Digital Signatures and Digital Certificates

Sdílet
Vložit
  • čas přidán 7. 04. 2019
  • This video explains the purpose of digital signatures and how they work. It begins by reviewing encryption and decryption using an asymmetric pair of keys, and then explains the significance of this when it comes to digital signatures, namely that it doesn’t matter which of the key pair is made public and which is kept private. The video then illustrates the digital signing process. Specifically, the creation of a hash value for the document (also known as a digest) using a hash algorithm such as SHA256 (which was created by the National Security Agency). It shows how document digest is then encrypted using the sender’s private key before being attached to the document. When the document is received, the recipient decrypts the digest using the sender’s public key. The recipient also recalculates the hash. If the hash values match, the recipient can be confident that document has not been tampered with in transit. The role of a certification authority is also covered. A certification authority issues its customer with a special file called a digital certificate which binds their public key to identifying information. This video also mentions the importance of digital signatures which it comes to cryptocurrencies. A cryptocurrency such as Bitcoin requires a secure mechanism for updating its decentralised ledger.

Komentáře • 275

  • @ramasif9983
    @ramasif9983 Před 4 lety +58

    This is by far the most simple explanation of the presented concepts - in a way that everyone understands it and from then can move on to the more complicated parts. Excellent.

  • @kisme01
    @kisme01 Před 4 lety +6

    this is the only video you need to watch if you want a practical understanding of digital signatures

  • @seetsamolapo5600
    @seetsamolapo5600 Před 10 měsíci +4

    Wow! This might be the best video on data integrity and data authentication
    - digital signatures rely on asymmetric cryptography.

  • @saikrishnasunkam4344
    @saikrishnasunkam4344 Před 3 lety +11

    This is the single best illustration/explanation of this concept on the internet. Keep making these videos man, you've got talent.

  • @kadircangulde2322
    @kadircangulde2322 Před 2 lety +8

    Such an explanation with downgraded complexity, but with an upgraded realization. Exceptionally wonderful.

  • @3a1Va1
    @3a1Va1 Před 10 měsíci +1

    Used this video to get my Sec+ a few years back now... Back to refresh myself on this for my SSCP. Awesome video. Thank you so much!

  • @ashokantony694
    @ashokantony694 Před 4 lety +16

    Studying for CCNA Cyberops , the Cisco documentation on this is a complete mess. This video is pure gold , incredibly simple and clear. Thank you sir , keep up the great work . On more subscriber for your great channel :)

    • @zakariyaal2848
      @zakariyaal2848 Před 4 lety +1

      Exactly here for the same reason, good luck on you exam.

  • @mostinho7
    @mostinho7 Před 4 lety +5

    Done thanks
    0:15 explaining RSA
    1:30 digital signatures: it doesn’t matter what key we encrypt with (public or private) the message can only be decrypted with the other key. A message can be digitally signed by encrypting it with the private key and then others can verify the signature by decrypting with public key.
    3:58 digital signature example
    5:40 sender hashes the message, encrypts the hash with their private key. Receiver decrypts the hash with the sender’s public key, and if it matches the message then receiver knows message came from sender
    7:00 why we need digital certificates on top of digital signatures. Someone could be pretending to be the sender, and digitally signs the message. The receiver has no way of verifying the sender’s identity.
    Digital certificates is how the receiver can verify that a public key actually belongs to the sender
    8:00 how certificate authority works

  • @morshedulislamriaad6496
    @morshedulislamriaad6496 Před 2 lety +3

    You deserve an Oscar for that kind of explanation .

  • @redouanelhammouti968
    @redouanelhammouti968 Před 3 lety +3

    2 days on the internet trying to understand this subject , your 11 min video made it , thank you alot !

  • @AliShaikh_744
    @AliShaikh_744 Před rokem +2

    I love the narration, the humour, the analogies and the simple and easily understandable format. Thank you!

    • @ComputerScienceLessons
      @ComputerScienceLessons  Před rokem

      You are most welcome :)KD

    • @seetsamolapo5600
      @seetsamolapo5600 Před 10 měsíci

      ​@@ComputerScienceLessonsthe explanation is phenomenal sir. I wish you could make more videos on cybersecurity topics esp security+. I'd gladly join your patteon

  • @billchen4923
    @billchen4923 Před 3 lety +4

    Amazing teaching. After viewing this video, finally I can understand the concept clearly.

  • @fromdil6470
    @fromdil6470 Před rokem +3

    Thank you for simplifying the concept of digital keys and explaining the role of hashing in it. Your explanation has made it easy for anyone to understand these complex theories.

  • @ITTechTips4You
    @ITTechTips4You Před 2 lety +2

    Perfect! At 6:19 I first thought you made a mistake but after finnishing the whole video you carefully explain how a CA works. Brilliant. Thank you.

  • @soamesphares
    @soamesphares Před 4 lety +79

    You have talent to explain concepts...Thank you

  • @amir_shayesteh_tabar
    @amir_shayesteh_tabar Před rokem +2

    10 from 10! so easy to understand, A good lesson for other CZcamsrs talking about Digital Signature!

  • @aaronstones100
    @aaronstones100 Před 3 lety +1

    This is by far the best explanation i've ever seen of this. Thanks a lot :D.

  • @jyoti9273
    @jyoti9273 Před 3 lety +2

    It's crystal clear the way you explain and demonstrate with animation.

  • @vijayjangid8967
    @vijayjangid8967 Před 3 lety +6

    This channel is underrated!

  • @romeo98711
    @romeo98711 Před 4 lety +12

    What a brilliant work !

  • @gittesilberglarsen1262
    @gittesilberglarsen1262 Před 2 lety +2

    wow! that is very well made. direct, clear and no annoying repetitions

  • @petercooper3468
    @petercooper3468 Před 3 lety +2

    Finally, you explain it crystal clear! Thanks you very much!

  • @ShijenN
    @ShijenN Před 2 lety +2

    This is the best explanation of digital certificates and digital signature i have come across. Thank you :)

  • @tanvirkazi6889
    @tanvirkazi6889 Před 3 lety +1

    Such a clear explanation - thank you !

  • @CzarnaPorz3czka
    @CzarnaPorz3czka Před 2 měsíci

    thanks a lot for the explanation! I finally I understand all the topics mentioned in the video. Big thanks!

  • @navneetiyer
    @navneetiyer Před 5 lety +4

    Thanks for the video. Keep up the good work 👍

  • @miraj0072004
    @miraj0072004 Před rokem +1

    I think I attained Nirvana after watching this!
    Thank you!!

  • @kisme01
    @kisme01 Před 4 lety +1

    i just saw this one video, but this is enough reason to subscribe. whatever you post I'm gonna watch it. damn

  • @PumpkinJ36
    @PumpkinJ36 Před 3 lety +3

    Finally, thank you so much I've been trying to understand this for a while now.

  • @Jonathan-dy9ju
    @Jonathan-dy9ju Před 2 měsíci

    THanks so much for this video, Fought hours to understand this

  • @osamaa.h.altameemi5592
    @osamaa.h.altameemi5592 Před 4 lety +2

    Best explanation ever. Thank you Sir.

  • @prabhuyou1
    @prabhuyou1 Před 3 lety +2

    Excellent!! Explained in such a simple way. Thanks!

  • @geoff1121
    @geoff1121 Před 4 lety +1

    finally, someone who puts it clearly and totally

  • @sadafali4516
    @sadafali4516 Před 4 lety +3

    I cannot thank you enogh for this video.
    You explained it without extra info
    Thanks alot 👍👍👍

  • @VictoriaOtunsha
    @VictoriaOtunsha Před rokem +2

    Thank for this breakdown, it gave me a better understanding of the entire concept.

  • @nguyentrananhnguyen7900
    @nguyentrananhnguyen7900 Před 3 lety +2

    you took 10 minutes to teach me whatever my teacher trying to teach me in 3 hours, damn !!!

  • @yeahright5663
    @yeahright5663 Před rokem +1

    This is so lucid. Beautifully explained

  • @vincentadams3807
    @vincentadams3807 Před 9 měsíci +3

    This video is really nice! However there is one part I can't wrap my head around. From my understanding:
    1: Person A types a message
    2: Person A generates a hash of the message using sha
    3: Person A encrypts the generated hash using their private key
    4: Person A appends the encrypted hash to the message as a signature, and sends it to person B
    5: Person B receives the message along with the signature
    6: Person B decrypts the signature (encrypted hash) using person A's public key
    7: Person B runs sha on the message to generate a hash.
    8: Person B compares the resulting hash from the message to the hash from decrypting the signature
    9: If they are the same, it;s been verified successfully.
    So, what's the point of the sha layer exactly? Why not simply add the message encrypted with person A's private key as a signature? In both cases only person A's public key would be able to decrypt it so I can't see how running it through sha would make a difference.

    • @ComputerScienceLessons
      @ComputerScienceLessons  Před 9 měsíci +1

      Nice question. One of the key features of a hash algorithm is that it produces a hash value of a fixed size. SHA256 for example will produce a hash value that is always 256 bits long, no matter how big the original message. This ensures that the digital signature is a manageable size, regardless of the document being signed. You might like my series on cryptocurrency which also explains the benefits of hashing.
      czcams.com/play/PLTd6ceoshprd7UngbhRHMgKXcWz4PIBEe.html
      :)KD

  • @cajuncajun183
    @cajuncajun183 Před 2 lety +2

    exceptionally clear and easy to understand

  • @rushedhu
    @rushedhu Před 3 lety +1

    Best video about digital certificates ever.

  • @RaiBilalHaider
    @RaiBilalHaider Před rokem

    This is best and simplest explanation. Thanks

  • @charanpreet2211
    @charanpreet2211 Před 3 lety +3

    Great Explanation! Much appreciated

  • @marcelorodrigues1683
    @marcelorodrigues1683 Před 5 lety +1

    Very helpful, thanks a lot !

  • @ruibozhang3196
    @ruibozhang3196 Před 5 lety +1

    Very impressive explanation

  • @user-bv6bi2sz8r
    @user-bv6bi2sz8r Před 3 lety +2

    Really great video! Explained the things clearly.

  • @naveenchandrakumar480
    @naveenchandrakumar480 Před rokem +1

    Love this video. 100 out of 10 ( ten, yes ), you deciphered it properly.

  • @sabitkondakc9147
    @sabitkondakc9147 Před 2 lety +1

    fabulous explanation, simple and clear.

  • @ajay7818
    @ajay7818 Před 3 lety +1

    Finally I got this concept!!! Thanks!!

  • @sambo7734
    @sambo7734 Před 3 lety +1

    Thank you for that. The certification authority is the bit missing from most other explanations!

  • @zamilmastaliyev6967
    @zamilmastaliyev6967 Před 11 měsíci +1

    great content. I wonder if it calculates different hash for different data so digital signature is changed everytime on certificates or not ?

  • @siddharthvishnoi1489
    @siddharthvishnoi1489 Před rokem +1

    Thank you very much for clearing the concept

  • @sandhyachowdhary2511
    @sandhyachowdhary2511 Před 2 lety +2

    Great job 👍 amazing explanation 👏 thank you so much .

  • @douglaskaicong131
    @douglaskaicong131 Před 3 lety +1

    Wts thats just genius 👏 how people come out with these stuff

  • @saadtalani2234
    @saadtalani2234 Před 4 lety +1

    Amazing explanation. Thanks

  • @JossinJax
    @JossinJax Před 3 lety +2

    Ugh, this is great thank you so much!

  • @WangaRay317
    @WangaRay317 Před 3 lety +1

    Thank you so much!!!! This was SOO helpful.

  • @farahnawafleh9460
    @farahnawafleh9460 Před 3 lety +3

    That was all I ever needed thank you so much for explaining with that great tone!
    You made my day :)

  • @abhimanyusinghshekhawat6871

    This is really a great explanation, Question: If we talk about a real scenario, A client browser want to access some webpage and send a request, what would be the actual message first time from client and what will be the revert from the server?
    In the example, The message is the actual document but what would be in the actual scenario? is it certificate itself from the web server?, that's what I can guess.

  • @VishalKumar-hn7mi
    @VishalKumar-hn7mi Před 7 měsíci +1

    Thanks for this amazing video, it helped me understand digital signature more better

  • @Muwahid999
    @Muwahid999 Před 3 lety

    Nice way of explaining through graphics....

  • @MunyaMazvimba
    @MunyaMazvimba Před 3 lety +1

    simple explanation. all i can say is wow!!!!

  • @RiyaTheDragonWarrior
    @RiyaTheDragonWarrior Před 3 lety +1

    Wonderful video!! Thanks a lot for great explanation

  • @omarbashir4087
    @omarbashir4087 Před 4 lety +1

    The research has came to an end

  • @hadisoeharto8684
    @hadisoeharto8684 Před 4 lety +2

    Very good and clear explanation.

  • @Yash-Gaikwad
    @Yash-Gaikwad Před 15 dny +1

    Best explanation ever ❤ thanks bro

  • @arminfisher4836
    @arminfisher4836 Před 2 lety +1

    Good freaking job mate, thanks.

  • @shreyashjoshi4188
    @shreyashjoshi4188 Před 3 lety

    Awesome explanation.best video found on this topic

  • @minefox6071
    @minefox6071 Před rokem

    Best video on the topic

  • @ajaxSAF
    @ajaxSAF Před 4 lety +1

    Fantastic, thank you

  • @adilhassan9443
    @adilhassan9443 Před 4 lety +1

    This is Gold!

  • @pradeepvc1307
    @pradeepvc1307 Před 9 měsíci

    6:44 What is the use of encrypting the hash value here using BOB Private key and sending, As however it can be decrypted by BOB's public key which is available to everyone
    You can directly send the hash value or use Gill public key and encrypt and send right?

  • @SrRunsis
    @SrRunsis Před 4 lety +1

    Excellent video!!!

  • @blessedzaraz6766
    @blessedzaraz6766 Před 3 lety +1

    Excellent lesson!

  • @tashad200
    @tashad200 Před 4 lety +1

    outstanding video

  • @cebrayiltagiyev2439
    @cebrayiltagiyev2439 Před 4 lety +1

    excellent explanation!!!

  • @marcello4258
    @marcello4258 Před 3 lety

    so we use the same private key to encrypt data as well as to sign or better use different pairs?

  • @rajkirannatarajan9276
    @rajkirannatarajan9276 Před 3 lety +2

    Bob looks like the POTUS 45

  • @d.renewood2657
    @d.renewood2657 Před rokem +1

    Best explanation I have seen!😁

  • @carmellourens3423
    @carmellourens3423 Před rokem +1

    This is Bob, Bob is builder !!! caught me so off guard ahahhaahah

  • @0xfaizan
    @0xfaizan Před 3 lety

    For the past fews months I'm looking for something on cryptography and i found this finally thanks

  • @ranapratapsingh3416
    @ranapratapsingh3416 Před 3 měsíci +1

    The presentation is really clean.

  • @defkrogeldiz3197
    @defkrogeldiz3197 Před 4 lety +1

    Very helpful thanks!

  • @mikespilligan1490
    @mikespilligan1490 Před 3 lety +1

    Lovely work well done.

  • @FabioSouza-jj7oo
    @FabioSouza-jj7oo Před 3 lety +1

    Pretty good, thanks a lot!

  • @pats.4268
    @pats.4268 Před 3 lety +10

    "This is Bob. Bob's a builder"
    Man/Woman of culture, I see.

  • @user-wy9xi6gh9w
    @user-wy9xi6gh9w Před 2 lety

    if someone was in the middle of a digital signature between person a and b couldnt they(person m) hash the email/text and sign it with their own key and send that to person b. Then when person b sends an email back to a, person m can hash the email and send a resigned version back to a?

  • @just_shim
    @just_shim Před rokem +1

    Amazing explanation TQ

  • @rumildaolik4905
    @rumildaolik4905 Před 3 lety +1

    Amazing explanation :-)

  • @raymeiers7949
    @raymeiers7949 Před 3 lety

    Is the Digital Certificate embedded in the document that is being sent or attached to the email message with the document? What prevents a bad guy from obtaining a copy of someone else's digital certificate and using it to pass himself off as the rightful owner of the digital certificate?

  • @basees2000
    @basees2000 Před 3 lety +1

    fantastic channel i love it

  • @tendaijakutindi4175
    @tendaijakutindi4175 Před 7 měsíci +1

    Thank you !!!

  • @alksdng97834y
    @alksdng97834y Před rokem

    thank you!

  • @evanstayuka381
    @evanstayuka381 Před rokem +1

    Very well explained

  • @badge2204
    @badge2204 Před 2 lety +1

    this is the easiest explanation , because the author used the stories and pics.

  • @danym-98
    @danym-98 Před rokem +1

    great explanation

  • @roasted_guava5706
    @roasted_guava5706 Před 3 lety

    If the public key has the algorithm to encrypt a message if someone has the same public key can't he reverse engineer it and decrypt it?

  • @m_t_t_
    @m_t_t_ Před 2 lety

    Does Jill contact the certificate authority to make sure the public key on the certificate (that is sent to her by jack) is the same as the one in the certificate authorities database? If not, surely the digital certificate could just be ‘forged’

    • @urssaf343
      @urssaf343 Před 2 lety

      the certificate is signed by the CA. if the signature isn't valid it's forged

  • @wwolfram33
    @wwolfram33 Před rokem +1

    @6:12 If How does Jill know that she cannot decrypt Jacks signature with his Public Key? Does the attempted decryption show a 'fail' message or code?

    • @ComputerScienceLessons
      @ComputerScienceLessons  Před rokem +1

      This functionality is built into software such as a web browser. Jill will get a message like 'could not logon' or 'transaction failed' depending on what she is trying to do. :)KD

    • @wwolfram33
      @wwolfram33 Před rokem

      @@ComputerScienceLessons Thanks, this video was helpful!

  • @user-ux1mz9ox6j
    @user-ux1mz9ox6j Před 3 lety +1

    Good Explanation

  • @mahdidelavaran1099
    @mahdidelavaran1099 Před rokem +1

    thanks it helps a lot