Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
You explain this better than anyone, Sunny. We are so blessed that you are on TH-cam. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
Sunny, your explanations are spot on. In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things. I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding. Thank you very much for your work.
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution.. Thanks Sunny, you're awesome
Would like to appreciate few things 1. Very nice pace and clear explanation 2. Using Diagrams 3. Talking about confusion at last 4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah .. Thanku sunny everything is crystal clear..
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
This is what our newbie need, Im studying Network+ and those materials im using just lead me to a very frustrated situation , but your explination really straight forward and newbie friendly . Thanks you Sunny, pls keep your channel updating and introducing more , i have subscrbed .
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work. The world is better with your contribution💚
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
One of the few videos that properly explains digital signatures; good stuff.. Only question I have is at 2.35 you state that bob encrypts using his own private key. is this best practice ?? If bob encrypts using his private key then by design, the decryption key would be public (his own public key). Surely you would not want a decryption key to be public... decryption keys must be kept secret...? Unless this is the method used for signing... I am thinking that Bob should actually encrypt using Alice's public key...and Alice would then decrypt using her own secret private key..
Private key is used for Non-repudiate property so that Bob can't refuse it doesn't send the message to Alice. This is the reason to use Private Key at sender side.
Hi, my friend, many thanks for your comment and question. You are correct in terms of public key encryption. In this video, Bob uses his private key just for signing the document. The document itself is still in plain text. Thus, as you said, it is not a best practice. Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key. To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document. To sign the document (digital signature), the sender generates a pair of keys. He keeps his own private key and the public key is sent to the receiver. In this video, we only focus on digital signature. Thus, the document is still in plaintext. I have another video: public key encryption explaining how it works. Many thanks again. I hope I could be helpful in explaining two different cases.
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
Great video i have a question starting at 2:03, Bob has a key pair and gives Alice the public. In a real life scenario how would Alice intially receive the public key before the plaintext message is sent.
Mr.Sunny I have a question.In Public key Asymmetric method the receiver(ALICE) is the one who has to create keys and share them to Sender correct, in this i see you mention that BOB is sharing both keys, i am bit confused.
Dear Sir, I watched all your videos.Your explanations are very clear , easy to understand and very short and precise to the point.Please continue making videos as such for beginners to learn complex topics.I wish you touch Microsoft Products such as Azure and latest technologies.Once again, thank you for these excellent videos.Never subscribed on first visit to any channels.But i did for your channel
Thank you Sunny for this vivid explanation . I have two questions: (1) Alice could decrypts Bob's digest . This means anything Bob's encrypts with his private key is not safe because his public key is available to attackers, right? (2) How can we be sure both Bob and and Alice are using the same hash algorithm? a digital certificate?
Hi, my friend. Thanks a lot for taking time to ask these two questions. these two questions are excellent because you really touch two very important questions. 1) difference between digital signature and public key encryption; 2) hash algorithm. Question 1: Yes, indeed, anyone can get Bob's public key, and can use his public key to verify one fact: the signature is Bob's signature. However, what harms does it cause? An analogy in life: I send you a letter through the US post office, you get my letter and you knows it comes from me simply because you know for sure it is my signature at the end of the letter. What you really concern is actually the document itself because the document is still in plain text in my video. Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document. Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key. To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document. I hope my answer would be a little bit helpful or cause more confusion. 2) the second question. It is very technical. I am afraid at this point that I could not be able to explain. There are some common hash algorithms, like MD5, MD6, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Wirlpool, and many others. When mail servers communicate with each other in terms of using digital signature, there must be a mechanism to know what type of hash algorithm is used. The analogy is like meta-data for HTML. The web browser knows what version is used by reading document type. I would definitely get back to you once I find the correct answer. I would appreciate your questions, which would definitely motivate me to research in this area.
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
Hello, At 4:15 you say that Alice will use the same hash algorithm to get the digest, so that she can compare hers with Bob’s. My question is, where does she get the hash algorithm from? Thank you.
The hash algorithm used by the sender has to be known also by receiver, same algorithm must be employed otherwise the receiver will not be able to get the same hash.
2:30 "Bob then encrypts the digest with his private key" 3:05 "Alice decrypts the digital signature using Bob's public key" These two steps make no sense to me as public keys are used to encrypt and private keys are used to decrypt. The video says it backwards. Can you explain?
Both can be used interchangeably for encryption. Bob encrypts with his private key the message M -> Sends it to Alice -> Alice decrypts with Bobs public key (Bothe keys being used are Bob's) --------Because bob is the only one with his own private key then when we open it with his public key we know it comes from Bob --------Notice that anybody could decrypt the message cause they know Bobs public key Bob encrypts with his Alice's public key the message-> Sends it to Alice -> Alice decrypts with her private key( Both keys being used are Alices's) --------Because bob encrypts with Alice public key only Alice has her private key to open the message
@@alvaromema7951 Thank you for the clarification. I was under the (false) impression that the private key had some mathematical properties that only made it good for decryption. It is the level of distribution of each key that makes it public or private, not any inherent math property(ies). Thank you for a very helpful video and explanation!
Many thanks, sir! I appreciate your encouragement and recommendation. Helping more people to understand some difficult concepts is my goal. I am happy.
Yea professor. Infact these concepts were difficult for me as well especially with regard to the Assymetric key encryption, you mentioned an important point that the key generation happens from the receiver’s end. This point is not emphasized in any references I came across so far.Your lectures is Very aimpletans practical
the entire semester i did not understand this but only 5 min i got it, thank you Sunny
Sunny, I just wanted you to know that today I provisionally passed SSCP and I would have not achieved it without your youtube lessons. You are the best teacher any student could hope for!
congratulations! I am so glad to hear it.
share your experience while achieving SSCP
Great explanation! Thank you! I only want to add that the reason we use a hashing algorithm before encrypting a digest, is to make the digital signature small. Because if the plain text message was 10GB in size, then using a hashing algorithm on it creates a small string of only a few bytes. But we if created the digital signature from the entire 10GB text message, then we would have to send 20GB worth of data - 10GB for the original message, and another 10GB for the digital signature used to verify that it was signed by Bob. In case anyone else was wondering why we use a hash algorithm to create a digest, before encrypting it with the private key to create a small digital signature. Remember, if any small change was made to the original message, the digest would be completely different, and that's why we can use this method to decrease the size of the digital signature.
Good to know!
I was so confused and I was exactly looking for an answer of that question in the comments section. Thank you, you are a legend.
th-cam.com/video/0F7Z7LXsR0g/w-d-xo.html
Do you have Digital Signature ????
You explain this better than anyone, Sunny. We are so blessed that you are on TH-cam. There are ones that talk for 1 hour and don't explain it as well as you have in 5 minutes. Thanks for explaining it so well!!!!
Wow, thank you!
I can’t believe I didn’t stumble upon your videos earlier while studying for the CISA. Domain 5 has had some difficult concepts to understand and taking even 30 min to watch a few of your videos has finally made concepts click. Thank you so much, you’re a wonderful teacher!
Sunny, your explanations are spot on.
In your Public key video, you made clear, that the process starts with the receiver. Here you pointed out, that digital signature and encrypting the message are two distinct things.
I watched a ton of videos to understand those concepts. No one made these differentiations. Hence, they are critical for the understanding.
Thank you very much for your work.
Thank you Sunny! I was preparing myself on your channel for the cryptography exam for my dream job. I got the job and I explained digital signature, hash functions and PKI exactly the way you do on your channel. Thanks to you I had the best written exam among all the participants. Keep doing the great job!
I am happy for you and congrats on your new job. I will do my best. Come back to channel sometimes and suggest new topics for me. Congrats again.
@@sunnyclassroom24 I certainly will. As you asked me for a suggestion, I would love to see you explain how some of the cryptographic primitives reside in the crypto asset world. i.e. how did Bitcoin protocol made use of digital signature, or explanation of some more advanced techniques like ZKP and how the zkSNARKs are made and their components or cryptography behind Mimblewimble protocol. Have a nice day sunny and please don't forget to enjoy yourself!
interesting that 5 mins in a free video from someone who speaks english as a second language is more helpful than a $500 textbook and a lecture from an expensive institution..
Thanks Sunny, you're awesome
Woah my book fails to explain this in 5 pages, what you did in just a few minutes.
The same here, his explanation make the subject very ease.
exactly!!
Exactly
@Matias Gatlin Since she is your girlfriends & you know in & out about her , then what made it necessary to hack her account
bro can u send me yr book and help me do my thesis if u don't mind?
At 4.20, he debunks one of the digest confusion peoples are running into - a digital signature is NOT used to encrypt application data. Great job Sir!
You are welcome !
Would like to appreciate few things
1. Very nice pace and clear explanation
2. Using Diagrams
3. Talking about confusion at last
4. Using "Namaste" symbol at end :-) . I am Indian and it is in our culture to say goodbye or hello. Cheers!!!
It took me several years to understand this simple process. Thanks, Sunny.
I am reading from the book, it took me hour to barely understand, five minutes video goes directly to the point, thanks Sunny!
Great to hear!
you explain it very well - the logic is sound and easy to follow unlike some people that gets trapped in the technical details before explaining the basic steps
today there was my ppt i was very upset how to explain. Then i pray O Allah help me and finally i watch your video . Thanks to my Allah ..
Thanku sunny everything is crystal clear..
You make any topic so simple yet clear. Thank you very much Sunny, I have always referred to your videos when in doubt.
It was a very elaborative with example which i struggled a lot studying books and youtube it to clear my confusion. I appreciate the way you explain straightforward and simple.
Mostly i never comment the videos i see, really worth for watching and got full concept in just 5 mins. Really it's useful
Sunny, you are a treasure! I'm so grateful I stumbled upon your channel. Your explanations and visuals break the topics down so that it's so understandable. Thank you, thank you, thank you!! 🙏🏻
Sunny, I hope you the best cause you are the best teacher on Earth. Thank you!
This is what our newbie need,
Im studying Network+ and those materials im using just lead me to a very frustrated situation ,
but your explination really straight forward and newbie friendly .
Thanks you Sunny,
pls keep your channel updating and introducing more ,
i have subscrbed .
Thank you for sub!
You can explain the most complex concepts so that anyone can understand. Thank you very much
You are welcome.
Finally I've managed to find a youtube video on this topic which makes complete sense thank you. The graphics explained this very well and now i understand at last
It's embarrassing how little I understood about this, and remarkable how clear this video makes the subject. Well done.
Dear Mr. Sunny. You are amazing at explaining things. FANTASTIC job, a million thanks!!!
You are very welcome
Excellent Illustration on Digital Signature !!. it is like Juicing an orange and giving everyone an Orange Juice which is a solid understanding of digital signature. Appreciate sharing your know how Sunny !!. Thanks again. Mat.
I love this guy's videos. Simple and clear.
Really, really amazing way of teaching with just simple and to the point teaching methodology.
Your videos make such complex stuff so damn easy to understand!
Your explanations answer questions which even whole of the web can't.
Thank you very much for your encouraging words. I will try my best to live up to your kind words.
Mr. Sunny, the contents of your youtube account are valuable. It was nice to find you. Please keep doing what you have been doing.
Many thanks.
After watching tons of videos... finally I was able to understand the concept after watching your video..thanks alot sir
You are welcome! I am glad that it helped.
Sunny, you are my favorite. You are making it easier for me to understand things.
I am glad to found out your channel. You really explain the complex topics in a simple, clear and concise manner. Your videos helped me understand the Assymetric encryption topic well. Thank you so much :)
You are welcome! I am glad it helped.
I must thank you sunny for wrapping up the whole topic meant for 1 and half hours in just 5 minutes. It was really educational and useful.
okay, third video today, I'm officially addicted to your channel :)
Thank you very much! I appreciate it!
Thanks for explaining this and other topics so clearly! I have watched lots of other videos by professors, experts and students but they all miss the point. You explain this and other topics so logically and clearly that it's a pleasure to watch. Thank you so much!
Sunny, this is explained very clear and crisp. And common confusion is best explained. Thank you.
Fantastic short and concise videos descriping very complex concepts ;)
You got my subscription!
Many thanks , Casper, for your great comment and your subscription.
Mine as well 😊
I think you have just literally saved my life. Your demonstration and explanation have helped me so much in understanding these ALIEN computer language. I mean, English is my second language already and these computer languages were too hard for me to comprehend....Until viewing your videos. Thank you so much sunny.
You are very welcome! I am glad I could help. English is my second language too and thus pictures and diagrams always help to understand better than just words. That is why I do this to help others.
Sunny Classroom your language is Perfect to me and the pronunciation is very clear. Your explanation is straight to the point. It is done well constructed and very logical. Concise and clear. Just what I want. Keep up the great work.
The world is better with your contribution💚
Many thanks for your encouragement. Best wishes, sunny classroom.
You are amongst the best teachers who had in my whole life; you are the best best. GOD Bless you, Sir.👏👏👏👏
Clear! Correct! And to the point! Very pleasant and educational to watch.
Many thanks for your encouragement.
bob and alice using cryptography techniques again!!! they are amazing lol
Very good explanation. Also the last remark about data encryption is very clear.
Thanks a lot for your feedback.
Bob, I agree with the other positive comments. This is the absolute best explanation of digital signatures with email or memo that I have seen. Great job and thank you for this. 👍🙌
this guy is really good at explaining everything
OMG! I DON"T BELIEVE THAT I"VE FOUND THE GREATEST EXPLANATION! THANK YOU SO MUCH!
Glad it helped!
amazing video, better explained than almost all books that i read about it
I bought a class on Udemy teaching this, but you're explaining it way better!
Thank you for your time! Check out my other videos please!
@@sunnyclassroom24 of course! I like to use your channel as a cross reference for any topics that Udemy confuses me with, but with your presentations I understand it a lot more, thank you :]
@@andrewalonsi You are welcome!
Good stuff man! You made this concept crystal clear
Great video mate. The video covers all the key points and is quite easy to understand.
simplest explanation of complex topics salute!
Thank you for watching!
WOW, what an awesome explanation and diagram........and you anticipate the confusion some can have with the message vs signature encryptian
Thanks a lot.
Finally understood digital signature after many videos. This is the best .
Thanks a lot for your nice comment. I am glad it helped.
Simple, clear and very easy to understand. Very effective presentation. Thank you
You are welcome! And thank you for your comment.
Thank you so much Sunny for the time you put in creating these awesome educational material. God bless you.
My pleasure!
Great video which will explain the functionality of digital signature without any complexity
It couldn't be more clear. Great explanation.
Thank you!
I would say an excellent explanation. Neat and clean with visuals
Many thanks, Tariq for your watching and leaving comments.
Thank you Sunny! This cleared up some confusion I had about this topic, so glad to have found this explanation.
Professor Messor,David L.Prowse, Darril Gibson and Jason Dion couldn`t break it down like you just did. Thank you.
Your lessons are more than perfect... thank you from all my heart.
Keep going on.
Somewhat simple concept, but hard to understand just by reading textbooks. Thanks for this vid.
One of the few videos that properly explains digital signatures; good stuff..
Only question I have is at 2.35 you state that bob encrypts using his own private key.
is this best practice ??
If bob encrypts using his private key then by design, the decryption key would be public (his own public key).
Surely you would not want a decryption key to be public... decryption keys must be kept secret...?
Unless this is the method used for signing...
I am thinking that Bob should actually encrypt using Alice's public key...and Alice would then decrypt using her own secret private key..
Private key is used for Non-repudiate property so that Bob can't refuse it doesn't send the message to Alice. This is the reason to use Private Key at sender side.
Hi, my friend, many thanks for your comment and question. You are correct in terms of public key encryption.
In this video, Bob uses his private key just for signing the document. The document itself is still in plain text. Thus, as you said, it is not a best practice.
Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document
Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key.
To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document.
To sign the document (digital signature), the sender generates a pair of keys. He keeps his own private key and the public key is sent to the receiver.
In this video, we only focus on digital signature. Thus, the document is still in plaintext. I have another video: public key encryption explaining how it works.
Many thanks again. I hope I could be helpful in explaining two different cases.
Hi, thanks so much for explaining, really helpful. I hope your channel grows fast because it is great!!!.
@@sunnyclassroom24 Thank you . Well explained.
Sunny Classroom ... so in other words, Are you not allowed to use this same pair of keys for encryption and for digital signature ?
you never ever disappoint. always the best explenation. You pointing out the common confusion also helped a lot.
A very good, clear, and simple explanation. Thank you very much.
Your explanations are incredibly easy
Really great, concise explanation and was great in combination with your video on Public Key Encryption to wrap my head around this concept better
Man, I really liked this video and I instantly subscribed to watch more later. I guess what I am hung up on is thinking about where all of this hash comparing is taking place. It must be done behind the scenes.
thanks for your kind words. Yes, you are correct. A lot of things are happening without user's knowledge.
Your way to explain is best till found in youtube , Thank You Sunny Class Room
You are welcome, Abad.
The best description of this topic I have found, very helpful, thanks very much!
This is amazing, didn't know cryptography was so beautiful
Thank you for watching!
That was an awesome ,simple & vivid explanation !
Thank you for leaving nice comment.
@@sunnyclassroom24 I've questions, what is your email ?
This guy is good at teaching!
Thank you for watching!
Great video i have a question starting at 2:03, Bob has a key pair and gives Alice the public. In a real life scenario how would Alice intially receive the public key before the plaintext message is sent.
In our real life, our public keys are preinstalled in our major browsers, such as Firefox, Chrome and Edge.
In our real life example 2: through key exchange when you communicate with the server.
almost 100's of video are there in you tube. Your explanation was so great.
120 videos by now.
This guy makes my day..nicely explained ...thanks dude
You are welcome
Mr.Sunny I have a question.In Public key Asymmetric method the receiver(ALICE) is the one who has to create keys and share them to Sender correct, in this i see you mention that BOB is sharing both keys, i am bit confused.
very simply explained! thanks Sunny !
You are welcome Vikram! And thank you for leaving comments.
Thank you for the terrific video. Great job Sunny!
You are welcome!
Great Teacher Sunny!! Sunny for president !!
Thank you for explaining this. I could understand this clearly after watching your video.
Extra ordinary Teaching style you have !
Dear Sir,
I watched all your videos.Your explanations are very clear , easy to understand and very short and precise to the point.Please continue making videos as such for beginners to learn complex topics.I wish you touch Microsoft Products such as Azure and latest technologies.Once again, thank you for these excellent videos.Never subscribed on first visit to any channels.But i did for your channel
wow, beautiful illustrations and explanation....very simple
2 hours of my professors lecture could not explain me so easily as a 5 minute video!
Awesome, well done my friend Sunny! This video will be full recomended to my friends.
Thank you very much for your kind words and encouragement. I hope your friends would also like it.
Best explanation for Digital signature!!
Thank you Sunny for this vivid explanation . I have two questions: (1) Alice could decrypts Bob's digest . This means anything Bob's encrypts with his private key is not safe because his public key is available to attackers, right? (2) How can we be sure both Bob and and Alice are using the same hash algorithm? a digital certificate?
Hi, my friend. Thanks a lot for taking time to ask these two questions. these two questions are excellent because you really touch two very important questions. 1) difference between digital signature and public key encryption; 2) hash algorithm.
Question 1: Yes, indeed, anyone can get Bob's public key, and can use his public key to verify one fact: the signature is Bob's signature. However, what harms does it cause? An analogy in life: I send you a letter through the US post office, you get my letter and you knows it comes from me simply because you know for sure it is my signature at the end of the letter.
What you really concern is actually the document itself because the document is still in plain text in my video.
Suppose they want the document encrypted. Alice( the receiver) would generate a separate pair of keys. She keeps her private key and sends Bob the public key and he would use it to encrypt his document.
Thus, digital signature and public key encryption are just "opposite" in terms of private key and public key.
To encrypt the document, the receiver generates a pair of keys: public key and private key. The receiver keeps her private key and public key is used by the sender. The sender uses public key to encrypt the document and the receiver uses her own private key to decode the document.
I hope my answer would be a little bit helpful or cause more confusion.
2) the second question. It is very technical. I am afraid at this point that I could not be able to explain. There are some common hash algorithms, like MD5, MD6, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Wirlpool, and many others. When mail servers communicate with each other in terms of using digital signature, there must be a mechanism to know what type of hash algorithm is used. The analogy is like meta-data for HTML. The web browser knows what version is used by reading document type.
I would definitely get back to you once I find the correct answer.
I would appreciate your questions, which would definitely motivate me to research in this area.
There is a problem that I could not understand until I watched your video about why the receiver can recognize who the sender is while everyone can have a public key. Thank you so much.
Nice one I'm about to get in Information System Security Exam in an hour, I really do appreciate.
I hope everything goes well.
This channel is amazing. I subscribed right away!!!
Hello,
At 4:15 you say that Alice will use the same hash algorithm to get the digest, so that she can compare hers with Bob’s. My question is, where does she get the hash algorithm from?
Thank you.
The hash algorithm used by the sender has to be known also by receiver, same algorithm must be employed otherwise the receiver will not be able to get the same hash.
This guy is awesome! Love it, clear and concise.
Many thanks.
2:30 "Bob then encrypts the digest with his private key"
3:05 "Alice decrypts the digital signature using Bob's public key"
These two steps make no sense to me as public keys are used to encrypt and private keys are used to decrypt. The video says it backwards. Can you explain?
Both can be used interchangeably for encryption.
Bob encrypts with his private key the message M -> Sends it to Alice -> Alice decrypts with Bobs public key (Bothe keys being used are Bob's)
--------Because bob is the only one with his own private key then when we open it with his public key we know it comes from Bob
--------Notice that anybody could decrypt the message cause they know Bobs public key
Bob encrypts with his Alice's public key the message-> Sends it to Alice -> Alice decrypts with her private key( Both keys being used are Alices's)
--------Because bob encrypts with Alice public key only Alice has her private key to open the message
@@alvaromema7951 Thank you for the clarification. I was under the (false) impression that the private key had some mathematical properties that only made it good for decryption. It is the level of distribution of each key that makes it public or private, not any inherent math property(ies).
Thank you for a very helpful video and explanation!
best video in the history of youtube thanks
Very nice video! You make things easy to understand!
Sir explained too good my exams are near of final year and this helps😊
Happy to help
Very nice sir, I will definitely refer this site to my under graduate students as well
Thank you very much. I will do my best to continue to upload more tutorials in networking and cyber security area. I appreciate your help.
Many thanks, sir! I appreciate your encouragement and recommendation. Helping more people to understand some difficult concepts is my goal. I am happy.
Yea professor. Infact these concepts were difficult for me as well especially with regard to the Assymetric key encryption, you mentioned an important point that the key generation happens from the receiver’s end. This point is not emphasized in any references I came across so far.Your lectures is Very aimpletans practical
Thanks a lot, sir.
thansks alot sunny sir! u made it look so easy;🔥🔥🔥🔥 your videos become very helpful for a-night-before-exams preparations!! 🙂🙂
Crystal clear now. Many thanks, you are a great teacher.