Digital Signature Algorithm (DSA) - Cryptography - Practical TLS

  Рет қаралды 63,706

Practical Networking

Practical Networking

2 жыл бұрын

The Digital Signature Algorithm (DSA) is an Asymmetric Encryption algorithm... but it's different from the other Asymmetric Encryption algorithms we've discussed (RSA & DH). DSA has only two functions: Signature Generation and Signature Verification. It cannot do Encryption, it cannot do Decryption, it cannot do a Key Exchange. It's use is purely creating and verifying Signatures, which provides Integrity and Authentication to what is signed.
This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
🔐 More details about the course:
classes.pracnet.net/courses/p...
🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
💬 Join Practical Networking Discord
/ discord
🖧 Want to learn how how data moves through a network?
• Networking Fundamentals
Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100

Пікірлер: 36
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
👉 *More free lessons:* kzfaq.info/sun/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY ✨ *Full course:* pracnet.net/tls 💲 *Coupon Code* for 50% off: youtube50
@VideosfromElle
@VideosfromElle 2 жыл бұрын
I'll be signing up for the class Friday 😀 I have watched so many of your videos, it's the least I can do lol Absolutely confident it's worth every penny!
@lizgm1723
@lizgm1723 7 ай бұрын
Visuals were a perfect complement to explanation. Thank you.
@tarikibouzidene6399
@tarikibouzidene6399 Жыл бұрын
So clear, you are the best trainer ever I follow.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Thank you for the kind words, Tarik. Cheers.
@askaripayalo8191
@askaripayalo8191 Жыл бұрын
Thank you for sharing knowledge.
@rotorfpv4117
@rotorfpv4117 4 ай бұрын
Very informative, thanks
@lherfel
@lherfel Жыл бұрын
thanks, very nice overview
@IliyaDamyanov
@IliyaDamyanov 9 ай бұрын
Very good explanation.
@citizenoftheworldsz9
@citizenoftheworldsz9 Жыл бұрын
simply excellent!
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Thank you =)
@nournote
@nournote 7 ай бұрын
Perfectly summarized
@krishnamohanyerrabilli4040
@krishnamohanyerrabilli4040 Жыл бұрын
Clearly understood thankyou.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
you're welcome, Krishnamohan
@upelister
@upelister Жыл бұрын
Thank you.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
You're welcome, Umut =)
@arunsankpal4219
@arunsankpal4219 2 жыл бұрын
Thank you sir 🙏 🇮🇳
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
You're welcome!
@rafay1708
@rafay1708 2 жыл бұрын
Thanks
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
You're welcome!
@Don-Carillo
@Don-Carillo 2 жыл бұрын
Thanks very much,. it would be good to explain how a certificate in a chain uses the public key of the cert above it in the chain to verify it. I am probably not explaining very well but how it uses it to decyrpyt the signature that has been signed by the CA private key. Hope that makes some sense :)
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
Hey Don. All that is unpacked in the full TLS course. It's on sale now if you want instant access.
@pickle1987
@pickle1987 Жыл бұрын
Hello, can you please do a video about the ed25519 vs rsa? I've heard ed25519 is more secure and fast
@PracticalNetworking
@PracticalNetworking Жыл бұрын
I have plans to one day cover elliptic curves entirely.
@ayradizem2770
@ayradizem2770 2 жыл бұрын
Thank you for the video, we need an exemple where to use this algorithms with practucal, also I will begin to learn how to use GNS3 for to practise my knowledge in network,, can I practise this video in GNS3?? thank you in advance
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
The end user rarely uses the algorithms themselves. But they use software which then make use of the example. For instance, you use a web browser, which makes HTTPS connections... your webbrowser uses the algorithms in the process of creating the HTTPS/SSL connection.
@ayradizem2770
@ayradizem2770 2 жыл бұрын
@@PracticalNetworking thank you for your explain
@Cutrexxx
@Cutrexxx 2 жыл бұрын
can ecdsa also only sinature a massege?
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
Yes. ECDSA is like DSA in so far as what it can be used for. In fact, all the "EC" variants are simply the same core protocols done with Elliptic Curves. More details here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
@admin_e
@admin_e 2 жыл бұрын
👍👍👍
@Liltheo626
@Liltheo626 2 ай бұрын
Okay
@dan5640
@dan5640 Жыл бұрын
why is it called asymmetric encryption if it doesn't actually encrypt?
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Great question =). You're right, Asymmetric Encryption is _not_ the best terminology. I wrote about that here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/ _"some might even hesitate to use the term “Asymmetric Encryption” for these algorithms, and instead elect to use “Asymmetric Cryptosystem” - since again, only one of these algorithms involves actual “encryption”._
@thestudy6875
@thestudy6875 2 ай бұрын
Came to the comments to see if anyone else was scratching their head on this one too!
@fugoogle_was_already_taken
@fugoogle_was_already_taken 2 ай бұрын
It is asymetric cryptography/cryptosystem, not encryption. There are cryptographic capabilities. Some of them are key exchange (like diffie helman), encryption (like rsa) and authentication (like digital signatures, rsa). There are many cryptographic protocols/schemes, but not all of them provide all the cryptographic capabilities. For example, you cannot use diffie helman for encryption. Because its just not possible. You can use it for key exchange, and then use symetric cryptography for encryption, but you cannot encrypt anything with diffie helman.
@Nxtfbrdf
@Nxtfbrdf 3 ай бұрын
I saw its math somewhere else I hoped you'd get into the math part 🥲
TLS / SSL - The complete sequence - Practical TLS
6:15
Practical Networking
Рет қаралды 78 М.
Эффект Карбонаро и нестандартная коробка
01:00
История одного вокалиста
Рет қаралды 10 МЛН
Nastya and SeanDoesMagic
00:16
Nastya
Рет қаралды 31 МЛН
No empty
00:35
Mamasoboliha
Рет қаралды 3,9 МЛН
New model rc bird unboxing and testing
00:10
Ruhul Shorts
Рет қаралды 26 МЛН
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 327 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
What is digital signature?
5:03
Sunny Classroom
Рет қаралды 576 М.
Digital Signature Algorithm (DSA) explained with example - Daniel's Security Academy
24:33
Digital Signature Algorithm (DSA) in Network Security
12:17
Chirag Bhalodia
Рет қаралды 52 М.
AES Explained (Advanced Encryption Standard) - Computerphile
14:14
Computerphile
Рет қаралды 1,2 МЛН
Hashing Algorithms and Security - Computerphile
8:12
Computerphile
Рет қаралды 1,5 МЛН
Я купил первый в своей жизни VR! 🤯
1:00
Вэйми
Рет қаралды 3 МЛН
Сколько реально стоит ПК Величайшего?
0:37
Красиво, но телефон жаль
0:32
Бесполезные Новости
Рет қаралды 1,6 МЛН
BEKMOBILDA Tecno Camon 30 smartfoni🔥🤩 #bekmobil
1:01
Bekmobil shorts
Рет қаралды 2,3 МЛН
Это - iPhone 16 и вот что надо знать...
17:20
Overtake lab
Рет қаралды 134 М.