Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
You explain this better than anyone, Sunny. We are so blessed that you are on TH-cam. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution.. Thanks Sunny, you're awesome
Sunny, your explanations are spot on. In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things. I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding. Thank you very much for your work.
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah .. Thanku sunny everything is crystal clear..
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
Would like to appreciate few things 1. Very nice pace and clear explanation 2. Using Diagrams 3. Talking about confusion at last 4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work. The world is better with your contribution💚
This is what our newbie need, Im studying Network+ and those materials im using just lead me to a very frustrated situation , but your explination really straight forward and newbie friendly . Thanks you Sunny, pls keep your channel updating and introducing more , i have subscrbed .
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
One of the few videos that properly explains digital signatures; good stuff.. Only question I have is at 2.35 you state that bob encrypts using his own private key. is this best practice ?? If bob encrypts using his private key then by design, the decryption key would be public (his own public key). Surely you would not want a decryption key to be public... decryption keys must be kept secret...? Unless this is the method used for signing... I am thinking that Bob should actually encrypt using Alice's public key...and Alice would then decrypt using her own secret private key..
Private key is used for Non-repudiate property so that Bob can't refuse it doesn't send the message to Alice. This is the reason to use Private Key at sender side.
Hi, my friend, many thanks for your comment and question. You are correct in terms of public key encryption. In this video, Bob uses his private key just for signing the document. The document itself is still in plain text. Thus, as you said, it is not a best practice. Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key. To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document. To sign the document (digital signature), the sender generates a pair of keys. He keeps his own private key and the public key is sent to the receiver. In this video, we only focus on digital signature. Thus, the document is still in plaintext. I have another video: public key encryption explaining how it works. Many thanks again. I hope I could be helpful in explaining two different cases.
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
authenticity - the recipient can verify the identity of the sender integrity - the recipient is unable to invent or modify a document signed by someone else. non-repudiation - the sender can not deny that he signed a document (non-repudiation)
Many thanks, sir! I appreciate your encouragement and recommendation. Helping more people to understand some difficult concepts is my goal. I am happy.
Yea professor. Infact these concepts were difficult for me as well especially with regard to the Assymetric key encryption, you mentioned an important point that the key generation happens from the receiver’s end. This point is not emphasized in any references I came across so far.Your lectures is Very aimpletans practical
Today, I want to clarify my lesson on hash function, and I am now referring another of your video. What school do you teach, sir? I am a freshman in Software Engineering and wanting to be an ethical hacker. Do you teach ethical hacking or do you have any suggestion so that I can improve more in that field? You teach very well, sir. And I am glad to know you.
I am teaching Computer Information Systems with University of Saint Mary, Leavenworth, Kansas. I don't teach ethical hacking. In TH-cam or Udemy (paid) there are many lessons about ethical hacking. Lessons are not expensive, normally about $10.
the entire semester i did not understand this but only 5 min i got it, thank you Sunny
Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
congratulations! I am so glad to hear it.
share your experience while achieving SSCP
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
Good to know!
I was so confused and I was exactly looking for an answer of that question in the comments section. Thank you, you are a legend.
th-cam.com/video/0F7Z7LXsR0g/w-d-xo.html
Do you have Digital Signature ????
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
You explain this better than anyone, Sunny. We are so blessed that you are on TH-cam. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
Wow, thank you!
At 4.20, he debunks one of the digest confusion peoples are running into - a digital signature is NOT used to encrypt application data. Great job Sir!
You are welcome !
Woah my book fails to explain this in 5 pages, what you did in just a few minutes.
The same here, his explanation make the subject very ease.
exactly!!
Exactly
@Matias Gatlin Since she is your girlfriends & you know in & out about her , then what made it necessary to hack her account
bro can u send me yr book and help me do my thesis if u don't mind?
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution..
Thanks Sunny, you're awesome
Sunny, your explanations are spot on.
In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things.
I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding.
Thank you very much for your work.
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
I am happy for you and congrats on your new job. I will do my best. Come back to channel sometimes and suggest new topics for me. Congrats again.
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah ..
Thanku sunny everything is crystal clear..
It's embarrassing how little I understood about this, and remarkable how clear this video makes the subject. Well done.
I am reading from the book, it took me hour to barely understand, five minutes video goes directly to the point, thanks Sunny!
Great to hear!
It took me several years to understand this simple process. Thanks, Sunny.
Mostly i never comment the videos i see, really worth for watching and got full concept in just 5 mins. Really it's useful
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
You can explain the most complex concepts so that anyone can understand. Thank you very much
You are welcome.
You are amongst the best teachers who had in my whole life; you are the best best. GOD Bless you, Sir.👏👏👏👏
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
You make any topic so simple yet clear. Thank you very much Sunny, I have always referred to your videos when in doubt.
this guy is really good at explaining everything
Would like to appreciate few things
1. Very nice pace and clear explanation
2. Using Diagrams
3. Talking about confusion at last
4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
Sunny, I hope you the best cause you are the best teacher on Earth. Thank you!
I love this guy's videos. Simple and clear.
Somewhat simple concept, but hard to understand just by reading textbooks. Thanks for this vid.
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
bob and alice using cryptography techniques again!!! they are amazing lol
Your videos make such complex stuff so damn easy to understand!
Your explanations answer questions which even whole of the web can't.
Thank you very much for your encouraging words. I will try my best to live up to your kind words.
After watching tons of videos... finally I was able to understand the concept after watching your video..thanks alot sir
You are welcome! I am glad that it helped.
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
amazing video, better explained than almost all books that i read about it
I must thank you sunny for wrapping up the whole topic meant for 1 and half hours in just 5 minutes. It was really educational and useful.
Sunny, you are my favorite. You are making it easier for me to understand things.
Dear Mr. Sunny. You are amazing at explaining things. FANTASTIC job, a million thanks!!!
You are very welcome
Professor Messor,David L.Prowse, Darril Gibson and Jason Dion couldn`t break it down like you just did. Thank you.
Great video which will explain the functionality of digital signature without any complexity
simplest explanation of complex topics salute!
Thank you for watching!
Sunny, this is explained very clear and crisp. And common confusion is best explained. Thank you.
OMG! I DON"T BELIEVE THAT I"VE FOUND THE GREATEST EXPLANATION! THANK YOU SO MUCH!
Glad it helped!
I bought a class on Udemy teaching this, but you're explaining it way better!
Thank you for your time! Check out my other videos please!
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
@@andrewalonsi You are welcome!
Clear! Correct! And to the point! Very pleasant and educational to watch.
Many thanks for your encouragement.
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work.
The world is better with your contribution💚
Many thanks for your encouragement. Best wishes, sunny classroom.
Your explanations are incredibly easy
This is what our newbie need,
Im studying Network+ and those materials im using just lead me to a very frustrated situation ,
but your explination really straight forward and newbie friendly .
Thanks you Sunny,
pls keep your channel updating and introducing more ,
i have subscrbed .
Thank you for sub!
okay, third video today, I'm officially addicted to your channel :)
Thank you very much! I appreciate it!
Mr. Sunny, the contents of your youtube account are valuable. It was nice to find you. Please keep doing what you have been doing.
Many thanks.
2 hours of my professors lecture could not explain me so easily as a 5 minute video!
A very good, clear, and simple explanation. Thank you very much.
Very good explanation. Also the last remark about data encryption is very clear.
Thanks a lot for your feedback.
WOW, what an awesome explanation and diagram........and you anticipate the confusion some can have with the message vs signature encryptian
Thanks a lot.
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
Fantastic short and concise videos descriping very complex concepts ;)
You got my subscription!
Many thanks , Casper, for your great comment and your subscription.
Mine as well 😊
Simple, clear and very easy to understand. Very effective presentation. Thank you
You are welcome! And thank you for your comment.
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
You are welcome! I am glad it helped.
Finally understood digital signature after many videos. This is the best .
Thanks a lot for your nice comment. I am glad it helped.
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
This is amazing, didn't know cryptography was so beautiful
Thank you for watching!
It couldn't be more clear. Great explanation.
Thank you!
One of the few videos that properly explains digital signatures; good stuff..
Only question I have is at 2.35 you state that bob encrypts using his own private key.
is this best practice ??
If bob encrypts using his private key then by design, the decryption key would be public (his own public key).
Surely you would not want a decryption key to be public... decryption keys must be kept secret...?
Unless this is the method used for signing...
I am thinking that Bob should actually encrypt using Alice's public key...and Alice would then decrypt using her own secret private key..
Private key is used for Non-repudiate property so that Bob can't refuse it doesn't send the message to Alice. This is the reason to use Private Key at sender side.
Hi, my friend, many thanks for your comment and question. You are correct in terms of public key encryption.
In this video, Bob uses his private key just for signing the document. The document itself is still in plain text. Thus, as you said, it is not a best practice.
Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document
Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key.
To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document.
To sign the document (digital signature), the sender generates a pair of keys. He keeps his own private key and the public key is sent to the receiver.
In this video, we only focus on digital signature. Thus, the document is still in plaintext. I have another video: public key encryption explaining how it works.
Many thanks again. I hope I could be helpful in explaining two different cases.
Hi, thanks so much for explaining, really helpful. I hope your channel grows fast because it is great!!!.
@@sunnyclassroom24 Thank you . Well explained.
Sunny Classroom ... so in other words, Are you not allowed to use this same pair of keys for encryption and for digital signature ?
Good stuff man! You made this concept crystal clear
Your lessons are more than perfect... thank you from all my heart.
Keep going on.
almost 100's of video are there in you tube. Your explanation was so great.
120 videos by now.
Great video mate. The video covers all the key points and is quite easy to understand.
Thanku Elon musk....🙏
I would say an excellent explanation. Neat and clean with visuals
Many thanks, Tariq for your watching and leaving comments.
Thank you so much Sunny for the time you put in creating these awesome educational material. God bless you.
My pleasure!
wow, beautiful illustrations and explanation....very simple
Your way to explain is best till found in youtube , Thank You Sunny Class Room
You are welcome, Abad.
Thank you Sunny! This cleared up some confusion I had about this topic, so glad to have found this explanation.
Thank you for explaining this. I could understand this clearly after watching your video.
very simply explained! thanks Sunny !
You are welcome Vikram! And thank you for leaving comments.
Really great, concise explanation and was great in combination with your video on Public Key Encryption to wrap my head around this concept better
That was an awesome ,simple & vivid explanation !
Thank you for leaving nice comment.
@@sunnyclassroom24 I've questions, what is your email ?
Hours of lectures this teacher explained the digital signature in 5 minutes. I don't know why im going to college
This guy is good at teaching!
Thank you for watching!
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
thanks for your kind words. Yes, you are correct. A lot of things are happening without user's knowledge.
authenticity - the recipient can verify the identity of the sender
integrity - the recipient is unable to invent or modify a document signed by someone else.
non-repudiation - the sender can not deny that he signed a document (non-repudiation)
Sir explained too good my exams are near of final year and this helps😊
Happy to help
Very simple and concise explanations thank you very much
Extra ordinary Teaching style you have !
A very precise and simple explanation...thank you!
thanks.
Nice one I'm about to get in Information System Security Exam in an hour, I really do appreciate.
I hope everything goes well.
Thanks. Beautiful and slow explaine made it easy to understand.
Glad it was helpful!
The best description of this topic I have found, very helpful, thanks very much!
Crystal clear now. Many thanks, you are a great teacher.
you never ever disappoint. always the best explenation. You pointing out the common confusion also helped a lot.
Noo Thank YOUU very much. Gratitude 🙏 from Chennai 🇮🇳
best video in the history of youtube thanks
This guy makes my day..nicely explained ...thanks dude
You are welcome
Awesome, well done my friend Sunny! This video will be full recomended to my friends.
Thank you very much for your kind words and encouragement. I hope your friends would also like it.
thansks alot sunny sir! u made it look so easy;🔥🔥🔥🔥 your videos become very helpful for a-night-before-exams preparations!! 🙂🙂
Very nice sir, I will definitely refer this site to my under graduate students as well
Thank you very much. I will do my best to continue to upload more tutorials in networking and cyber security area. I appreciate your help.
Many thanks, sir! I appreciate your encouragement and recommendation. Helping more people to understand some difficult concepts is my goal. I am happy.
Yea professor. Infact these concepts were difficult for me as well especially with regard to the Assymetric key encryption, you mentioned an important point that the key generation happens from the receiver’s end. This point is not emphasized in any references I came across so far.Your lectures is Very aimpletans practical
Thanks a lot, sir.
Very nice channel. Clear and short videos - you can mix it for understanding what you want. Thanks!
Best explanation for Digital signature!!
Nice, explanation. All doubts are cleared now. Thanks.
I literally cried after watching this.
Very easy to understand, sir. Thank you very much.
you are welcome
Today, I want to clarify my lesson on hash function, and I am now referring another of your video. What school do you teach, sir? I am a freshman in Software Engineering and wanting to be an ethical hacker. Do you teach ethical hacking or do you have any suggestion so that I can improve more in that field? You teach very well, sir. And I am glad to know you.
I am teaching Computer Information Systems with University of Saint Mary, Leavenworth, Kansas. I don't teach ethical hacking. In TH-cam or Udemy (paid) there are many lessons about ethical hacking. Lessons are not expensive, normally about $10.
thanks for explaining this concept in such a concise way.