CompTIA Security+ Full Course: Cryptography Use Cases

Поделиться
HTML-код
  • Опубликовано: 27 окт 2024

Комментарии • 16

  • @alynch1245
    @alynch1245 Год назад +2

    Within the first 20 minutes, you completely de-mystified cryptography. Thank you

  • @iSgapetti
    @iSgapetti Год назад

    You are easily one of the best at explaining these really complex concepts. Kudos to you man :)

  • @jamespridmore
    @jamespridmore Год назад +1

    This is great content. Thank you for your time.

  • @meritosteveakashj3163
    @meritosteveakashj3163 14 дней назад

    🎉🎉

  • @gaeldilamh2572
    @gaeldilamh2572 Год назад +2

    First of all . Thank you so much for what you are doing. I must say that I always thought professor Messer’s was the one and the best. But you sir are kind of in a league by yourself.
    You really up there. Honestly in term of explaining concepts for the random guy to understand, you are definitely the best by far. So thank you. I’m studying to right the exam next Thursday. I bought a book on Amazon and I’m watching you mostly and professor Messer’s also . I’m an auto mechanic, and want to transition to cybersecurity for all the benefits we all know:) I’have started the study 2 weeks ago and taking 2 hours a day to study the material..
    Ok enough say,now I have a concern about DIGITAL SIGNATURE :
    I thought that you when it comes to ENCRYPTION and DECRYPTION, it is either a relationship between TWO PUBLIC KEYS pré shared Or ONE PUBLIC AND ONE PRIVATE KEY ,and the PRIVATE ONE being the one used to decrypt.
    Now in this video you saying (talking about Digital Signature) that the receiver will take the Encrypted Hash to decrypt it using his public key…
    I don’t know if I missed something but I’m watching the whole video if it helps me to understand I will delete this message..
    Thank u again

    • @iSgapetti
      @iSgapetti Год назад

      I don't know where you got the concept of asymmetric algorithms having two PUBLIC keys pre-shared. Also, kindly read up on the term "vice-versa". He literally stated in the previous video that you can encrypt with private key, decrypt with public key and VICE-VERSA (this means the other way around - you can encrypt with public key, decrypt with private key). The PRIVATE KEY is NOT ONLY used to decrypt (it can encrypt as well) and the PUBLIC KEY is NOT ONLY used to encrypt (it can decrypt as well).
      Now to answer your question: "Now in this video you saying (talking about Digital Signature) that the receiver will take the Encrypted Hash to decrypt it using his public key…"
      - The receiver will decrypt the encrypted hash using the SENDER's public key.

  • @joesauceda69
    @joesauceda69 9 месяцев назад

    I just wanted to say THANK YOUUUUU sooooo much for taking sooo much of your time to put these videos together for us to learn from. I know you don’t have much to gain from doing all of this for us but super sincerely thank you so so so much!!!

  • @CyberRoundUp
    @CyberRoundUp Год назад

    8:59 I would also add non-repudiation as well because it ensures that the originator of a message (Alice) or transaction cannot deny their involvement or the authenticity of the communication.

  • @yongkahneville1164
    @yongkahneville1164 Год назад +1

    So I’m confused. How will bob decrypt Alice’s digital signature with a public key . You explained in the last video that the public key encrypts messages that can only be decrypted by the private key .

    • @iSgapetti
      @iSgapetti Год назад +1

      Try to rewatch the previous video (Cryptography Explained). Bob should know Alice's public key since it is, obviously, public.
      "Encrypt with private key, decrypt with public key
      Or vice-versa (encrypt with public key, decrypt with private key)"

  • @hrushik10
    @hrushik10 Год назад

    13/41

  • @JustSoBoss
    @JustSoBoss Год назад

    Thanks

  • @MelbourneShorts11
    @MelbourneShorts11 Год назад

    thanks tobey

  • @cyberghost_01
    @cyberghost_01 Год назад +2

    How can be used public Key to decrypt Digital signature if public Key Is used only ti encrypt?

    • @iSgapetti
      @iSgapetti Год назад +1

      Bruh, he literally said in the last video that the public key can also be used to decrypt data.
      "Encrypt with private key, decrypt with public key
      Or vice-versa (encrypt with public key, decrypt with private key)"

    • @kyleharry6758
      @kyleharry6758 8 месяцев назад

      is it still a digital envelope if you use a private key while sending the plaintext and the recipient uses a public key?@@iSgapetti