Dr Julian. I think your lecture was very interesting. However, you mentioned that if the message comes from the person who signs the message and not from the person who verifies it , then the verifier can not be really sure that the signer indeed has the private key corresponding to the public key that the verifier is using to authenticate the message. This part is not very clear to me. My understanding was that if a person A has to sign a message then he needs to use a private key and if person B has the corresponding pub key , only then can B verify the message signed by A successfully. Ofcourse, person B needs to be sure that the pub key indeed is coming from person A . And this is usually the certificates purpose where it certifies that the public key is coming from the person it claims to be coming from. It would be very useful if you could clear this up. Thanks.
please, remember in your presentation you asked us to reply you in the comment and you will reply, with what site or software are we going to start calculating all these formulas ?
Awesome but is there not enough work at TenX ... Would be better to use this focus to find a use case for the TenX token in Wich people invested ... #TenX
Would love to see an in depth video in Which you calculate the long term value of the TenX token ... .... In order for the token to go even to it's value it has today you need around %10 of the credit cards market volume ... don't you agree? Cheers
Dr Julian. I think your lecture was very interesting. However, you mentioned that if the message comes from the person who signs the message and not from the person who verifies it , then the verifier can not be really sure that the signer indeed has the private key corresponding to the public key that the verifier is using to authenticate the message. This part is not very clear to me. My understanding was that if a person A has to sign a message then he needs to use a private key and if person B has the corresponding pub key , only then can B verify the message signed by A successfully. Ofcourse, person B needs to be sure that the pub key indeed is coming from person A . And this is usually the certificates purpose where it certifies that the public key is coming from the person it claims to be coming from. It would be very useful if you could clear this up. Thanks.
please, remember in your presentation you asked us to reply you in the comment and you will reply, with what site or software are we going to start calculating all these formulas ?
It would be helpful if you tell which device you are using for teaching purposes?
At 13:34, did you mean "mod n" (instead of log n)? Very nice explanation.
Really understandable!
thx
Awesome but is there not enough work at TenX ... Would be better to use this focus to find a use case for the TenX token in Wich people invested ... #TenX
Would love to see an in depth video in Which you calculate the long term value of the TenX token ... .... In order for the token to go even to it's value it has today you need around %10 of the credit cards market volume ... don't you agree? Cheers
If Kpr*alpha=Kpub, then how difficult would it be for someone to divide Kpub by alpha to get someone else's private key?
that is not arithmetic multiplication, but geometric... so this is considered to be very very very hard
i want your help please