How End-to-End encryption Works?
31,790
Published 2020-04-14
* Classic Encryption Example 1:00
* End to end encryption 3:25
* Problem with E2E 7:30 Web Trust? Fingerprints/CA (QR whatspp)
🏭 Software Architecture Videos
• Software Architecture
💾 Database Engineering Videos
• Database Engineering
🛰 Network Engineering Videos
• Network Engineering
🏰 Load Balancing and Proxies Videos
• Proxies
🐘 Postgres Videos
• PostgresSQL
🚢Docker
• Docker
🧮 Programming Pattern Videos
• Programming Patterns
🛡 Web Security Videos
• Web Security
🦠 HTTP Videos
• HTTP
🐍 Python Videos
• Python by Example
🔆 Javascript Videos
• Javascript by Example
👾Discord Server discord.gg/CsFbFce
Support me on PayPal
bit.ly/33ENps4
Become a Patreon
www.patreon.com/join/hnasr
Stay Awes
All Comments (21)
-
Great video Hussein. If I may explain this for your audience with some math - · Bob generates a private key number X · Alice generates a private key number Y · There are publicly known numbers A and N provided by the server. · Bob does A raised to X and sends the number to Alice · Alice does A raised to Y and sends the number to Bob · They both raise what the other sent with their own secret key i.e. Bob now has A raised to YX and Alice now has A raised to XY which is the same number. They also mod it with N to get a manageable number between 0 and N. They now have the same secret key without knowing each other's private keys and without the server knowing the final key. The server only knows A and N. The trick is to make X, Y and N sufficiently large to make reverse engineering near impossible.
-
man you're the most backend youtuber in the entirety of YouTube, love your content 👍❤❤👍
-
Even without graphics and illustrations - this was an excellent and clear explanation !
-
You're the best! From daily doubts I have to more deep studying I do I can find some video here on your channel explaining topics with honesty and a great background. Thanks from Rio de Janeiro, Hussein!
-
You look good in groomed beard and I agree that you are the rarest of backend youtuber.
-
The explanation couldn't have been any better... Great job🤝
-
Great contente. The best backend channel 🖤
-
Such a great explanation. Thanks, Hussein!
-
And I really thought WhatsApp works with Asymmetric all the time. Each user has their own private/public key pair. But you made it clear now that it works similarly to TLS 1.3 Diffie Hellman. 👌
-
Buddy your videos are really addictive.
-
You are awesome Hussein! please upload more. Thank you for this video.
-
Excellent explanation, no need for fancy visuals if it makes sense!
-
Great explanation
-
fantastic, so basically double encryption
-
Great explanation. Thank you for your efflorts
-
Great video. Thank you! Btw for persistence do we store that encrypted thingy in the DB directly?
-
Many thanks
-
Very nice
-
That last CA you talked about was DigiNotar....darket diaries made a video about that.
-
cool video)