so how Bob would tell is like this; the public key should match with the real Alice's key, otherwise it will be assumed as an intrusion. remember, these algorithms are done by the computer, internet and servers they are not explicitly done by you. so if you want to access a website for example, you(Bob) will type in the URL and enter, it will load and then you access that particular site. so when you press enter, at the backend of the process your computer(Bob's computer) establishes a connection with the server(lets say Alice) via the internet( cyberspace, in this example - a group of people on the internet). so for you (Bob), you have typed in a known URL which is attached to a specific domain name which is attached to the servers IP. since the public key is generated by Alice( the server) which is specific and exclusive to Alice, it would take Tom to clone everything(IPs, domain name, and cipher suits etc) from Alice which is not really possible.
best explanation on TH-cam.. thank you
Finally someone explained this the right way!! And note: the keys are made using RSA encryption if anyone is curious.
Finally someone explained this in a clear way! Thank you! Bowing!
Dead simple and beautifully explained 👏👏
That's a really clear and limpid way of explaining digital signature. My cryptography teacher doesn't even come close at your level of pedagogy ! :)
i was wondering why signatures required encrypting with private key forever. this literally makes so much sense
Fortunately I have an assignment so your video helped me thanks bro
Mind blowing and easy explanation. I am from non cs background but i understood it very clearly. ❤❤❤
Great explanation 👌 keep up the great work. I might not graduate if not because of you
Thank you, that was very helpful…
Great explanation!
Thanks for the explanation really appreciate
Simplified explanation. Thanks
Where is Eve? Also, best explanation video for digital signatures on youtube!
But can public key decrypt the text??
Super
thanks for this video
Thanks
Does anyone know what if Tom claim he is Alice, then generate a pair of keys. How coulb Bob tell if the one who claim herself Alice is actually Tom.
that is where Man in the Middle attack comes in, that is the type of an attack.
so how Bob would tell is like this; the public key should match with the real Alice's key, otherwise it will be assumed as an intrusion. remember, these algorithms are done by the computer, internet and servers they are not explicitly done by you. so if you want to access a website for example, you(Bob) will type in the URL and enter, it will load and then you access that particular site. so when you press enter, at the backend of the process your computer(Bob's computer) establishes a connection with the server(lets say Alice) via the internet( cyberspace, in this example - a group of people on the internet). so for you (Bob), you have typed in a known URL which is attached to a specific domain name which is attached to the servers IP. since the public key is generated by Alice( the server) which is specific and exclusive to Alice, it would take Tom to clone everything(IPs, domain name, and cipher suits etc) from Alice which is not really possible.
This is fucking awesome
lol looks like you took the explanation exactly from microsofts website?
Cheque?
Tom publick D
hi , can i contact you pls ?
best best best