What is digital signature?

Поделиться
HTML-код
  • Опубликовано: 19 окт 2024
  • Please support my channel by becoming a Sunny Classroom member. Your support is much appreciated.
    / sunnyclassroom
    A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.
    In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.
    Keep in mind, digital signature is not about encrypting document, just like paper-based signature.
    Playlist: Basic Cryptography
    • Private Key Encryption...
    Advanced Cryptography:
    • What is digital signat...
    Please subscribe to my channel!
    Please leave comments or questions!
    Many thanks,
    Sunny Classroom

Комментарии • 707

  • @amosgakwerere266
    @amosgakwerere266 4 года назад +100

    the entire semester i did not understand this but only 5 min i got it, thank you Sunny

  • @Ada-hd3zp
    @Ada-hd3zp 4 года назад +66

    Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +22

      congratulations! I am so glad to hear it.

    • @thkhan
      @thkhan 2 года назад

      share your experience while achieving SSCP

  • @mulimotola44
    @mulimotola44 4 года назад +19

    Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.

    • @kristiyanivanov7414
      @kristiyanivanov7414 4 года назад

      Good to know!

    • @bac7002
      @bac7002 2 года назад

      I was so confused and I was exactly looking for an answer of that question in the comments section. Thank you, you are a legend.

    • @naibeginning5775
      @naibeginning5775 2 года назад

      ruclips.net/video/0F7Z7LXsR0g/видео.html
      Do you have Digital Signature ????

  • @natolgaa
    @natolgaa 2 года назад +11

    I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!

  • @manishashenoy7474
    @manishashenoy7474 4 года назад +9

    You explain this better than anyone, Sunny. We are so blessed that you are on RUclips. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!

  • @faiqarif5765
    @faiqarif5765 6 лет назад +223

    Woah my book fails to explain this in 5 pages, what you did in just a few minutes.

    • @leonardolelisrocha
      @leonardolelisrocha 6 лет назад +4

      The same here, his explanation make the subject very ease.

    • @its_bijay_adhikari
      @its_bijay_adhikari 4 года назад

      exactly!!

    • @nutzndboltz
      @nutzndboltz 4 года назад

      Exactly

    • @matrixlnmi169
      @matrixlnmi169 3 года назад

      @Matias Gatlin Since she is your girlfriends & you know in & out about her , then what made it necessary to hack her account

    • @khalidabdi9537
      @khalidabdi9537 3 года назад

      bro can u send me yr book and help me do my thesis if u don't mind?

  • @psoidonym2389
    @psoidonym2389 3 года назад +5

    Sunny, your explanations are spot on.
    In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things.
    I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding.
    Thank you very much for your work.

  • @axionW
    @axionW 5 лет назад +3

    Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад +2

      I am happy for you and congrats on your new job. I will do my best. Come back to channel sometimes and suggest new topics for me. Congrats again.

    • @axionW
      @axionW 5 лет назад

      @@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!

  • @tylercgarrison
    @tylercgarrison 3 года назад

    interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution..
    Thanks Sunny, you're awesome

  • @abuabdulrahman1871
    @abuabdulrahman1871 4 года назад +1

    I am reading from the book, it took me hour to barely understand, five minutes video goes directly to the point, thanks Sunny!

  • @Wolcik3000
    @Wolcik3000 6 лет назад +1

    you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps

  • @wandjlaye_godwe
    @wandjlaye_godwe 4 года назад +1

    At 4.20, he debunks one of the digest confusion peoples are running into - a digital signature is NOT used to encrypt application data. Great job Sir!

  • @susanmyonghee
    @susanmyonghee 5 лет назад +8

    Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻

  • @bpaulkim
    @bpaulkim 5 лет назад +7

    I love this guy's videos. Simple and clear.

  • @dannuttle9005
    @dannuttle9005 3 года назад

    It's embarrassing how little I understood about this, and remarkable how clear this video makes the subject. Well done.

  • @warrenchen8409
    @warrenchen8409 5 лет назад +1

    You can explain the most complex concepts so that anyone can understand. Thank you very much

  • @prar_shah
    @prar_shah 6 лет назад +9

    After watching tons of videos... finally I was able to understand the concept after watching your video..thanks alot sir

  • @mixupcalledkhichri7752
    @mixupcalledkhichri7752 3 года назад

    today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah ..
    Thanku sunny everything is crystal clear..

  • @kattopeter7280
    @kattopeter7280 Год назад

    You are amongst the best teachers who had in my whole life; you are the best best. GOD Bless you, Sir.👏👏👏👏

  • @navaneeth5341
    @navaneeth5341 Год назад

    It took me several years to understand this simple process. Thanks, Sunny.

  • @omidsupply9550
    @omidsupply9550 Год назад

    It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.

  • @shivakumarshiva5115
    @shivakumarshiva5115 2 года назад +1

    I have understood a lot.tqsm sir.today I have my exam.it helped me a lot

  • @Artificial_Intelligence_AI
    @Artificial_Intelligence_AI 5 лет назад +4

    bob and alice using cryptography techniques again!!! they are amazing lol

  • @roytitas
    @roytitas Год назад

    You make any topic so simple yet clear. Thank you very much Sunny, I have always referred to your videos when in doubt.

  • @saveriomariuzzo320
    @saveriomariuzzo320 2 года назад

    Sunny, I hope you the best cause you are the best teacher on Earth. Thank you!

  • @jjcetece05to09
    @jjcetece05to09 3 года назад

    Mostly i never comment the videos i see, really worth for watching and got full concept in just 5 mins. Really it's useful

  • @SahilRallySuperStar
    @SahilRallySuperStar 6 лет назад

    Would like to appreciate few things
    1. Very nice pace and clear explanation
    2. Using Diagrams
    3. Talking about confusion at last
    4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!

  • @davidr.flores2043
    @davidr.flores2043 4 года назад +1

    Dear Mr. Sunny. You are amazing at explaining things. FANTASTIC job, a million thanks!!!

  • @tkhue3296
    @tkhue3296 4 года назад +1

    This is what our newbie need,
    Im studying Network+ and those materials im using just lead me to a very frustrated situation ,
    but your explination really straight forward and newbie friendly .
    Thanks you Sunny,
    pls keep your channel updating and introducing more ,
    i have subscrbed .

  • @ssambadenis9401
    @ssambadenis9401 3 года назад

    I must thank you sunny for wrapping up the whole topic meant for 1 and half hours in just 5 minutes. It was really educational and useful.

  • @prkhr.kmr.27
    @prkhr.kmr.27 5 лет назад +2

    Your videos make such complex stuff so damn easy to understand!
    Your explanations answer questions which even whole of the web can't.

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад

      Thank you very much for your encouraging words. I will try my best to live up to your kind words.

  • @vidyakrishnan1757
    @vidyakrishnan1757 4 года назад +4

    okay, third video today, I'm officially addicted to your channel :)

  • @yingwang5659
    @yingwang5659 6 лет назад +2

    I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +1

      You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.

    • @yingwang5659
      @yingwang5659 6 лет назад

      Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work.
      The world is better with your contribution💚

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      Many thanks for your encouragement. Best wishes, sunny classroom.

  • @mathewkargarzadeh3158
    @mathewkargarzadeh3158 3 года назад

    Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.

  • @gert-janroodehal7368
    @gert-janroodehal7368 6 лет назад +1

    Clear! Correct! And to the point! Very pleasant and educational to watch.

  • @barrypringle6717
    @barrypringle6717 Год назад

    Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last

  • @notistsimas1837
    @notistsimas1837 4 месяца назад

    this guy is really good at explaining everything

  • @SnoiperTV
    @SnoiperTV 5 лет назад +1

    amazing video, better explained than almost all books that i read about it

  • @diptanshug007
    @diptanshug007 4 года назад +2

    simplest explanation of complex topics salute!

  • @stefr5941
    @stefr5941 10 месяцев назад

    Sunny, you are my favorite. You are making it easier for me to understand things.

  • @Dinesh_Wadhwani
    @Dinesh_Wadhwani 2 года назад

    Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌

  • @TheCodeTinkerer
    @TheCodeTinkerer 6 лет назад +2

    Fantastic short and concise videos descriping very complex concepts ;)
    You got my subscription!

  • @nitinvarun7041
    @nitinvarun7041 2 года назад

    Sunny, this is explained very clear and crisp. And common confusion is best explained. Thank you.

  • @beenarautela
    @beenarautela 6 лет назад +1

    I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)

  • @markanthonypinon4829
    @markanthonypinon4829 5 лет назад

    Professor Messor,David L.Prowse, Darril Gibson and Jason Dion couldn`t break it down like you just did. Thank you.

  • @Daniel_CLopes
    @Daniel_CLopes 6 лет назад

    Mr. Sunny, the contents of your youtube account are valuable. It was nice to find you. Please keep doing what you have been doing.

  • @michaelbenford492
    @michaelbenford492 2 года назад

    Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!

  • @VF5
    @VF5 3 года назад

    Somewhat simple concept, but hard to understand just by reading textbooks. Thanks for this vid.

  • @pierrevuur8003
    @pierrevuur8003 5 лет назад +1

    Very good explanation. Also the last remark about data encryption is very clear.

  • @jaisrisubramani1991
    @jaisrisubramani1991 2 года назад

    Great video which will explain the functionality of digital signature without any complexity

  • @jerichosharman470
    @jerichosharman470 5 лет назад +1

    WOW, what an awesome explanation and diagram........and you anticipate the confusion some can have with the message vs signature encryptian

  • @andrewalonsi
    @andrewalonsi 4 года назад +1

    I bought a class on Udemy teaching this, but you're explaining it way better!

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +1

      Thank you for your time! Check out my other videos please!

    • @andrewalonsi
      @andrewalonsi 4 года назад +1

      @@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]

    • @sunnyclassroom24
      @sunnyclassroom24  4 года назад +1

      @@andrewalonsi You are welcome!

  • @venugopal-kj9mi
    @venugopal-kj9mi 5 лет назад +2

    Simple, clear and very easy to understand. Very effective presentation. Thank you

  • @nikolaborkowski9942
    @nikolaborkowski9942 2 года назад

    OMG! I DON"T BELIEVE THAT I"VE FOUND THE GREATEST EXPLANATION! THANK YOU SO MUCH!

  • @89lethanhtan
    @89lethanhtan 8 дней назад

    There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.

  • @manudeepp5666
    @manudeepp5666 6 лет назад +4

    Good stuff man! You made this concept crystal clear

  • @HectorGonzalez-vp1ss
    @HectorGonzalez-vp1ss 4 года назад +2

    This is amazing, didn't know cryptography was so beautiful

  • @jamesmorgan4019
    @jamesmorgan4019 3 года назад

    Your explanations are incredibly easy

  • @kubraniler
    @kubraniler 4 года назад +1

    It couldn't be more clear. Great explanation.

  • @krshah2008
    @krshah2008 4 года назад +1

    2 hours of my professors lecture could not explain me so easily as a 5 minute video!

  • @riverroad935
    @riverroad935 2 года назад

    A very good, clear, and simple explanation. Thank you very much.

  • @mugume
    @mugume 4 года назад +1

    Thank you so much Sunny for the time you put in creating these awesome educational material. God bless you.

  • @yaminielango7603
    @yaminielango7603 3 года назад +1

    Mr.Sunny I have a question.In Public key Asymmetric method the receiver(ALICE) is the one who has to create keys and share them to Sender correct, in this i see you mention that BOB is sharing both keys, i am bit confused.

  • @TechPoint56
    @TechPoint56 6 лет назад

    Finally understood digital signature after many videos. This is the best .

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      Thanks a lot for your nice comment. I am glad it helped.

  • @mohammadyabroudy2892
    @mohammadyabroudy2892 2 года назад

    Your lessons are more than perfect... thank you from all my heart.
    Keep going on.

  • @dombivliwebsite9181
    @dombivliwebsite9181 4 года назад +1

    almost 100's of video are there in you tube. Your explanation was so great.

  • @tariqaziz6586
    @tariqaziz6586 6 лет назад +2

    I would say an excellent explanation. Neat and clean with visuals

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +1

      Many thanks, Tariq for your watching and leaving comments.

  • @aalampratapbedi7890
    @aalampratapbedi7890 Год назад

    Great video mate. The video covers all the key points and is quite easy to understand.

  • @brandsbrooks
    @brandsbrooks 2 года назад

    Thank you Sunny! This cleared up some confusion I had about this topic, so glad to have found this explanation.

  • @abadullah955
    @abadullah955 5 лет назад +1

    Your way to explain is best till found in youtube , Thank You Sunny Class Room

  • @gozalliirawan3289
    @gozalliirawan3289 4 года назад +1

    Thank you for explaining this. I could understand this clearly after watching your video.

  • @vnsarode
    @vnsarode 5 лет назад +1

    very simply explained! thanks Sunny !

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад

      You are welcome Vikram! And thank you for leaving comments.

  • @joehuallpa3843
    @joehuallpa3843 4 года назад +1

    This guy is good at teaching!

  • @nufufu5558
    @nufufu5558 6 лет назад +1

    Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      thanks for your kind words. Yes, you are correct. A lot of things are happening without user's knowledge.

  • @shankarm2012
    @shankarm2012 5 лет назад +1

    That was an awesome ,simple & vivid explanation !

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад

      Thank you for leaving nice comment.

    • @ranagadhi2963
      @ranagadhi2963 3 года назад

      @@sunnyclassroom24 I've questions, what is your email ?

  • @rafael_2031
    @rafael_2031 5 лет назад +2

    Awesome, well done my friend Sunny! This video will be full recomended to my friends.

    • @sunnyclassroom24
      @sunnyclassroom24  5 лет назад +1

      Thank you very much for your kind words and encouragement. I hope your friends would also like it.

  • @khalidx5541
    @khalidx5541 7 лет назад +42

    One of the few videos that properly explains digital signatures; good stuff..
    Only question I have is at 2.35 you state that bob encrypts using his own private key.
    is this best practice ??
    If bob encrypts using his private key then by design, the decryption key would be public (his own public key).
    Surely you would not want a decryption key to be public... decryption keys must be kept secret...?
    Unless this is the method used for signing...
    I am thinking that Bob should actually encrypt using Alice's public key...and Alice would then decrypt using her own secret private key..

    • @piyushvij
      @piyushvij 7 лет назад +4

      Private key is used for Non-repudiate property so that Bob can't refuse it doesn't send the message to Alice. This is the reason to use Private Key at sender side.

    • @sunnyclassroom24
      @sunnyclassroom24  7 лет назад +83

      Hi, my friend, many thanks for your comment and question. You are correct in terms of public key encryption.
      In this video, Bob uses his private key just for signing the document. The document itself is still in plain text. Thus, as you said, it is not a best practice.
      Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document
      Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key.
      To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document.
      To sign the document (digital signature), the sender generates a pair of keys. He keeps his own private key and the public key is sent to the receiver.
      In this video, we only focus on digital signature. Thus, the document is still in plaintext. I have another video: public key encryption explaining how it works.
      Many thanks again. I hope I could be helpful in explaining two different cases.

    • @pianoshaman2807
      @pianoshaman2807 6 лет назад +4

      Hi, thanks so much for explaining, really helpful. I hope your channel grows fast because it is great!!!.

    • @drbvschandran
      @drbvschandran 5 лет назад +2

      @@sunnyclassroom24 Thank you . Well explained.

    • @ITTom
      @ITTom 5 лет назад +1

      Sunny Classroom ... so in other words, Are you not allowed to use this same pair of keys for encryption and for digital signature ?

  • @paulg6340
    @paulg6340 4 года назад

    The best description of this topic I have found, very helpful, thanks very much!

  • @mgracia942
    @mgracia942 3 года назад

    Really great, concise explanation and was great in combination with your video on Public Key Encryption to wrap my head around this concept better

  • @MR-cs6vo
    @MR-cs6vo 3 года назад

    Hours of lectures this teacher explained the digital signature in 5 minutes. I don't know why im going to college

  • @yagzyalcntas553
    @yagzyalcntas553 3 года назад

    you never ever disappoint. always the best explenation. You pointing out the common confusion also helped a lot.

  • @susanjohnson8337
    @susanjohnson8337 6 лет назад

    Crystal clear now. Many thanks, you are a great teacher.

  • @nairrohit83
    @nairrohit83 5 лет назад +1

    A very precise and simple explanation...thank you!

  • @henrytirla
    @henrytirla 4 года назад

    Very simple and concise explanations thank you very much

  • @matthewdavar
    @matthewdavar 7 лет назад +5

    Thank you Sunny for this vivid explanation . I have two questions: (1) Alice could decrypts Bob's digest . This means anything Bob's encrypts with his private key is not safe because his public key is available to attackers, right? (2) How can we be sure both Bob and and Alice are using the same hash algorithm? a digital certificate?

    • @sunnyclassroom24
      @sunnyclassroom24  7 лет назад +13

      Hi, my friend. Thanks a lot for taking time to ask these two questions. these two questions are excellent because you really touch two very important questions. 1) difference between digital signature and public key encryption; 2) hash algorithm.
      Question 1: Yes, indeed, anyone can get Bob's public key, and can use his public key to verify one fact: the signature is Bob's signature. However, what harms does it cause? An analogy in life: I send you a letter through the US post office, you get my letter and you knows it comes from me simply because you know for sure it is my signature at the end of the letter.
      What you really concern is actually the document itself because the document is still in plain text in my video.
      Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document.
      Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key.
      To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document.
      I hope my answer would be a little bit helpful or cause more confusion.
      2) the second question. It is very technical. I am afraid at this point that I could not be able to explain. There are some common hash algorithms, like MD5, MD6, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Wirlpool, and many others. When mail servers communicate with each other in terms of using digital signature, there must be a mechanism to know what type of hash algorithm is used. The analogy is like meta-data for HTML. The web browser knows what version is used by reading document type.
      I would definitely get back to you once I find the correct answer.
      I would appreciate your questions, which would definitely motivate me to research in this area.

  • @usamazahid1
    @usamazahid1 3 года назад

    wow, beautiful illustrations and explanation....very simple

  • @RN-uo2vo
    @RN-uo2vo 5 лет назад +1

    Thank you for the terrific video. Great job Sunny!

  • @pamp3657
    @pamp3657 5 месяцев назад

    best video in the history of youtube thanks

  • @cybrainx72
    @cybrainx72 2 года назад

    Best explanation for Digital signature!!

  • @ryanwright3965
    @ryanwright3965 4 года назад +1

    This channel is amazing. I subscribed right away!!!

  • @lolokj6848
    @lolokj6848 4 года назад +1

    Thanks. Beautiful and slow explaine made it easy to understand.

  • @pianoshaman2807
    @pianoshaman2807 6 лет назад +2

    Hi, this is really really helpful. I can't tell you how much this video helped me.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад +1

      I am glad it is helpful. Thanks a lot for taking time to leave comment.

  • @michaelmallya5622
    @michaelmallya5622 6 лет назад +1

    Nice one I'm about to get in Information System Security Exam in an hour, I really do appreciate.

  • @Boyarsskiy
    @Boyarsskiy 6 лет назад

    Very nice channel. Clear and short videos - you can mix it for understanding what you want. Thanks!

  • @prabhatbhalla
    @prabhatbhalla 3 года назад

    thanks for explaining this concept in such a concise way.

  • @markganus1085
    @markganus1085 2 года назад +1

    authenticity - the recipient can verify the identity of the sender
    integrity - the recipient is unable to invent or modify a document signed by someone else.
    non-repudiation - the sender can not deny that he signed a document (non-repudiation)

  • @nikitabele9228
    @nikitabele9228 4 года назад

    This guy makes my day..nicely explained ...thanks dude

  • @aishwarysaxena5301
    @aishwarysaxena5301 4 года назад +1

    Sir explained too good my exams are near of final year and this helps😊

  • @miratorimoonlightkim4413
    @miratorimoonlightkim4413 6 лет назад +1

    Very easy to understand, sir. Thank you very much.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      you are welcome

    • @miratorimoonlightkim4413
      @miratorimoonlightkim4413 6 лет назад +1

      Today, I want to clarify my lesson on hash function, and I am now referring another of your video. What school do you teach, sir? I am a freshman in Software Engineering and wanting to be an ethical hacker. Do you teach ethical hacking or do you have any suggestion so that I can improve more in that field? You teach very well, sir. And I am glad to know you.

    • @sunnyclassroom24
      @sunnyclassroom24  6 лет назад

      I am teaching Computer Information Systems with University of Saint Mary, Leavenworth, Kansas. I don't teach ethical hacking. In RUclips or Udemy (paid) there are many lessons about ethical hacking. Lessons are not expensive, normally about $10.

  • @FaizanKhan-dp3sr
    @FaizanKhan-dp3sr 3 года назад

    Extra ordinary Teaching style you have !