3 - Cryptography Basics - Digital Certificate

Sdílet
Vložit
  • čas přidán 17. 01. 2021
  • In this video you'll learn about Digital Certificate and it's applications

Komentáře • 19

  • @lordofperfection5528
    @lordofperfection5528 Před měsícem +3

    bro you explain it beautifully 😊😊👍👍

  • @edvandromauricio7353
    @edvandromauricio7353 Před 13 dny +1

    good video bro

  • @grjesus9979
    @grjesus9979 Před 2 lety +2

    Simply great! Thanks. I needed to see the bigger picture

  • @charmidoshi_1082
    @charmidoshi_1082 Před rokem +2

    A crystal clear explaination .Thank you!!

  • @TheMato1112
    @TheMato1112 Před rokem +1

    To be honest, this is the best video where I understood why it is happening. Thank you

  • @citizenoftheworldsz9
    @citizenoftheworldsz9 Před rokem +2

    amazingly explained, and brilliant example at the end, thank you!!!!!!!

  • @momi2313
    @momi2313 Před 8 měsíci

    great and highly recommend
    thank you

  • @unemployedcse3514
    @unemployedcse3514 Před 8 měsíci

    Awesome 😍

  • @omnnnooy3267
    @omnnnooy3267 Před rokem

    Wow this is great!

  • @abishekrawat8760
    @abishekrawat8760 Před rokem

    Wow.. thank you 🙏

  • @maidenfreek584
    @maidenfreek584 Před 10 měsíci

    Thank you! You deserve a lot more views.

  • @Reptil714
    @Reptil714 Před 6 měsíci

    Thanks, great video!
    One thing I don't understand though, it is said in the video that the certificate authority generates a hash from Alice's certificate signing request (city, state, country, etc...) then encrypts it with their private key.
    However, it is said that Bob creates a hash of ALL the information on the digital certificate (name of issuer, serial number, etc...). This info is not the same as the one from Alice's certificate signing request.
    So how can Bob get the same hash when it is generated from different info ?

  • @Moii1914
    @Moii1914 Před 6 měsíci

    very good! 🇧🇷

  • @WeGrowAsOne
    @WeGrowAsOne Před rokem +4

    you mentioned one incorrect thing here, Bob can't decrypt Hash it's one way process instead he will calculate the hash on same information that he received from Alice using selected hashing algorithm and compare both the hash, correct me if I'm wrong here

    • @karrouchekarrouche1151
      @karrouchekarrouche1151 Před 7 měsíci +1

      He is right.
      The CA has encrypted the hash with its private key.
      What he meant is Bon is gonna decrypt the hash to compare it to the hash that he gonna independently calculate

  • @hotuankiet7530
    @hotuankiet7530 Před 10 měsíci

    When Alice sent a request to Certificate Authority, did she encrypt it with her private key?

  • @hieuluong3032
    @hieuluong3032 Před 6 měsíci

    7:08

  • @georgetsiklauri
    @georgetsiklauri Před 6 měsíci +2

    00:24 What? You say, this: "If Bob can *decrypt* the message that came from Alice, using Alice's public key, then Bob knows that the message came from Alice." But how would Bob decrypt a message with Alice's public key? maybe you wanted to say, that Bob should encrypt (not decrypt) the message? Unclear. Public keys are shared because the receiver should be able to encrypt the data with that public key, not decrypt. For decryption, private key is there. Then you continue, that Alice encrypts the message with the private key.. man, I think you're using public and private keys really incorrectly here.

    • @mateiivan4416
      @mateiivan4416 Před měsícem

      I think what they are saying here is that if you can decrypt the message with the public key of the sender, then it must have been them who have encrypted it because only they know their private key (which is called signing a message). If someone encrypted the message with your public key and sent it to you to decrypt with your private key, there would be no way to prove that they are who they say they are. So the initial approach must be taken to prove this, but it can be disrupted by an attacker. Thus, certificates must be used.