Digital Signatures

preview_player
Показать описание

---

Connect with us on social! 🌐
Рекомендации по теме
Комментарии
Автор

Finally... a perfect, on-point, explanation for how CA certs are used to validate the source's public asymmetric key. Namely, comparing a decrypted "signature" (hash) using the CA's public key with a hash of the remaining certificate components. Excellent. Thanks.

jjones
Автор

Man this is the exact video I was looking for. Such a simple explanation. Thank you very much sir.

birds_eye
Автор

This is an excellent explanation on how a browser validates authenticity of a certificate. A must see video. I could not find better explanation anywhere else.

sridharadurti
Автор

Simply excellent. In a short 3 mins video, explain digital certificate to its core and better than any other much longer videos out there.

weisanpang
Автор

This is very well explained. I've had problem with one thing only, I didn't hear explicitly mentioned that CA send the signed hash of the message ALONG WITH the message (unhashed, unsigned) itself, so Alice receives the 4 part middle block in video, she calculates hash of message and decrypts signature, than compares hashes of the two.

Grotesque
Автор

I can not understand someone speaking English, but their diagram is enough to understand the process. Congratulations! Thank you!

lucianofdj
Автор

i got a question. alice receives the certificate and with that also the info's like bob id, bob public key and ca info. then she compares the hashed infos with the decripted certificate ?

EDMNATION
Автор

The video answered my questions about the certificate authority topic.

thaidoan
Автор

This is great explanation, clear, accurate!

Unremarkabler
Автор

The Title is a little bit misleading but through the thumbnail i understood that the content of the video was exactly what i was searching for, sir please change the title to something like How Digital Signatures are used with Digital Certificates, this will help many people as your video really explains the key concepts of this, thank you very good job!

Kopellouroui
Автор

Is the certificate encrypted by CA or is it clear text and just the CA signature that is encrypted?

fallofdutee
Автор

A part of the diagram that I found confusing was the attachment of the 'Signed certificate' rectangle at the bottom of the ID, Bob's public key, CA information. An improvement would be to include a separation between the CA information block and the Signed certificate block.

TheEhellru
Автор

The user must compare hashes in the end, but how does the end user know what kind of hash to perform on the original unsigned certificate so that it will match the original hash? Is this information also stored in the unsigned certificate?

deanlhouston
Автор

I thought we were talking about Digital signatures not certificates.

nikhilarora
Автор

is there any pythonproject for this explanation ?

TUBE-bxhm
Автор

Thanks for the video, You explained clearly in 3 minutes

sindhua
Автор

Can I have a question? In all docs I have read the private key is only for decrypting but your demo shows encrypting private key for signature. So what is true ? :-)

palusisko
Автор

What I found confusing, is when you say CA private key and CA public key, do you mean those are Bob's key? What are CA keys?

primavera
Автор

Good and clear explanation with 1 flaw in the last diagram. Public key is used to encrypt and Private key is used to decrypt only as opposed to what is shown in the diagram with CA public/private key. Please let me know if I am wrong. Thanks

shubhamsingla
Автор

public key can be used to decrypt data encrypted by private key and vice versa.

rohit_kaushal