Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
You explain this better than anyone, Sunny. We are so blessed that you are on RUclips. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution.. Thanks Sunny, you're awesome
Sunny, your explanations are spot on. In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things. I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding. Thank you very much for your work.
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah .. Thanku sunny everything is crystal clear..
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
Would like to appreciate few things 1. Very nice pace and clear explanation 2. Using Diagrams 3. Talking about confusion at last 4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
This is what our newbie need, Im studying Network+ and those materials im using just lead me to a very frustrated situation , but your explination really straight forward and newbie friendly . Thanks you Sunny, pls keep your channel updating and introducing more , i have subscrbed .
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work. The world is better with your contribution💚
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
Mr.Sunny I have a question.In Public key Asymmetric method the receiver(ALICE) is the one who has to create keys and share them to Sender correct, in this i see you mention that BOB is sharing both keys, i am bit confused.
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
Great video i have a question starting at 2:03, Bob has a key pair and gives Alice the public. In a real life scenario how would Alice intially receive the public key before the plaintext message is sent.
Dear Sir, I watched all your videos.Your explanations are very clear , easy to understand and very short and precise to the point.Please continue making videos as such for beginners to learn complex topics.I wish you touch Microsoft Products such as Azure and latest technologies.Once again, thank you for these excellent videos.Never subscribed on first visit to any channels.But i did for your channel
Encryption is still used. Bob uses his private signing key to encrypt the message he wants to send. But when he sends it, _anyone_ can decrypt that message using Bob's public verification key, which is also available to anyone. So while this encryption does not provide _secrecy,_ it _does_ provide identification, integrity and non repudiation, because only the owner of the private signing key could have sent a signature that is unlockable with his public verification key.
authenticity - the recipient can verify the identity of the sender integrity - the recipient is unable to invent or modify a document signed by someone else. non-repudiation - the sender can not deny that he signed a document (non-repudiation)
How does the receiver decrypt the signature with the sender's public key? I thought the public key only works to encrypt messages who can only be decrypted with the private sender's key(like in a server-client communication)
Hello, At 4:15 you say that Alice will use the same hash algorithm to get the digest, so that she can compare hers with Bob’s. My question is, where does she get the hash algorithm from? Thank you.
The hash algorithm used by the sender has to be known also by receiver, same algorithm must be employed otherwise the receiver will not be able to get the same hash.
the entire semester i did not understand this but only 5 min i got it, thank you Sunny
Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
congratulations! I am so glad to hear it.
share your experience while achieving SSCP
You explain this better than anyone, Sunny. We are so blessed that you are on RUclips. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
Wow, thank you!
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution..
Thanks Sunny, you're awesome
Sunny, your explanations are spot on.
In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things.
I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding.
Thank you very much for your work.
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
Good to know!
I was so confused and I was exactly looking for an answer of that question in the comments section. Thank you, you are a legend.
ruclips.net/video/0F7Z7LXsR0g/видео.html
Do you have Digital Signature ????
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
I am happy for you and congrats on your new job. I will do my best. Come back to channel sometimes and suggest new topics for me. Congrats again.
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
At 4.20, he debunks one of the digest confusion peoples are running into - a digital signature is NOT used to encrypt application data. Great job Sir!
You are welcome !
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah ..
Thanku sunny everything is crystal clear..
Mostly i never comment the videos i see, really worth for watching and got full concept in just 5 mins. Really it's useful
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
I am reading from the book, it took me hour to barely understand, five minutes video goes directly to the point, thanks Sunny!
Great to hear!
It's embarrassing how little I understood about this, and remarkable how clear this video makes the subject. Well done.
Woah my book fails to explain this in 5 pages, what you did in just a few minutes.
The same here, his explanation make the subject very ease.
exactly!!
Exactly
@Matias Gatlin Since she is your girlfriends & you know in & out about her , then what made it necessary to hack her account
bro can u send me yr book and help me do my thesis if u don't mind?
It took me several years to understand this simple process. Thanks, Sunny.
Sunny, I hope you the best cause you are the best teacher on Earth. Thank you!
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
You make any topic so simple yet clear. Thank you very much Sunny, I have always referred to your videos when in doubt.
You are amongst the best teachers who had in my whole life; you are the best best. GOD Bless you, Sir.👏👏👏👏
Really, really amazing way of teaching with just simple and to the point teaching methodology.
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
You can explain the most complex concepts so that anyone can understand. Thank you very much
You are welcome.
Would like to appreciate few things
1. Very nice pace and clear explanation
2. Using Diagrams
3. Talking about confusion at last
4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
I must thank you sunny for wrapping up the whole topic meant for 1 and half hours in just 5 minutes. It was really educational and useful.
I love this guy's videos. Simple and clear.
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
Sunny, you are my favorite. You are making it easier for me to understand things.
bob and alice using cryptography techniques again!!! they are amazing lol
This is what our newbie need,
Im studying Network+ and those materials im using just lead me to a very frustrated situation ,
but your explination really straight forward and newbie friendly .
Thanks you Sunny,
pls keep your channel updating and introducing more ,
i have subscrbed .
Thank you for sub!
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
After watching tons of videos... finally I was able to understand the concept after watching your video..thanks alot sir
You are welcome! I am glad that it helped.
Your videos make such complex stuff so damn easy to understand!
Your explanations answer questions which even whole of the web can't.
Thank you very much for your encouraging words. I will try my best to live up to your kind words.
Dear Mr. Sunny. You are amazing at explaining things. FANTASTIC job, a million thanks!!!
You are very welcome
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
amazing video, better explained than almost all books that i read about it
this guy is really good at explaining everything
Mr. Sunny, the contents of your youtube account are valuable. It was nice to find you. Please keep doing what you have been doing.
Many thanks.
Sunny, this is explained very clear and crisp. And common confusion is best explained. Thank you.
Somewhat simple concept, but hard to understand just by reading textbooks. Thanks for this vid.
OMG! I DON"T BELIEVE THAT I"VE FOUND THE GREATEST EXPLANATION! THANK YOU SO MUCH!
Glad it helped!
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work.
The world is better with your contribution💚
Many thanks for your encouragement. Best wishes, sunny classroom.
Great video which will explain the functionality of digital signature without any complexity
okay, third video today, I'm officially addicted to your channel :)
Thank you very much! I appreciate it!
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
You are welcome! I am glad it helped.
Clear! Correct! And to the point! Very pleasant and educational to watch.
Many thanks for your encouragement.
WOW, what an awesome explanation and diagram........and you anticipate the confusion some can have with the message vs signature encryptian
Thanks a lot.
I bought a class on Udemy teaching this, but you're explaining it way better!
Thank you for your time! Check out my other videos please!
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
@@andrewalonsi You are welcome!
Very good explanation. Also the last remark about data encryption is very clear.
Thanks a lot for your feedback.
Great video mate. The video covers all the key points and is quite easy to understand.
Professor Messor,David L.Prowse, Darril Gibson and Jason Dion couldn`t break it down like you just did. Thank you.
Good stuff man! You made this concept crystal clear
Your explanations are incredibly easy
simplest explanation of complex topics salute!
Thank you for watching!
Finally understood digital signature after many videos. This is the best .
Thanks a lot for your nice comment. I am glad it helped.
Fantastic short and concise videos descriping very complex concepts ;)
You got my subscription!
Many thanks , Casper, for your great comment and your subscription.
Mine as well 😊
Really great, concise explanation and was great in combination with your video on Public Key Encryption to wrap my head around this concept better
2 hours of my professors lecture could not explain me so easily as a 5 minute video!
Your lessons are more than perfect... thank you from all my heart.
Keep going on.
A very good, clear, and simple explanation. Thank you very much.
Thank you Sunny! This cleared up some confusion I had about this topic, so glad to have found this explanation.
It couldn't be more clear. Great explanation.
Thank you!
This is amazing, didn't know cryptography was so beautiful
Thank you for watching!
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
you never ever disappoint. always the best explenation. You pointing out the common confusion also helped a lot.
Simple, clear and very easy to understand. Very effective presentation. Thank you
You are welcome! And thank you for your comment.
thansks alot sunny sir! u made it look so easy;🔥🔥🔥🔥 your videos become very helpful for a-night-before-exams preparations!! 🙂🙂
Mr.Sunny I have a question.In Public key Asymmetric method the receiver(ALICE) is the one who has to create keys and share them to Sender correct, in this i see you mention that BOB is sharing both keys, i am bit confused.
Thank you so much Sunny for the time you put in creating these awesome educational material. God bless you.
My pleasure!
I would say an excellent explanation. Neat and clean with visuals
Many thanks, Tariq for your watching and leaving comments.
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
thanks for your kind words. Yes, you are correct. A lot of things are happening without user's knowledge.
The best description of this topic I have found, very helpful, thanks very much!
almost 100's of video are there in you tube. Your explanation was so great.
120 videos by now.
Extra ordinary Teaching style you have !
Great Teacher Sunny!! Sunny for president !!
Best explanation for Digital signature!!
Your way to explain is best till found in youtube , Thank You Sunny Class Room
You are welcome, Abad.
This guy is good at teaching!
Thank you for watching!
That was an awesome ,simple & vivid explanation !
Thank you for leaving nice comment.
@@sunnyclassroom24 I've questions, what is your email ?
Great video i have a question starting at 2:03, Bob has a key pair and gives Alice the public. In a real life scenario how would Alice intially receive the public key before the plaintext message is sent.
In our real life, our public keys are preinstalled in our major browsers, such as Firefox, Chrome and Edge.
In our real life example 2: through key exchange when you communicate with the server.
wow, beautiful illustrations and explanation....very simple
Thank you for explaining this. I could understand this clearly after watching your video.
Dear Sir,
I watched all your videos.Your explanations are very clear , easy to understand and very short and precise to the point.Please continue making videos as such for beginners to learn complex topics.I wish you touch Microsoft Products such as Azure and latest technologies.Once again, thank you for these excellent videos.Never subscribed on first visit to any channels.But i did for your channel
This guy makes my day..nicely explained ...thanks dude
You are welcome
Encryption is still used. Bob uses his private signing key to encrypt the message he wants to send. But when he sends it, _anyone_ can decrypt that message using Bob's public verification key, which is also available to anyone. So while this encryption does not provide _secrecy,_ it _does_ provide identification, integrity and non repudiation, because only the owner of the private signing key could have sent a signature that is unlockable with his public verification key.
best video in the history of youtube thanks
authenticity - the recipient can verify the identity of the sender
integrity - the recipient is unable to invent or modify a document signed by someone else.
non-repudiation - the sender can not deny that he signed a document (non-repudiation)
very simply explained! thanks Sunny !
You are welcome Vikram! And thank you for leaving comments.
Nice one I'm about to get in Information System Security Exam in an hour, I really do appreciate.
I hope everything goes well.
Awesome, well done my friend Sunny! This video will be full recomended to my friends.
Thank you very much for your kind words and encouragement. I hope your friends would also like it.
Crystal clear now. Many thanks, you are a great teacher.
Very nice channel. Clear and short videos - you can mix it for understanding what you want. Thanks!
How does the receiver decrypt the signature with the sender's public key?
I thought the public key only works to encrypt messages who can only be decrypted with the private sender's key(like in a server-client communication)
Thank you for the terrific video. Great job Sunny!
You are welcome!
Wow... Wow... wow ,, Sunny your are amazing!!!!!!!!!!!!
This channel is amazing. I subscribed right away!!!
The first video, I watched on your channel
Hello,
At 4:15 you say that Alice will use the same hash algorithm to get the digest, so that she can compare hers with Bob’s. My question is, where does she get the hash algorithm from?
Thank you.
The hash algorithm used by the sender has to be known also by receiver, same algorithm must be employed otherwise the receiver will not be able to get the same hash.
Enjoy your videos. Easy to follow and understand