Digital Signature Algorithm (DSA) - Cryptography - Practical TLS

Sdílet
Vložit
  • čas přidán 21. 11. 2021
  • The Digital Signature Algorithm (DSA) is an Asymmetric Encryption algorithm... but it's different from the other Asymmetric Encryption algorithms we've discussed (RSA & DH). DSA has only two functions: Signature Generation and Signature Verification. It cannot do Encryption, it cannot do Decryption, it cannot do a Key Exchange. It's use is purely creating and verifying Signatures, which provides Integrity and Authentication to what is signed.
    This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
    🔐 More details about the course:
    classes.pracnet.net/courses/p...
    🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
    💬 Join Practical Networking Discord
    / discord
    🖧 Want to learn how how data moves through a network?
    • Networking Fundamentals
    Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
    YT100
  • Věda a technologie

Komentáře • 36

  • @PracticalNetworking
    @PracticalNetworking  Před 2 lety +3

    👉 *More free lessons:* czcams.com/play/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html
    ✨ *Full course:* pracnet.net/tls
    💲 *Coupon Code* for 50% off: youtube50

    • @VideosfromElle
      @VideosfromElle Před 2 lety +1

      I'll be signing up for the class Friday 😀 I have watched so many of your videos, it's the least I can do lol Absolutely confident it's worth every penny!

  • @lizgm1723
    @lizgm1723 Před 5 měsíci +1

    Visuals were a perfect complement to explanation. Thank you.

  • @tarikibouzidene6399
    @tarikibouzidene6399 Před rokem +5

    So clear, you are the best trainer ever I follow.

  • @askaripayalo8191
    @askaripayalo8191 Před rokem

    Thank you for sharing knowledge.

  • @rotorfpv4117
    @rotorfpv4117 Před 2 měsíci +1

    Very informative, thanks

  • @IliyaDamyanov
    @IliyaDamyanov Před 7 měsíci

    Very good explanation.

  • @nournote
    @nournote Před 5 měsíci

    Perfectly summarized

  • @lherfel
    @lherfel Před rokem

    thanks, very nice overview

  • @citizenoftheworldsz9
    @citizenoftheworldsz9 Před rokem +1

    simply excellent!

  • @krishnamohanyerrabilli4040

    Clearly understood thankyou.

  • @Don-Carillo
    @Don-Carillo Před 2 lety +1

    Thanks very much,. it would be good to explain how a certificate in a chain uses the public key of the cert above it in the chain to verify it. I am probably not explaining very well but how it uses it to decyrpyt the signature that has been signed by the CA private key. Hope that makes some sense :)

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +2

      Hey Don. All that is unpacked in the full TLS course. It's on sale now if you want instant access.

  • @upelister
    @upelister Před rokem +1

    Thank you.

  • @arunsankpal4219
    @arunsankpal4219 Před 2 lety +2

    Thank you sir 🙏 🇮🇳

  • @ayradizem2770
    @ayradizem2770 Před 2 lety +1

    Thank you for the video, we need an exemple where to use this algorithms with practucal, also I will begin to learn how to use GNS3 for to practise my knowledge in network,, can I practise this video in GNS3?? thank you in advance

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety

      The end user rarely uses the algorithms themselves. But they use software which then make use of the example. For instance, you use a web browser, which makes HTTPS connections... your webbrowser uses the algorithms in the process of creating the HTTPS/SSL connection.

    • @ayradizem2770
      @ayradizem2770 Před 2 lety +1

      @@PracticalNetworking thank you for your explain

  • @pickle1987
    @pickle1987 Před 11 měsíci +1

    Hello, can you please do a video about the ed25519 vs rsa? I've heard ed25519 is more secure and fast

  • @Cutrexxx
    @Cutrexxx Před 2 lety +1

    can ecdsa also only sinature a massege?

    • @PracticalNetworking
      @PracticalNetworking  Před 2 lety +3

      Yes. ECDSA is like DSA in so far as what it can be used for. In fact, all the "EC" variants are simply the same core protocols done with Elliptic Curves. More details here:
      www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

  • @rafay1708
    @rafay1708 Před 2 lety

    Thanks

  • @admin_e
    @admin_e Před 2 lety +1

    👍👍👍

  • @dan5640
    @dan5640 Před rokem +2

    why is it called asymmetric encryption if it doesn't actually encrypt?

    • @PracticalNetworking
      @PracticalNetworking  Před rokem

      Great question =). You're right, Asymmetric Encryption is _not_ the best terminology. I wrote about that here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
      _"some might even hesitate to use the term “Asymmetric Encryption” for these algorithms, and instead elect to use “Asymmetric Cryptosystem” - since again, only one of these algorithms involves actual “encryption”._

    • @thestudy6875
      @thestudy6875 Před 14 dny

      Came to the comments to see if anyone else was scratching their head on this one too!

    • @fugoogle_was_already_taken
      @fugoogle_was_already_taken Před 11 dny

      It is asymetric cryptography/cryptosystem, not encryption. There are cryptographic capabilities. Some of them are key exchange (like diffie helman), encryption (like rsa) and authentication (like digital signatures, rsa). There are many cryptographic protocols/schemes, but not all of them provide all the cryptographic capabilities. For example, you cannot use diffie helman for encryption. Because its just not possible. You can use it for key exchange, and then use symetric cryptography for encryption, but you cannot encrypt anything with diffie helman.

  • @Liltheo626
    @Liltheo626 Před 21 dnem

    Okay

  • @user-mf8nn3tl5w
    @user-mf8nn3tl5w Před měsícem

    I saw its math somewhere else I hoped you'd get into the math part 🥲