Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

แชร์
ฝัง
  • เผยแพร่เมื่อ 24 พ.ย. 2024

ความคิดเห็น • 19

  • @leonardoaguilarvaldez4429
    @leonardoaguilarvaldez4429 11 หลายเดือนก่อน +27

    Thank you Professor Messer! I passed my A+ now hoping to pass my Security + thanks to you!

    • @thelonesalt1473
      @thelonesalt1473 10 หลายเดือนก่อน +7

      how did you do in the Security+ exam ?

    • @vstrxl
      @vstrxl 7 หลายเดือนก่อน +1

      Trying again - How’d it go?

  • @armymark18
    @armymark18 2 หลายเดือนก่อน

    Thank you Prof Messer! You really help these concepts make sense and me much more comfortable with my learning pace!

  • @pree76
    @pree76 2 หลายเดือนก่อน +8

    "We refer to this extra information as ASSAULT" didn't know professor messer was built like that

    • @Heyimjak
      @Heyimjak 2 หลายเดือนก่อน +4

      He doesn't Messer around.

  • @ArtistFormallyKnownasMC
    @ArtistFormallyKnownasMC 4 หลายเดือนก่อน +8

    Hash yum haha
    I always appreciate the humor in your clipart selections.

  • @supre1026
    @supre1026 6 หลายเดือนก่อน +1

    is it always the case that salts are unique to each user?

  • @viveksridhar1176
    @viveksridhar1176 หลายเดือนก่อน +1

    In an earlier video, I recall Professor Messer stating that public keys are used for encryption and private keys are used for decryption. Why is it the other way round here? Also, if Bob was able to use Alice's public key di decrypt, and Alice's public key is well, public.... won't anyone be able to decrypt the signature hash?

    • @BlueDragon975
      @BlueDragon975 หลายเดือนก่อน

      While yes anyone would be able to decrypt the message using Alice's public key; only they are the one able to encrypt the message at all using their private key.
      For example in the video: Alice hashes the message "You're hired, Bob" and send it in plain text + the hash just created, while also encrypting the whole thing with her private key. When Bob receives the message, they decrypt it with Alice's public key, hashes the plain text message as Alice did, and compares their own hash with the original hash to see if the message has been modified.
      This method is usually used to verify that the person sending you the message is who the say they are and for things that are not entirely important / doesn't contain sensitive information.
      Hope this helps :)

  • @kevintyson2937
    @kevintyson2937 7 หลายเดือนก่อน +3

    Do we have to know all the SHA hashes for the test?

    • @saucegotti8538
      @saucegotti8538 4 หลายเดือนก่อน +1

      Yes

    • @seanpellegrino2989
      @seanpellegrino2989 4 หลายเดือนก่อน +3

      You don't already know how to process the algorithm in your head yet?

    • @rexraptorsaur
      @rexraptorsaur 2 หลายเดือนก่อน +1

      You must memorize every permutation of the salting algorithm and their corresponding SHA hash as well.

    • @rot26-o3h
      @rot26-o3h หลายเดือนก่อน

      @@rexraptorsaur SHA dont apply salts

    • @rexraptorsaur
      @rexraptorsaur 10 วันที่ผ่านมา

      @@rot26-o3h I meant adding salt before running it through SHA

  • @dhanush.h3010
    @dhanush.h3010 8 หลายเดือนก่อน +3

    I have a doubt where is that public key saved in that same file which is signed or bob go to CA to get the public key ? Please clear my doubt
    Thanks

    • @vstrxl
      @vstrxl 7 หลายเดือนก่อน +16

      In an enterprise environment, Bob would typically get Alice's public key from the organization's key management system. The key management system securely stores and distributes public keys, often using internally-issued certificates. Bob trusts this system to provide authentic keys. However, for sensitive operations, additional out-of-band verification is still prudent.
      The signed file itself doesn't contain the public key, only the signature created with the private key. The public key is stored separately in the key management system. Hope this helps!