Digital Signatures - Data authenticity and integrity protection

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024

Комментарии • 28

  • @abdelrahmanalaa4738
    @abdelrahmanalaa4738 Год назад +3

    Thanks for your explanations, your videos are knowledgeable and worth to be watched.

  • @ayoubessahraui163
    @ayoubessahraui163 3 месяца назад +1

    Thanks for the great explanation, one more Question: how the reciever knows about hash function that Bob used ?

    • @amna5369
      @amna5369 3 месяца назад +1

      Hash function used is mentioned within digital certificate

  • @ADyMaza
    @ADyMaza Год назад +2

    the last explanation for signature ❤

  • @KRICHAN_Technologies
    @KRICHAN_Technologies 2 года назад +3

    Thank you very much Cantrill for providing important topics and these are very important everywhere so it helped us lot ❤️😊

  • @Sl4ym4tr14
    @Sl4ym4tr14 5 месяцев назад

    Great content, had problems with DNSSEC on my pi-hole which lead me to look up wtf that even does and how it works. Thank you.

  • @datvuong7420
    @datvuong7420 10 месяцев назад +1

    why don't Bob sign the original data, why does he sign the hash of it?

    • @w3w3w3
      @w3w3w3 2 месяца назад

      hash compress the data which is good for many reasons and also its quicker to encrypt hash than huge file... could be couple mb or couple gb etc...

  • @kemisetsotheomonageng6346
    @kemisetsotheomonageng6346 2 года назад +1

    Thank you. You really explain these concepts so well

  • @user-uz5iq6my2k
    @user-uz5iq6my2k 5 месяцев назад

    Thank you for your great content, I was stuck at understanding that, I finally got what's going on

  • @abdullwhabTV
    @abdullwhabTV 3 месяца назад

    Wow this is amazing explanation

  • @udayteja6595
    @udayteja6595 10 месяцев назад

    This video is really very informative.....Thankyou very much.

  • @stifferdoroskevich1809
    @stifferdoroskevich1809 Год назад

    Amazing video Adrian! Thanks for sharing

  • @henriksrenerts6811
    @henriksrenerts6811 8 месяцев назад

    Cant I make fake signature using Bob's public hash?

  • @user-py3mt8lh7t
    @user-py3mt8lh7t 8 месяцев назад

    You are great man thank you so much

  • @nijuyonkadesu
    @nijuyonkadesu Год назад

    Great vids !

  • @adamgryz8097
    @adamgryz8097 Год назад

    Great content

  • @unemployedcse3514
    @unemployedcse3514 Год назад

    Awesome 😍

  • @datvuong7420
    @datvuong7420 10 месяцев назад

    I still don't understand what signing using private key means at 1:30

    • @amna5369
      @amna5369 3 месяца назад +1

      Basically message is hashed through agreed hashing algorithm and further encrypted through private key to form digital signature. Now the message once reached to whoever is decrypted using messaging parties public key. Public key is a part of items within a digital certificate