YoVDO

How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques

Offered By: John Savill's Technical Training via YouTube

Tags

Encryption Courses Cryptography Courses RSA Conference Courses Symmetric Encryption Courses Asymmetric Encryption Courses AES Courses TLS Courses Elliptic Curve Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive deep into the world of encryption with this comprehensive 2-hour 38-minute video tutorial. Explore the fundamentals of encryption, including symmetric and asymmetric encryption methods, TLS handshake processes, and advanced concepts like Diffie-Hellman key exchange and elliptic curve cryptography. Learn about the inner workings of encryption algorithms such as RSA, AES, and SHA. Understand the importance of secure communication protocols, cipher block modes, and the evolution from TLS 1.2 to TLS 1.3. Gain practical insights into how encryption is applied in everyday internet browsing and secure data transmission. Perfect for cybersecurity enthusiasts, IT professionals, and anyone interested in understanding the technical aspects of data protection and secure communication.

Syllabus

- Introduction
- Everything is encrypted!
- Why encrypt?
- Browser "secure"
- Cipher information of a connection
- Pack capture and TCP handshake
- HTTP, TLS and HTTPS
- Cheesecake Factory and TLS 1.2
- Types of encryption - Symmetric
- Enter Modulus
- Asymmetric encryption
- TLS handshake - Client Hello
- Server Hello
- Certificate
- Server Key Exchange
- Server Hello Done
- Client Key Exchange, Change Cipher Spec and Encrypted Handshake
- Server Change Cipher Spec and Encrypted Handshake
- TLS Record Protocol to send data
- How to share a secret
- Why not just use RSA?
- Diffie-Hellman with colors
- Diffie-Hellman with math
- Diffie-Hellman with elliptic curves
- Adding g to itself on a curve
- Curves in a finite field
- Named curves
- How its used
- Pre-master secret to master secret
- Shawn the terrible person
- ECDHE WITH RSA
- Using two very big prime numbers
- Using RSA and a test
- Hash with SHA
- WE HAVE A SHARED SECRET
- Advanced Encryption Standard
- Key scheduler to round keys
- A round
- Multiple rounds and final output
- AES ECB problem
- Cipher Block Chaining
- Counter mode
- Shawn and Tim still a problem
- Galois Counter Mode to save us
- And done!
- TLS 1.3 differences
- Summary and close
Meant to write KPub not KPriv lol


Taught by

John Savill's Technical Training

Related Courses

Applied Cryptography
University of Virginia via Udacity
Introduction to Encryption and Cryptography
Raspberry Pi Foundation via FutureLearn
Information Security - Authentication and Access Control
New York University (NYU) via edX
Practical Encryption and Cryptography Using Python
Pluralsight
CompTIA Network+ (N10-007) Cert Prep: 5 Securing TCP/IP
LinkedIn Learning