Digital Signatures

Digital Signatures

Udacity

8 лет назад

193,670 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@Grotesque18
@Grotesque18 - 17.01.2024 12:10

This is very well explained. I've had problem with one thing only, I didn't hear explicitly mentioned that CA send the signed hash of the message ALONG WITH the message (unhashed, unsigned) itself, so Alice receives the 4 part middle block in video, she calculates hash of message and decrypts signature, than compares hashes of the two.

Ответить
@zahraaahmed-rd5uv
@zahraaahmed-rd5uv - 17.10.2023 21:22

What would happen if the data sent to B were all encrypted together?

Ответить
@primavera919
@primavera919 - 10.02.2023 13:17

What I found confusing, is when you say CA private key and CA public key, do you mean those are Bob's key? What are CA keys?

Ответить
@FrissOderLassEs
@FrissOderLassEs - 20.12.2022 21:27

Terrible video from start to begining. Talking really fast, only brief explanations, "and so on" is never a good sentence in any lesson, the image is bloated and not accurate. Plus you're hard to listen to. Crap, except for the shallow explanation of the original problem.

Ответить
@silas3463
@silas3463 - 21.09.2022 12:36

great video, thanks!

Ответить
@fallofdutee
@fallofdutee - 26.08.2022 14:07

Is the certificate encrypted by CA or is it clear text and just the CA signature that is encrypted?

Ответить
@deanlhouston
@deanlhouston - 04.08.2022 12:58

The user must compare hashes in the end, but how does the end user know what kind of hash to perform on the original unsigned certificate so that it will match the original hash? Is this information also stored in the unsigned certificate?

Ответить
@weisanpang7173
@weisanpang7173 - 01.03.2022 05:02

Simply excellent. In a short 3 mins video, explain digital certificate to its core and better than any other much longer videos out there.

Ответить
@lazyname4130
@lazyname4130 - 14.02.2022 21:47

thanks, short and clear 👍

Ответить
@TUBE-bx2hm
@TUBE-bx2hm - 28.01.2022 16:54

is there any pythonproject for this explanation ?

Ответить
@rohit_kaushal
@rohit_kaushal - 29.10.2021 08:56

public key can be used to decrypt data encrypted by private key and vice versa.

Ответить
@TheEhellru
@TheEhellru - 13.08.2021 22:54

A part of the diagram that I found confusing was the attachment of the 'Signed certificate' rectangle at the bottom of the ID, Bob's public key, CA information. An improvement would be to include a separation between the CA information block and the Signed certificate block.

Ответить
@otherwize12
@otherwize12 - 28.07.2021 13:42

Easy to understand, great video!

Ответить
@Androcentus
@Androcentus - 09.07.2021 23:19

You missed saying that the Bob's ID and all that was attached to the encrypted message (Alice cannot just """extract""" that info) , that is how Alice can create the hash to the orig messages unsigned. Otherwise you refer to the hash messages obtained by decryption twice!

Ответить
@rosalyna_24
@rosalyna_24 - 25.05.2021 00:32

but how the recepient will verify the signature ??

Ответить
@AntuNeelesh
@AntuNeelesh - 25.03.2021 12:28

thanks for the diagram, it was good

Ответить
@rahulc5343
@rahulc5343 - 28.02.2021 16:35

But to decrypt message attackers need bob's private key(asymmetric type), so they can't extract data right?

Ответить
@mirageman2
@mirageman2 - 12.02.2021 01:47

Thanks, i was always confused about how the certifiacte is verified, but you make this very clear (with the public key by the CA decrypting the signature and then comparing the so revealed hash with the hash you generate from the payload of the certifiacte).

Ответить
@sridharadurti1976
@sridharadurti1976 - 17.01.2021 00:22

This is an excellent explanation on how a browser validates authenticity of a certificate. A must see video. I could not find better explanation anywhere else.

Ответить
@jjones40
@jjones40 - 18.12.2020 01:23

Finally... a perfect, on-point, explanation for how CA certs are used to validate the source's public asymmetric key. Namely, comparing a decrypted "signature" (hash) using the CA's public key with a hash of the remaining certificate components. Excellent. Thanks.

Ответить
@madyaranurahlaida471
@madyaranurahlaida471 - 06.11.2020 07:51

hiddentoolz on lg.. best ever on prvt keys, thanks to those who recommended them❤️😝

Ответить
@user-dr7uo9it3s
@user-dr7uo9it3s - 23.10.2020 09:35

Thank you for your great explanation.

Ответить
@korreyjacobs5565
@korreyjacobs5565 - 11.08.2020 15:01

perfect

Ответить
@mpalagappan5235
@mpalagappan5235 - 17.07.2020 06:42

Short and clear note

Ответить
@maleavitohl5419
@maleavitohl5419 - 14.04.2020 14:37

Pog Champ dude

Ответить
@hammedjamiu4998
@hammedjamiu4998 - 20.03.2020 10:46

The kingz_0689 on ig he’s the best giving keys 🔑🇱🇷🔑🔑

Ответить
@kareemsharawi4778
@kareemsharawi4778 - 13.11.2019 21:02

Nice explanation, got some points though for accuracy:
1- The video needs to be renamed to something that is more relevant to public key certificates
2- CA's private key is COMBINED with the hash code to generate the digital signature, it is NOT used to encrypt the hash code
3- CA's public key is used to EXTRACT the message digest (hash code), it is NOT used to decrypt the digital signature

Ответить
@palusisko
@palusisko - 13.08.2019 15:30

Can I have a question? In all docs I have read the private key is only for decrypting but your demo shows encrypting private key for signature. So what is true ? :-)

Ответить
@talonflynn4462
@talonflynn4462 - 13.08.2019 06:54

This is great explanation, clear, accurate!

Ответить
@manjunathmmp
@manjunathmmp - 05.07.2019 00:36

Change the title to Digital Certificates

Ответить
@bezayitmeles197
@bezayitmeles197 - 29.01.2019 23:06

a little to fast, but still very good!!!

Ответить
@adrianpaxtian7332
@adrianpaxtian7332 - 06.08.2018 07:08

engineer what do you thing of proof of signature protocol in XBY xtrabytes blockchain ecosystem?????

Ответить
@gajabalaji
@gajabalaji - 04.06.2018 10:59

Thanks for the video. One naive question. How Alice would extract the Bob's Id, Public Key and CA information from a signed certificate?

Ответить
@Kopellouroui
@Kopellouroui - 11.05.2018 17:38

The Title is a little bit misleading but through the thumbnail i understood that the content of the video was exactly what i was searching for, sir please change the title to something like How Digital Signatures are used with Digital Certificates, this will help many people as your video really explains the key concepts of this, thank you very good job!

Ответить
@lucianofdj
@lucianofdj - 20.02.2018 19:39

I can not understand someone speaking English, but their diagram is enough to understand the process. Congratulations! Thank you!

Ответить
@sindhua3832
@sindhua3832 - 07.02.2018 23:49

Thanks for the video, You explained clearly in 3 minutes

Ответить
@shubhamsingla2120
@shubhamsingla2120 - 28.12.2017 20:01

Good and clear explanation with 1 flaw in the last diagram. Public key is used to encrypt and Private key is used to decrypt only as opposed to what is shown in the diagram with CA public/private key. Please let me know if I am wrong. Thanks

Ответить
@nikhilarora6043
@nikhilarora6043 - 02.08.2017 07:14

I thought we were talking about Digital signatures not certificates.

Ответить