1 and 2 when there is no actual signature
@viveksharma-fc6fi
@viveksharma-fc6fi 4 жыл бұрын
Version1 and 2 Also Contains the signature as well and getting used as well
@nitinmahajan1621
@nitinmahajan1621 5 жыл бұрын
i have one confusion related to s public key Suppose there are two users UserA & UserB User A wants to fetch data from user B. So, in this case will userA share its public key with B & B will sign it digitally or B will share its public key with A and will decrypt the signed certificate with that public key
@malemmutum5049
@malemmutum5049 5 жыл бұрын
"Algorithm used for generating signature"- is it for both the hashing algorithm and encryption algorithm? or the hashing algorithm only? or encryption algorithm only? And how do we verify the certificate in version 1 and 2 if there is no signature? Thanks a lot for the video!
@ShubhamKumar-br1ft
@ShubhamKumar-br1ft 4 жыл бұрын
Hye Sir, how signature will be decrypted at the client side if the cert is signed by intermediate CA and not by rootCA directly.
@satish1012
@satish1012 2 жыл бұрын
Hello All, Kindly verify my understanding. It has been challenging to understood this concept for some time. Now i have put all the points together. Kindly clarify my understanding on this Obtaining Certificate from CA (Taking a fictitious company ACME) (A) ACME corporation generates private and public keys using OpenSSL tool (B) ACME corporation generates CSR by using public key and other information like Company Address , Company details etc. Sends CSR to CA (C) CA verifies CSR and creates signed CERTificate (CERT) by signing with CA's private Key (D) ACME corporation stores signed CERT Communication between Client (browser) and ACME Server 1. Client connects ACME corporation server with https protocol 2. ACME corporation sends the signed CERT to the client 3. Since the Client will have CA's public key of CERT, it should be able to open the certificate and validate if it is indeed issued for ACME corporation. (Note : All the Browser's will have public keys of CAs) 4. Client gets the public key which is inside the cert. 5. Client will create session key and encrypt with public key and sends the encrypted session key to ACME corporation server 6. ACME corporation server sends OK signal 7. After this point, secure communication happens from Client to ACME corporation server. Which means client will encrypt the message with session key, then ACME corporation server decrypts the message with private key (which was created in step A) (ACME corporation is the only entity holds private key, no one in the world will have it) 8. When message is send to Client, only client can decrypt the message because it is sole owner of session key(no one in the world will have the session key) . Can you anyone validate 8th point. I am guessing session key at the client's side key can be used to decrypt the message sent by server Man in the Middle Scenarios If man in the middle sniffs the data packet, then he can't do anything because it is encrypted with session key. And session key is encrypted with public key. Unless he steals the session key in step 5 he can't decrypt the message. However for this to happen, he should also get public key, but even with the public key he can't decrypt the message
@primepearl7057
@primepearl7057 4 жыл бұрын
sir can you describe the authorization in-network and IoT devices
@ptit9x
@ptit9x 4 жыл бұрын
excuseme sir, could you let me know how to generate public key?
@arturgharibkhanyan8196
@arturgharibkhanyan8196 5 жыл бұрын
beast.. thank youuuu
@tppt3987
@tppt3987 5 жыл бұрын
Slow even at 2x. KZbin needs a 3x feature.
@igt1234
@igt1234 5 жыл бұрын
There's an extension for increasing speed. You can use that if on desktop or laptop
@lakpathigugulothu8117
@lakpathigugulothu8117 4 жыл бұрын
x means
@shaikthabasum7360
@shaikthabasum7360 5 жыл бұрын
Can u plzz tell me important question in this subject reply plzz may 6on words SEM start
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
put a mail to askme.selflearning@gmail.com
@praveenjee5488
@praveenjee5488 6 жыл бұрын
Please upload java sessions fast sir
@sudhas647
@sudhas647 4 жыл бұрын
Please sir ..... teaching in Tamil....
@sahilkhatri4561
@sahilkhatri4561 5 жыл бұрын
Videos are too lengthy and plz zoom out your face
@abhayai7823
@abhayai7823 5 жыл бұрын
Your videos r too big and takes lots of time... So try to summarize in less time thy r useless at exam time
@infomagnumitsolutions8555
@infomagnumitsolutions8555 5 жыл бұрын
Please use playback speed which will reduce the time to half the current time.
@sreejasree7427
@sreejasree7427 3 жыл бұрын
Thank you sir
X.509 AUTHENTICATION SERVICE PART 2 - NETWORK SECURITY
21:45
Sundeep Saradhi Kanthety
Рет қаралды 41 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
Introduction to Advanced Encryption Standard (AES)
11:07
Neso Academy
Рет қаралды 240 М.
How does HTTPS work? What's a CA? What's a self-signed Certificate?
11:02
#40 Kerberos - Authentication Protocol, Working with diagram|CNS|
7:01
NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
31:22
Sundeep Saradhi Kanthety
Рет қаралды 196 М.
Digital Certificates: Chain of Trust
16:41
Dave Crabbe
Рет қаралды 298 М.
NETWORK SECURITY - PGP (E-MAIL SECURITY)
23:36
Sundeep Saradhi Kanthety
Рет қаралды 213 М.
PGP in Hindi |  Pretty good privacy in Cryptography| Email Security
21:43
Abhishek Sharma
Рет қаралды 156 М.
NETWORK SECURITY - SECURE ELECTRONIC TRANSACTION(SET) - PART 1
22:53
Sundeep Saradhi Kanthety
Рет қаралды 97 М.
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН