No video

Digital Signatures and Digital Certificates

  Рет қаралды 177,607

Computer Science

Computer Science

5 жыл бұрын

This video explains the purpose of digital signatures and how they work. It begins by reviewing encryption and decryption using an asymmetric pair of keys, and then explains the significance of this when it comes to digital signatures, namely that it doesn’t matter which of the key pair is made public and which is kept private. The video then illustrates the digital signing process. Specifically, the creation of a hash value for the document (also known as a digest) using a hash algorithm such as SHA256 (which was created by the National Security Agency). It shows how document digest is then encrypted using the sender’s private key before being attached to the document. When the document is received, the recipient decrypts the digest using the sender’s public key. The recipient also recalculates the hash. If the hash values match, the recipient can be confident that document has not been tampered with in transit. The role of a certification authority is also covered. A certification authority issues its customer with a special file called a digital certificate which binds their public key to identifying information. This video also mentions the importance of digital signatures which it comes to cryptocurrencies. A cryptocurrency such as Bitcoin requires a secure mechanism for updating its decentralised ledger.

Пікірлер: 276
@ramasif9983
@ramasif9983 4 жыл бұрын
This is by far the most simple explanation of the presented concepts - in a way that everyone understands it and from then can move on to the more complicated parts. Excellent.
@kisme01
@kisme01 4 жыл бұрын
this is the only video you need to watch if you want a practical understanding of digital signatures
@seetsamolapo5600
@seetsamolapo5600 Жыл бұрын
Wow! This might be the best video on data integrity and data authentication - digital signatures rely on asymmetric cryptography.
@kadircangulde2322
@kadircangulde2322 2 жыл бұрын
Such an explanation with downgraded complexity, but with an upgraded realization. Exceptionally wonderful.
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you :)KD
@saikrishnasunkam4344
@saikrishnasunkam4344 3 жыл бұрын
This is the single best illustration/explanation of this concept on the internet. Keep making these videos man, you've got talent.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@soamesphares
@soamesphares 4 жыл бұрын
You have talent to explain concepts...Thank you
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You're very kind. Thanks for the comment. :)KD
@reduser77
@reduser77 3 жыл бұрын
2 days on the internet trying to understand this subject , your 11 min video made it , thank you alot !
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Glad to be of service :)KD
@fromdil6470
@fromdil6470 Жыл бұрын
Thank you for simplifying the concept of digital keys and explaining the role of hashing in it. Your explanation has made it easy for anyone to understand these complex theories.
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
You are most welcome :)KD
@3a1Va1
@3a1Va1 Жыл бұрын
Used this video to get my Sec+ a few years back now... Back to refresh myself on this for my SSCP. Awesome video. Thank you so much!
@mostinho7
@mostinho7 4 жыл бұрын
Done thanks 0:15 explaining RSA 1:30 digital signatures: it doesn’t matter what key we encrypt with (public or private) the message can only be decrypted with the other key. A message can be digitally signed by encrypting it with the private key and then others can verify the signature by decrypting with public key. 3:58 digital signature example 5:40 sender hashes the message, encrypts the hash with their private key. Receiver decrypts the hash with the sender’s public key, and if it matches the message then receiver knows message came from sender 7:00 why we need digital certificates on top of digital signatures. Someone could be pretending to be the sender, and digitally signs the message. The receiver has no way of verifying the sender’s identity. Digital certificates is how the receiver can verify that a public key actually belongs to the sender 8:00 how certificate authority works
@ashokantony694
@ashokantony694 5 жыл бұрын
Studying for CCNA Cyberops , the Cisco documentation on this is a complete mess. This video is pure gold , incredibly simple and clear. Thank you sir , keep up the great work . On more subscriber for your great channel :)
@zakariyaal2848
@zakariyaal2848 4 жыл бұрын
Exactly here for the same reason, good luck on you exam.
@morshedulislamriaad6496
@morshedulislamriaad6496 3 жыл бұрын
You deserve an Oscar for that kind of explanation .
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you. I'll start writing my speech. :)KD
@jyoti9273
@jyoti9273 3 жыл бұрын
It's crystal clear the way you explain and demonstrate with animation.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@ITTechTips4You
@ITTechTips4You 2 жыл бұрын
Perfect! At 6:19 I first thought you made a mistake but after finnishing the whole video you carefully explain how a CA works. Brilliant. Thank you.
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
You are very welcome.
@AliShaikh_744
@AliShaikh_744 2 жыл бұрын
I love the narration, the humour, the analogies and the simple and easily understandable format. Thank you!
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
You are most welcome :)KD
@seetsamolapo5600
@seetsamolapo5600 Жыл бұрын
​@@ComputerScienceLessonsthe explanation is phenomenal sir. I wish you could make more videos on cybersecurity topics esp security+. I'd gladly join your patteon
@ShijenN
@ShijenN 3 жыл бұрын
This is the best explanation of digital certificates and digital signature i have come across. Thank you :)
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@vijayjangid8967
@vijayjangid8967 3 жыл бұрын
This channel is underrated!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@billchen4923
@billchen4923 3 жыл бұрын
Amazing teaching. After viewing this video, finally I can understand the concept clearly.
@amir_shayesteh_tabar
@amir_shayesteh_tabar 2 жыл бұрын
10 from 10! so easy to understand, A good lesson for other KZfaqrs talking about Digital Signature!
@vincentadams3807
@vincentadams3807 Жыл бұрын
This video is really nice! However there is one part I can't wrap my head around. From my understanding: 1: Person A types a message 2: Person A generates a hash of the message using sha 3: Person A encrypts the generated hash using their private key 4: Person A appends the encrypted hash to the message as a signature, and sends it to person B 5: Person B receives the message along with the signature 6: Person B decrypts the signature (encrypted hash) using person A's public key 7: Person B runs sha on the message to generate a hash. 8: Person B compares the resulting hash from the message to the hash from decrypting the signature 9: If they are the same, it;s been verified successfully. So, what's the point of the sha layer exactly? Why not simply add the message encrypted with person A's private key as a signature? In both cases only person A's public key would be able to decrypt it so I can't see how running it through sha would make a difference.
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Nice question. One of the key features of a hash algorithm is that it produces a hash value of a fixed size. SHA256 for example will produce a hash value that is always 256 bits long, no matter how big the original message. This ensures that the digital signature is a manageable size, regardless of the document being signed. You might like my series on cryptocurrency which also explains the benefits of hashing. kzfaq.info/sun/PLTd6ceoshprd7UngbhRHMgKXcWz4PIBEe :)KD
@gittesilberglarsen1262
@gittesilberglarsen1262 2 жыл бұрын
wow! that is very well made. direct, clear and no annoying repetitions
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you :)KD
@PumpkinJ36
@PumpkinJ36 3 жыл бұрын
Finally, thank you so much I've been trying to understand this for a while now.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You're most welcome. :)KD
@Jonathan-dy9ju
@Jonathan-dy9ju 5 ай бұрын
THanks so much for this video, Fought hours to understand this
@sabitkondakc9147
@sabitkondakc9147 2 жыл бұрын
fabulous explanation, simple and clear.
@nguyentrananhnguyen7900
@nguyentrananhnguyen7900 4 жыл бұрын
you took 10 minutes to teach me whatever my teacher trying to teach me in 3 hours, damn !!!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Glad to help :)KD
@VishalKumar-hn7mi
@VishalKumar-hn7mi 10 ай бұрын
Thanks for this amazing video, it helped me understand digital signature more better
@petercooper3468
@petercooper3468 3 жыл бұрын
Finally, you explain it crystal clear! Thanks you very much!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You're most welcome. Thanks for commenting :)KD
@VictoriaOtunsha
@VictoriaOtunsha Жыл бұрын
Thank for this breakdown, it gave me a better understanding of the entire concept.
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
You are most welcome :)KD
@aaronstones100
@aaronstones100 3 жыл бұрын
This is by far the best explanation i've ever seen of this. Thanks a lot :D.
@sadafali4516
@sadafali4516 4 жыл бұрын
I cannot thank you enogh for this video. You explained it without extra info Thanks alot 👍👍👍
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You welcome. Thanks for the lovely comment. :)KD
@naveenchandrakumar480
@naveenchandrakumar480 Жыл бұрын
Love this video. 100 out of 10 ( ten, yes ), you deciphered it properly.
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you so much :)KD
@prabhuyou1
@prabhuyou1 3 жыл бұрын
Excellent!! Explained in such a simple way. Thanks!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you too :)KD
@miraj0072004
@miraj0072004 Жыл бұрын
I think I attained Nirvana after watching this! Thank you!!
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
It's been a while since I've done that for anyone. You are very welcome :)KD
@romeo98711
@romeo98711 5 жыл бұрын
What a brilliant work !
@rushedhu
@rushedhu 4 жыл бұрын
Best video about digital certificates ever.
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thank you so much :)KD
@cajuncajun183
@cajuncajun183 2 жыл бұрын
exceptionally clear and easy to understand
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you :)KD
@geoff1121
@geoff1121 4 жыл бұрын
finally, someone who puts it clearly and totally
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thanks for the comment. Really appreciated. :)KD
@hadisoeharto8684
@hadisoeharto8684 4 жыл бұрын
Very good and clear explanation.
@ajay7818
@ajay7818 3 жыл бұрын
Finally I got this concept!!! Thanks!!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Delighted to help - it's actually a brilliantly simple idea isn't it!? :)KD
@kisme01
@kisme01 4 жыл бұрын
i just saw this one video, but this is enough reason to subscribe. whatever you post I'm gonna watch it. damn
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Welcome aboard :)KD
@RaiBilalHaider
@RaiBilalHaider Жыл бұрын
This is best and simplest explanation. Thanks
@yeahright5663
@yeahright5663 Жыл бұрын
This is so lucid. Beautifully explained
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@sandhyachowdhary2511
@sandhyachowdhary2511 3 жыл бұрын
Great job 👍 amazing explanation 👏 thank you so much .
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You're very welcome. 😳 :)KD
@osamaa.h.altameemi5592
@osamaa.h.altameemi5592 4 жыл бұрын
Best explanation ever. Thank you Sir.
@siddharthvishnoi1489
@siddharthvishnoi1489 2 жыл бұрын
Thank you very much for clearing the concept
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
You are most welcome :)KD
@user-bv6bi2sz8r
@user-bv6bi2sz8r 3 жыл бұрын
Really great video! Explained the things clearly.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Delighted to help :)KD
@navneetiyer
@navneetiyer 5 жыл бұрын
Thanks for the video. Keep up the good work 👍
@Yash-Gaikwad
@Yash-Gaikwad 3 ай бұрын
Best explanation ever ❤ thanks bro
@ComputerScienceLessons
@ComputerScienceLessons 3 ай бұрын
Thank you so much :)KD
@charanpreet2211
@charanpreet2211 4 жыл бұрын
Great Explanation! Much appreciated
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You're very welcome :)KD
@d.renewood2657
@d.renewood2657 Жыл бұрын
Best explanation I have seen!😁
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@douglaskaicong131
@douglaskaicong131 3 жыл бұрын
Wts thats just genius 👏 how people come out with these stuff
@sambo7734
@sambo7734 3 жыл бұрын
Thank you for that. The certification authority is the bit missing from most other explanations!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You are very welcome. :)KD
@farahnawafleh9460
@farahnawafleh9460 3 жыл бұрын
That was all I ever needed thank you so much for explaining with that great tone! You made my day :)
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thanks for the complement :)KD
@MunyaMazvimba
@MunyaMazvimba 3 жыл бұрын
simple explanation. all i can say is wow!!!!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@arminfisher4836
@arminfisher4836 2 жыл бұрын
Good freaking job mate, thanks.
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
TY :)KD
@tanvirkazi6889
@tanvirkazi6889 3 жыл бұрын
Such a clear explanation - thank you !
@carmellourens3423
@carmellourens3423 2 жыл бұрын
This is Bob, Bob is builder !!! caught me so off guard ahahhaahah
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
He says he's a builder, but he's really a con artist :)KD
@RiyaTheDragonWarrior
@RiyaTheDragonWarrior 3 жыл бұрын
Wonderful video!! Thanks a lot for great explanation
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You're most welcome. Thanks for the lovely comment. :)KD
@WangaRay317
@WangaRay317 3 жыл бұрын
Thank you so much!!!! This was SOO helpful.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
You are very welcome :)KD
@JossinJax
@JossinJax 4 жыл бұрын
Ugh, this is great thank you so much!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You're welcome. :)KD
@saadtalani2234
@saadtalani2234 4 жыл бұрын
Amazing explanation. Thanks
@Muwahid999
@Muwahid999 3 жыл бұрын
Nice way of explaining through graphics....
@just_shim
@just_shim Жыл бұрын
Amazing explanation TQ
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
You're most welcome :)KD
@abhimanyusinghshekhawat6871
@abhimanyusinghshekhawat6871 2 жыл бұрын
This is really a great explanation, Question: If we talk about a real scenario, A client browser want to access some webpage and send a request, what would be the actual message first time from client and what will be the revert from the server? In the example, The message is the actual document but what would be in the actual scenario? is it certificate itself from the web server?, that's what I can guess.
@ranapratapsingh3416
@ranapratapsingh3416 6 ай бұрын
The presentation is really clean.
@ComputerScienceLessons
@ComputerScienceLessons 5 ай бұрын
Thank you :)KD
@evanstayuka381
@evanstayuka381 2 жыл бұрын
Very well explained
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you :)KD
@basees2000
@basees2000 3 жыл бұрын
fantastic channel i love it
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you. That's music to my ears :)KD
@pats.4268
@pats.4268 3 жыл бұрын
"This is Bob. Bob's a builder" Man/Woman of culture, I see.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Oh yes. I'm currently in talks wit the Teletubbies. :)KD
@ruibozhang3196
@ruibozhang3196 5 жыл бұрын
Very impressive explanation
@0xfaizan
@0xfaizan 3 жыл бұрын
For the past fews months I'm looking for something on cryptography and i found this finally thanks
@shreyashjoshi4188
@shreyashjoshi4188 3 жыл бұрын
Awesome explanation.best video found on this topic
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you.
@jded1346
@jded1346 2 ай бұрын
great explanation. If the message was intended to be confidential, wouldn't Jack want to encrypt the message with Jill's public key?
@minefox6071
@minefox6071 Жыл бұрын
Best video on the topic
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@blessedzaraz6766
@blessedzaraz6766 3 жыл бұрын
Excellent lesson!
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@danym-98
@danym-98 2 жыл бұрын
great explanation
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you. You might like my crypto videos :)KD
@mikespilligan1490
@mikespilligan1490 3 жыл бұрын
Lovely work well done.
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you. Lovin' your name :)KD
@rajkirannatarajan9276
@rajkirannatarajan9276 3 жыл бұрын
Bob looks like the POTUS 45
@user-ux1mz9ox6j
@user-ux1mz9ox6j 3 жыл бұрын
Good Explanation
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@reconarmor99
@reconarmor99 4 жыл бұрын
I'm still unclear on how asymmetric encryption works. It makes sense when you use the public to encrypt and the private key to decrypt. But if A sent a message to B and used the private key to encrypt it and B will use the public key to decrypt it, what would stop C from intercepting the message and using the public key to decrypt it? Or is it a situation where you *can* use the private key to encrypt and the public key to decrypt, but you wouldn't because then anyone with the public key could decrypt it?
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You are correct. The public key is used to encrypt the message and the private key yo decrypt it. It's like me sending you a box with an open padlock, but keeping the key to myself. You could lock something inside the box and send it back to me (locked). Only I have the key. Have you watched this one yet? kzfaq.info/get/bejne/o9CHh7hezbjRqZs.html :)KD
@hvzvrds7565
@hvzvrds7565 4 жыл бұрын
@@ComputerScienceLessons than why does jill use private key to encrypt?
@heliusstha2514
@heliusstha2514 4 жыл бұрын
@@ComputerScienceLessons but you are saying sompletely different thing in the video mate.
@adilhassan9443
@adilhassan9443 4 жыл бұрын
This is Gold!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thanks. I appreciate the comment. :)KD
@marcelorodrigues1683
@marcelorodrigues1683 5 жыл бұрын
Very helpful, thanks a lot !
@zamilmastaliyev6967
@zamilmastaliyev6967 Жыл бұрын
great content. I wonder if it calculates different hash for different data so digital signature is changed everytime on certificates or not ?
@bluerfoot
@bluerfoot 3 жыл бұрын
never having worked with this stuff I really don't understand. jack presents his public key along with the digest and puts it in a digital certificate. Jill trusts this because she trusts the 3rd party that "vouched" for jack. I get that in a very generic sense. but what exactly does jill see when she compares the certificate to whatever she sees when she queries the certification authority?
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Hopefully, nothing. The process is carried out by the web browser in the background. If there's a problem she may see a message saying the websites certificate in invalid. (double click the little padlock in your browser's address bar). :)KD
@badge2204
@badge2204 2 жыл бұрын
this is the easiest explanation , because the author used the stories and pics.
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Glad you like my pics.
@cebrayiltagiyev2439
@cebrayiltagiyev2439 4 жыл бұрын
excellent explanation!!!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thanks for saying so. :)KD
@amanali9501
@amanali9501 Жыл бұрын
Good content 🙂
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@pradeepvc1307
@pradeepvc1307 Жыл бұрын
6:44 What is the use of encrypting the hash value here using BOB Private key and sending, As however it can be decrypted by BOB's public key which is available to everyone You can directly send the hash value or use Gill public key and encrypt and send right?
@rumildaolik4905
@rumildaolik4905 3 жыл бұрын
Amazing explanation :-)
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Thank you :)KD
@tashad200
@tashad200 4 жыл бұрын
outstanding video
@SrRunsis
@SrRunsis 4 жыл бұрын
Excellent video!!!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thx :) KD
@christopherrobbertse3416
@christopherrobbertse3416 Жыл бұрын
great video
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@omarbashir4087
@omarbashir4087 4 жыл бұрын
The research has came to an end
@ajaxSAF
@ajaxSAF 4 жыл бұрын
Fantastic, thank you
@nerd2544
@nerd2544 2 жыл бұрын
sorry to bother you after 2-3 years mate but in the video it's explicitly mentioned multiple times throughout, that the senders and receivers "really do not care if anyone sees the message" because the public key is...well..public [and that they just want to verify each other's identities] what happens if we do care about people snooping then? if A encrypts a secret message with their private key then sends it to B, how can they be sure that no C or D intercepts them and reads A's message instead. (or is secure data transmission a completely different topic and not related to key encryption whatsoever?) or is just the fact that we simply never use our/the sender's private keys to encrypt outgoing messages and that we instead use the receiver's public key instead? ,so in our case A uses B's public key to encrypt his secret message so that B and only B can read it with their private key? (actually I think this is it and I regret asking the stupid stuff above but it'd be nice if someone could verify this info)
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
This is a tricky concept to get your head around if you are new to it. You seem to have got it... If I wanted to send YOU an encrypted message, then you would create the public and private keys, and send me your public key. When I receive your public key, I would use it to encrypt my message, and I would send you the ciphertext. Only YOU possess the matching private key, so only YOU can decrypt the message. This all happens automatically when we use a web browser to connect to a secure website. You may find this interesting... kzfaq.info/get/bejne/o9CHh7hezbjRqZs.html and this... kzfaq.info/get/bejne/mbGHdJuXnN7IfGw.html :)KD
@nerd2544
@nerd2544 2 жыл бұрын
@@ComputerScienceLessons thanks a lot, love your channel, keep it up 👍
@tendaijakutindi4175
@tendaijakutindi4175 9 ай бұрын
Thank you !!!
@ComputerScienceLessons
@ComputerScienceLessons 9 ай бұрын
You are most welcome :)KD
@mahdidelavaran1099
@mahdidelavaran1099 Жыл бұрын
thanks it helps a lot
@ComputerScienceLessons
@ComputerScienceLessons Жыл бұрын
You're welcome :)KD
@FabioSouza-jj7oo
@FabioSouza-jj7oo 4 жыл бұрын
Pretty good, thanks a lot!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
Thank you :)KD
@tomparke2407
@tomparke2407 3 жыл бұрын
1:36 Isn't the public key derived from the private key? If someone has a private key can't they generate the public key themselves?
@ComputerScienceLessons
@ComputerScienceLessons 3 жыл бұрын
Hi Tom. The public and private keys are created together. They are mathematically related, very large, numbers. They are useless without each other and cannot be created independently of each other (without an impractical amount of computation - or a quantum computer). This video should clear up the relationship between the keys... :)KD kzfaq.info/get/bejne/mbGHdJuXnN7IfGw.html
@defkrogeldiz3197
@defkrogeldiz3197 4 жыл бұрын
Very helpful thanks!
@ComputerScienceLessons
@ComputerScienceLessons 4 жыл бұрын
You are welcome. :)KD
@aady69ias
@aady69ias 2 жыл бұрын
very lucid!
@ComputerScienceLessons
@ComputerScienceLessons 2 жыл бұрын
Thank you :)KD
Asymmetric Key Cryptography: The RSA Algorithm by Hand
10:08
Computer Science
Рет қаралды 11 М.
Certificates from Scratch - X.509 Certificates explained
21:50
OneMarcFifty
Рет қаралды 102 М.
Я не голоден
01:00
К-Media
Рет қаралды 10 МЛН
Ouch.. 🤕
00:30
Celine & Michiel
Рет қаралды 33 МЛН
ТЫ С ДРУГОМ В ДЕТСТВЕ😂#shorts
01:00
BATEK_OFFICIAL
Рет қаралды 10 МЛН
Digital Signatures - Data authenticity and integrity protection
9:27
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Рет қаралды 955 М.
Why digital certificate?
7:33
Sunny Classroom
Рет қаралды 273 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 113 М.
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 329 М.
Intro to Digital Certificates
21:47
Dave Crabbe
Рет қаралды 427 М.
3 - Cryptography Basics - Digital Certificate
11:28
CBTVid
Рет қаралды 15 М.
Digital Certificates: Chain of Trust
16:41
Dave Crabbe
Рет қаралды 288 М.
Я не голоден
01:00
К-Media
Рет қаралды 10 МЛН