3 - Cryptography Basics - Digital Certificate

preview_player
Показать описание
In this video you'll learn about Digital Certificate and it's applications
Рекомендации по теме
Комментарии
Автор

To be honest, this is the best video where I understood why it is happening. Thank you

TheMato
Автор

A crystal clear explaination .Thank you!!

charmidoshi_
Автор

Simply great! Thanks. I needed to see the bigger picture

grjesus
Автор

amazingly explained, and brilliant example at the end, thank

citizenoftheworldsz
Автор

you mentioned one incorrect thing here, Bob can't decrypt Hash it's one way process instead he will calculate the hash on same information that he received from Alice using selected hashing algorithm and compare both the hash, correct me if I'm wrong here

WeGrowAsOne
Автор

Thank you! You deserve a lot more views.

maidenfreek
Автор

great and highly recommend

thank you

momi
Автор

What if Tom asks Certification Authority to create an additional valid certificate and then sends it to Bob?

liamray
Автор

Thanks, great video!

One thing I don't understand though, it is said in the video that the certificate authority generates a hash from Alice's certificate signing request (city, state, country, etc...) then encrypts it with their private key.

However, it is said that Bob creates a hash of ALL the information on the digital certificate (name of issuer, serial number, etc...). This info is not the same as the one from Alice's certificate signing request.

So how can Bob get the same hash when it is generated from different info ?

Reptil
Автор

00:24 What? You say, this: "If Bob can *decrypt* the message that came from Alice, using Alice's public key, then Bob knows that the message came from Alice." But how would Bob decrypt a message with Alice's public key? maybe you wanted to say, that Bob should encrypt (not decrypt) the message? Unclear. Public keys are shared because the receiver should be able to encrypt the data with that public key, not decrypt. For decryption, private key is there. Then you continue, that Alice encrypts the message with the private key.. man, I think you're using public and private keys really incorrectly here.

georgetsiklauri
Автор

When Alice sent a request to Certificate Authority, did she encrypt it with her private key?

hotuankiet