Great video and thanks for the explanation. Out of curiosity does this process also apply to eSignature platforms e.g. DocuSign or do they work differently?
Mike, Nice video. What would happen if someone accidentally has a public key they used to decrypt your digital signature. What is the Private Key based on ? Your email address?
well explained about digital signatures. One of the best video in this topic
So there is no Confidentality in digital signatures, just Integrity, authentication and Non-repudiation. That helps. Thanks Mike.
if you want confidentiality, you need to encrypt digitally signed Doc with senders public key
The visuals help so much, thank you!
Thank you Mike, I’m preparing for my CISSP and this was very helpful!
You explain things so well
Great explanation
Very helpful 👍
great explanation!!!
agreed. CertMike, i'm gonna look at ALL of your clips
Sir.. i have a question? "8:44" How can or by what method Susen know what hash algorithm i have used ?
Great video and thanks for the explanation. Out of curiosity does this process also apply to eSignature platforms e.g. DocuSign or do they work differently?
Hi Jose, in the sense that you use digital signatures to prove your identity to DocuSign (non-repudiation), basically.
...oo 🎈ookkkk
Great vid
Encrypted MD is the digital signature
Mike, Nice video. What would happen if someone accidentally has a public key they used to decrypt your digital signature. What is the Private Key based on ? Your email address?
Hi, what’s the difference between digital signature and digital certificate ?
Private key vs public key
can you please remove the ad from the videos?
Great explanation