BEST X509 video I found. It explains the certificate in details AND how it works in PKI! Excellent! Thank you very much.
@faruk3723 жыл бұрын
finally !!!!! i love indian people for their videos
@konkipavankonkipavan52863 жыл бұрын
Nice
@mnihsingh43885 жыл бұрын
Awesome video ND ty sir Kafi help mili😊
@prashanths44552 жыл бұрын
Sir, Thanks for your excellent explanation
@bharathr77173 жыл бұрын
If we are appending hascode to plain text i.e user ID and public key then what we hashcoded?
@sans.creates2 жыл бұрын
Thank you so much!
@deepeshmohan91654 жыл бұрын
Thank you for the great tutorial !!
@anuradharavuri98896 жыл бұрын
Tanq for making this video sir,🤘👍
@mathewkargarzadeh31585 жыл бұрын
Dear Sandeep. Excellent illustration on x.509. appreciated !!
@sk.14953 жыл бұрын
Awesome..!!
@salman805 жыл бұрын
I just started watching your videos, sir thanx a lot, your videos doesnt cover all the topics of Comp Sec 501 but they do cover the topics i am having hard time understanding. Love from Pakistani American. Better than Prof Messer but he is helpful as well.
@chandaneshwarilolabattu31483 жыл бұрын
Hey I have the same feeling
@padmaduddu73575 жыл бұрын
Very nice explanation sir
@saibhashyam3 жыл бұрын
generally people assume that only the data encrypted using public key can be decrypted with private key, but the other way also works fine!!
@sarvmardan2 жыл бұрын
07:01 What is that "some hash algorithm"? And is this hash algorithm independent of "key" ? Sha1 is a potential candidate ?
@suryateja25245 жыл бұрын
Thanks sir(great job).👍😊
@User7999-x3j5 жыл бұрын
Thank you Sir.
@sarvmardan2 жыл бұрын
20:00 Question: Suppose a certificate is of version1, how come it will have a signature generation algorithm field when version1 doesn't contain a signature at all?
@ME-mp3ne4 жыл бұрын
Thank you for your good explanation :D
@entertainmentadda11833 жыл бұрын
Thank you sir! ❤️
@rahulmedidi61846 жыл бұрын
Tnq sir...meru chepenedhi veni alagey velli exam lo ras pass aya...tnq sir 😍😍😍
@leelakhathari35264 жыл бұрын
Sir your vedios are so good to gain knowledge ,please also post vedio on public key infrastructure in CNS
@amc15165 жыл бұрын
God bless you sir
@akibhasan7373 жыл бұрын
How I will check /compare the hash code provided in certificate fields against all the remaining fields.
@jellychrome4 жыл бұрын
Well explained. Question: 9:15. How can anyone with a CA’s public key decrypt something that the CA encrypts using its private key? I thought public keys are only for encryption.
@BornMiner4 жыл бұрын
That is how asymmetric encryption works. Anything encrypted using the private key of a pair can be decrypted using the public key of the same pair.
@almeida.cavalcante4 жыл бұрын
Nice lecture! Great! I'd like to SIGN a PDF using PKCS11JS, what about doing a video about all this concepts on practice? Thankyou
@fathimasolapur60755 жыл бұрын
Thank you sir
@smatilboddu88025 жыл бұрын
That was a awesome explanation sir Thank you sir I will share your videos to all my friends
@sundeepsaradhi5 жыл бұрын
hi that's very nice and thanks for your interest and support towards our channel and keep on following our channel.
@vishals93536 жыл бұрын
Thank you
@pkcombines3 жыл бұрын
Sir digital certificate and X.509 certificate is same or different?????!!
@pjophouseofeducation20355 жыл бұрын
nice sir
@nayagraabi5 жыл бұрын
thank u so much sir
@turkishmaid3 жыл бұрын
Great lecture, bro. One thing missing: what would I have to supply and what will be added by the CA? And: how ill I be authenticated with the CA to prove that I actually am the user named in the X.509 certificate-to-be?
@daisonraj95776 жыл бұрын
Thanks sir
@COOLZZist6 жыл бұрын
A really good explanation on X.509 Certificate, I have a doubt regard the Subject Unique ID and the serial number as both of them will be unique in every certificate, why would having an extra field help?
@nikhilt37555 жыл бұрын
whats use in version1 and 2 when there is no actual signature
@viveksharma-fc6fi4 жыл бұрын
Version1 and 2 Also Contains the signature as well and getting used as well
@nitinmahajan16215 жыл бұрын
i have one confusion related to s public key Suppose there are two users UserA & UserB User A wants to fetch data from user B. So, in this case will userA share its public key with B & B will sign it digitally or B will share its public key with A and will decrypt the signed certificate with that public key
@malemmutum50495 жыл бұрын
"Algorithm used for generating signature"- is it for both the hashing algorithm and encryption algorithm? or the hashing algorithm only? or encryption algorithm only? And how do we verify the certificate in version 1 and 2 if there is no signature? Thanks a lot for the video!
@ShubhamKumar-br1ft4 жыл бұрын
Hye Sir, how signature will be decrypted at the client side if the cert is signed by intermediate CA and not by rootCA directly.
@satish10122 жыл бұрын
Hello All, Kindly verify my understanding. It has been challenging to understood this concept for some time. Now i have put all the points together. Kindly clarify my understanding on this Obtaining Certificate from CA (Taking a fictitious company ACME) (A) ACME corporation generates private and public keys using OpenSSL tool (B) ACME corporation generates CSR by using public key and other information like Company Address , Company details etc. Sends CSR to CA (C) CA verifies CSR and creates signed CERTificate (CERT) by signing with CA's private Key (D) ACME corporation stores signed CERT Communication between Client (browser) and ACME Server 1. Client connects ACME corporation server with https protocol 2. ACME corporation sends the signed CERT to the client 3. Since the Client will have CA's public key of CERT, it should be able to open the certificate and validate if it is indeed issued for ACME corporation. (Note : All the Browser's will have public keys of CAs) 4. Client gets the public key which is inside the cert. 5. Client will create session key and encrypt with public key and sends the encrypted session key to ACME corporation server 6. ACME corporation server sends OK signal 7. After this point, secure communication happens from Client to ACME corporation server. Which means client will encrypt the message with session key, then ACME corporation server decrypts the message with private key (which was created in step A) (ACME corporation is the only entity holds private key, no one in the world will have it) 8. When message is send to Client, only client can decrypt the message because it is sole owner of session key(no one in the world will have the session key) . Can you anyone validate 8th point. I am guessing session key at the client's side key can be used to decrypt the message sent by server Man in the Middle Scenarios If man in the middle sniffs the data packet, then he can't do anything because it is encrypted with session key. And session key is encrypted with public key. Unless he steals the session key in step 5 he can't decrypt the message. However for this to happen, he should also get public key, but even with the public key he can't decrypt the message
@primepearl70574 жыл бұрын
sir can you describe the authorization in-network and IoT devices
@ptit9x4 жыл бұрын
excuseme sir, could you let me know how to generate public key?
@arturgharibkhanyan81965 жыл бұрын
beast.. thank youuuu
@tppt39875 жыл бұрын
Slow even at 2x. KZbin needs a 3x feature.
@igt12345 жыл бұрын
There's an extension for increasing speed. You can use that if on desktop or laptop
@lakpathigugulothu81174 жыл бұрын
x means
@shaikthabasum73605 жыл бұрын
Can u plzz tell me important question in this subject reply plzz may 6on words SEM start
@sundeepsaradhi5 жыл бұрын
put a mail to askme.selflearning@gmail.com
@praveenjee54886 жыл бұрын
Please upload java sessions fast sir
@sudhas6474 жыл бұрын
Please sir ..... teaching in Tamil....
@sahilkhatri45615 жыл бұрын
Videos are too lengthy and plz zoom out your face
@abhayai78235 жыл бұрын
Your videos r too big and takes lots of time... So try to summarize in less time thy r useless at exam time
@infomagnumitsolutions85555 жыл бұрын
Please use playback speed which will reduce the time to half the current time.