The Story of Digital Signatures and Public Key Infrastructure

  Рет қаралды 26,700

PKIIndia

PKIIndia

Күн бұрын

This movie explains the concepts behind Digital Signatures and the various components of Public Key Infrastructure in layman's terms from the Indian Context.
00:00 History of Signatures
00:39 Properties of Signatures
02:12 Cryptographic Hash Function
03:10 Asymmetric Key Cryptography
04:27 Digital Signature Creation Process
06:39 Non-Repudiation
07:03 Digital Certificates and Trust Model
09:57 Confidentiality / Secrecy
12:56 Applications
13:34 PKI Ecosystem

Пікірлер: 48
@TheAngelina79
@TheAngelina79 5 жыл бұрын
Thank you from Canada! Very, very helpful!!! I've been looking for days for a good explanation of this :)
@coderanger75
@coderanger75 6 жыл бұрын
Best explanation I have seen. Thank you
@deepikashah1922
@deepikashah1922 5 жыл бұрын
This video is a great demonstration of explaining concepts. Amazing job done. Best and most useful video I have found on Cryptographic Functions and their exact usage. Thanks a tonn.
@HazzM
@HazzM 4 жыл бұрын
Excellent explanation and presentation. Thanks
@bb82870
@bb82870 6 жыл бұрын
That s best explained i hv seen. Thanks. It deserves more views and thumbs.
@kebman
@kebman 3 жыл бұрын
Best I've seen so far! Great work man!
@mbadisheila
@mbadisheila 6 жыл бұрын
Best video in explaining digital signatures and PKI.
@MohitKumar-qd8dc
@MohitKumar-qd8dc 5 жыл бұрын
Great explanation...covers all aspects...Great Job!
@16jan2010
@16jan2010 5 жыл бұрын
Best video of its class. Good work!
@manishaarora838
@manishaarora838 5 жыл бұрын
Wonderfully explained 👌
@ankurfbd
@ankurfbd 6 жыл бұрын
Excellent explanation !!!
@MrSeppZ
@MrSeppZ 4 жыл бұрын
Really great explanation
@rajivraghu9857
@rajivraghu9857 5 жыл бұрын
One of the best explanation .. Thanks so much
@WanderingFriar
@WanderingFriar 6 жыл бұрын
Excellent presentation. Book marked and i come back to this frequently to further ground the explanations. Thanks again!
@deepikashah1922
@deepikashah1922 5 жыл бұрын
I do the same!
@jitendrapatel1110
@jitendrapatel1110 6 жыл бұрын
wow,these is the way to explain
@riteshsinghania5
@riteshsinghania5 5 жыл бұрын
Very well explained and presented
@poojabajaj.
@poojabajaj. 6 жыл бұрын
Best video on digital signature
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
Thanks. Please share.
@842Mono
@842Mono 6 жыл бұрын
Wonderful!! Lots of talent! :D It covers lots of core concepts in a very nice flow.
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
Thanks
@sushilparajuli007
@sushilparajuli007 6 жыл бұрын
Very nice and complete explanation... thank you
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
Thanks
@esrayeniaras9292
@esrayeniaras9292 7 жыл бұрын
great explanation!thanks:)
@BalajiRajendran78
@BalajiRajendran78 7 жыл бұрын
Thanks and Welcome.
@raginichaurasia6810
@raginichaurasia6810 7 жыл бұрын
very well explained ..I was preparing PPT on the same ..and was very confused abt the concept ..now i m quit clear..Thank you so much sir..
@BalajiRajendran78
@BalajiRajendran78 7 жыл бұрын
Thanks.
@raginichaurasia6810
@raginichaurasia6810 7 жыл бұрын
sir can I get some implementation details of same....I want to implement it in java.
@BalajiRajendran78
@BalajiRajendran78 7 жыл бұрын
You may check my slides and code snippets available at: pkiindia.in/Download_Presentation_Servlet?id=ppt16
@raginichaurasia6810
@raginichaurasia6810 7 жыл бұрын
Thank You so much Sir ....
@sneha5657
@sneha5657 5 жыл бұрын
to the point
@sdboyd
@sdboyd 6 жыл бұрын
Very nice presentation!
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
Thanks!
@raghuttamarao
@raghuttamarao 7 жыл бұрын
Good stuff!
@BalajiRajendran78
@BalajiRajendran78 7 жыл бұрын
Thanks
@sriharshasomayajula7603
@sriharshasomayajula7603 5 жыл бұрын
Can a public key and private key be same at any possible case?
@sepehrdastafshan1291
@sepehrdastafshan1291 5 жыл бұрын
SICK ACCENT BRO
@praveendvd1
@praveendvd1 5 жыл бұрын
Hi sir, I.Alice signs the message, then encrypts the signed message or ii. Alice encrypts the message and then signs the encrypted message. which of this will be better and why Thank you so much for the explanation
@BalajiRajendran78
@BalajiRajendran78 5 жыл бұрын
Alice signing the message and encrypting the message with receiver's public key is the right way to do. If it is done the other way, then it would be possible for an attacker to strip Alice signature and add his/hers, which will remove the authenticity of the message, and it also means that the receiver can't be sure whether the message has indeed originated from Alice.
@deepeshhadge7983
@deepeshhadge7983 3 жыл бұрын
If i want to verify digitally signed document whom should i approach Signer or certificate authority????
@BalajiRajendran78
@BalajiRajendran78 3 жыл бұрын
You don't have to approach any one. The signer's public key (embedded in a digital certificate) comes with his/her digitally signed document. So you can use that key to verify the document's integrity. Then you can see whether you are able to trust the signer(issuer) of the digital certificate, typically the Certification Authority.
@johng5950
@johng5950 6 жыл бұрын
Amateur here with a question: Is the message normally encrypted prior to the creation of the digital signature? When the message is sent over to the customer, is the video saying that the message and signature are merged together, where you can't tell where the message ends and the signature begins?
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
First the digital signature has to be generated for the message and then encrypted. It cannot be the other way - the reason is that when you send a message which is first encrypted and then signed - an attacker can remove the signature and probably attach his signature - and the receiver may assume that the message has originated from the attacker, rather than from the original sender. (there are few more points also, but they are supplementary). Yes, the message and signature are attached together and sent to the receiver. However, if you look at a signed message / document - let us say a signed XML, Doc or PDF document there is a clear demarcation between the message and the digital signature - so there will be a clear separation between the message and its digital signature despite it being an integrated message or document.
@johng5950
@johng5950 6 жыл бұрын
Thank you for the explanation!
@J.Rahman
@J.Rahman 7 жыл бұрын
Really great explanation. But bad choice of the background score. Anyway, I do not understand how Certifying Authorities can provide non-repudiation. It is not true that authenticity is guaranteed merely by an asymmetric encryption. An impostor can create a key pair pretending to be someone else. One always has to verify that a public key actually belongs to the person who supposedly created the key. Upon successful verification (preferably by meeting in person or by phone), authenticity can be guaranteed by the public key crptography. Alternatively, trusted Certifying Authorities can provide verification of authenticity. For non-repudiation, I think one has to legally force the subscriber to revoke his/her keys on suspicion of compromise or loss of access.
@BalajiRajendran78
@BalajiRajendran78 7 жыл бұрын
Thanks. Here we are referring to 'Non-repudiation' as the inability to disown the key pair. For instance, let us assume that in absence of CA (Certifying Authority) - you and me have mutually agreed upon our individual public keys. Now upon receipt of a particular digitally signed message from me, you act on it, and later I may disown sending you that message - by saying that I am no longer using those pair of keys or someone might have misused my keys and sent it. So this can be overcome by having a common authority (Certifying Authority) whom we both can trust, wherein we both have an obligation to report about change of keys or loss of keys. In this way, CAs have a role in ensuring Non-repudiation. Additionally as you mentioned CAs are also responsible for verification of the authenticity of an entity, before the issue of Certificate.
@WanderingFriar
@WanderingFriar 6 жыл бұрын
Even, "...Upon successful verification (preferably by meeting in person or by phone)" does not assure you that you are meeting the genuine person. All security checks performed by a CA is a more assured way of verifying authenticity. Once the Digital Signature certificate is issued, the sender cannot repudiate a transaction.
@BalajiRajendran78
@BalajiRajendran78 6 жыл бұрын
First part in your reply - "does not assure you that you are meeting the genuine person" - that's the reason why PKI needs the support of Policy & Laws - for example - CA's have the right to revoke certificate if they find an impersonation and even initiate a criminal action against the offender under the laws of the country. Second Part of your reply - "Once the DSC is issued, the sender cannot repudiate a transaction" - as long as the DSC remains valid - and the DSC's validity is controlled by the CA. Therefore CA's play a key role in ensuring non-repudiation
Blockchain Tutorial: Basics to Advanced | Simply Explained
22:04
Introduction to Cryptographic Keys and Certificates
18:06
Paul Turner
Рет қаралды 167 М.
Did you believe it was real? #tiktok
00:25
Анастасия Тарасова
Рет қаралды 53 МЛН
6 - Cryptography Basics - Public Key Infrastructure
16:49
CBTVid
Рет қаралды 4,2 М.
CertMike Explains Digital Signatures
11:11
Mike Chapple
Рет қаралды 12 М.
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 325 М.
Cryptography : What is a Digital Certificate?
32:12
Cyber Hashira
Рет қаралды 2,7 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 107 М.
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 930 М.
PKI Bootcamp - What is a PKI?
10:48
Paul Turner
Рет қаралды 191 М.
Intro to Digital Certificates
21:47
Dave Crabbe
Рет қаралды 426 М.
Digital Signatures and Digital Certificates
11:22
Computer Science
Рет қаралды 176 М.
PKI Implementation
18:06
RadwanoVetch
Рет қаралды 51 М.
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Кинг Комп Shorts
Рет қаралды 1,6 МЛН