RSA use cases: difference between RSA Encryption and Digital Signature

Поделиться
HTML-код
  • Опубликовано: 9 ноя 2024

Комментарии • 12

  • @chandrasekars4870
    @chandrasekars4870 4 года назад

    Nice explanations

  • @StuffOffYouStuff
    @StuffOffYouStuff 4 года назад

    cute. well explained

  • @MrJerwid
    @MrJerwid 3 года назад

    A slide titles is " Digital signatures: How it works". On the same slide later down: sign the message with the hash value e.g. sign(hasj´h value, private key). It it not explained wahr the function sugn is , although that was the purose of this slide according to the title...

  • @yassineouchkir8353
    @yassineouchkir8353 4 года назад

    thank you bro

  • @steelguard
    @steelguard 4 года назад +1

    Alice lookin' rough, bro

  • @farahasgher7092
    @farahasgher7092 3 года назад

    Good explanation, but
    Explain with code like example

    • @anumsheraz4625
      @anumsheraz4625  2 года назад

      Thanks. I've explained with code examples on my next video.

  • @poubellapoubella8063
    @poubellapoubella8063 5 лет назад

    One thing i need clarification on :
    In the very last slide of the video, at the end of the slide, maybe i didn't understood well this passage or maybe something is missing but it is implied that v=verify(h,public key) is identical to the signature of the sender i.e. v=verify(h,public key)=signature ?!
    Then what if i am an ennemy and write my own message and generate a verified value from the hash of my message and the public key of the original sender ? how will the reciever make the difference ?

  • @ShopperPlug
    @ShopperPlug 3 года назад

    1:33 - why the hell is Alice a bald headed dude? lol

  • @cryptos6076
    @cryptos6076 5 лет назад

    Thanks Bro

  • @simonforsberg3757
    @simonforsberg3757 4 года назад +1

    That does not look like an Alice.

  • @gaelileo
    @gaelileo 3 года назад

    Why Alice is bald?