Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques

John Savill's Technical Training via YouTube

Overview

Dive deep into the world of encryption with this comprehensive 2-hour 38-minute video tutorial. Explore the fundamentals of encryption, including symmetric and asymmetric encryption methods, TLS handshake processes, and advanced concepts like Diffie-Hellman key exchange and elliptic curve cryptography. Learn about the inner workings of encryption algorithms such as RSA, AES, and SHA. Understand the importance of secure communication protocols, cipher block modes, and the evolution from TLS 1.2 to TLS 1.3. Gain practical insights into how encryption is applied in everyday internet browsing and secure data transmission. Perfect for cybersecurity enthusiasts, IT professionals, and anyone interested in understanding the technical aspects of data protection and secure communication.

Syllabus

- Introduction
- Everything is encrypted!
- Why encrypt?
- Browser "secure"
- Cipher information of a connection
- Pack capture and TCP handshake
- HTTP, TLS and HTTPS
- Cheesecake Factory and TLS 1.2
- Types of encryption - Symmetric
- Enter Modulus
- Asymmetric encryption
- TLS handshake - Client Hello
- Server Hello
- Certificate
- Server Key Exchange
- Server Hello Done
- Client Key Exchange, Change Cipher Spec and Encrypted Handshake
- Server Change Cipher Spec and Encrypted Handshake
- TLS Record Protocol to send data
- How to share a secret
- Why not just use RSA?
- Diffie-Hellman with colors
- Diffie-Hellman with math
- Diffie-Hellman with elliptic curves
- Adding g to itself on a curve
- Curves in a finite field
- Named curves
- How its used
- Pre-master secret to master secret
- Shawn the terrible person
- ECDHE WITH RSA
- Using two very big prime numbers
- Using RSA and a test
- Hash with SHA
- WE HAVE A SHARED SECRET
- Advanced Encryption Standard
- Key scheduler to round keys
- A round
- Multiple rounds and final output
- AES ECB problem
- Cipher Block Chaining
- Counter mode
- Shawn and Tim still a problem
- Galois Counter Mode to save us
- And done!
- TLS 1.3 differences
- Summary and close
Meant to write KPub not KPriv lol

Taught by

John Savill's Technical Training

Reviews

Start your review of How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.