Linux

How SSL Certificate Works? – HTTPS Explained



Hey everyone, In this video, We’ll understand how SSL certificates work and how they are helpful in establishing secure …

[ad_2]

source

Related Articles

50 Comments

  1. Why isn't every call encrypted asymmetrically? This way the server won't be storing every client's key to decrypt its requests, and just use its own private key to decrypt the requests.

  2. this isn't very safe as well, the safest is "three pass protocol", however three pass protocol takes 3 times extra time, it sends the data thrice between client and server. To understand this, consider this analogy:
    I took a diamond and put it in an unbreakable box, i put my lock there and send it to you, you cannot open it because you don't have the key, so you put your own 2nd lock into it and send the box back to me, I'll open my 1st lock and take out my lock and send the box back to you, you open the 2nd lock with your key and get the diamond.

  3. Nice video but perhaps one correction at 15:11 min. SIGNATURE = SERVER PUB KEY + LETS ENC PRIVATE KEY. Since LETS ENC keys are asymmetric, only data(server public key) encrypted with LETS ENC private key can be decrypted using LETS ENC public key. So Client(browser) will use LETS ENC public key to decrypt Server certificate signature(which should be server public key) and verify that server is indeed whom he claims to be.

  4. Thanks Piyush for your valuable effort, I think CA signs the CSR with private key not with public key, CAs public key can easily available for Hacker / MMA too, public key of CA can be used for verify the digital signature of Issuance authority

  5. What if hacker intercepts and manipulates both the connection…. sends fake cert to user (both keys fake) + sends the same cert while intercepting the communication between client and cert issuer (saying… hanji ye cert asli hai).

  6. Need more info at 15:20, formula for generating signature: <server pub key+lets enc pub key> encrypted. using which key it is encrypted? answer is lets enc's private key.

    Also, <server pub key+lets enc pub key> is encrypted as is?

    OR

    Hash is generated out of <server pub key+lets enc pub key> and then encrypt it?

  7. Can a man-in-the-middle hacker not fake the certificate as well? They generate two public keys, make their own certificate. Send you their own public key and certificate when you communicate with the server, and then the other public key when you communicate with Let'sEncrypt? This will mean that the certificate signature will match.

  8. wait so why cant the hacker just change the cert signature that’s sent to the client by acting as a proxy to LEPub+HackerPub? Just by Introducing SSL Cert all we have done is send more data the same way we were sending the public key before, but it’s still just data, it can be tampered with in the same way as before.

  9. It is great explanation , but incomplete one
    when an SSL/TLS certificate is created, a chain of certificates is typically established.
    When a client (such as a web browser) connects to a server secured with SSL/TLS, it checks the chain of certificates to ensure that the end-entity certificate (your domain's SSL certificate) can be trusted. This verification involves:
    1. Checking if the SSL certificate is signed by an intermediate certificate.
    2. Checking if the intermediate certificate is signed by a trusted root certificate that is included in the client's trust store (typically maintained by the operating system or browser).

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button