Absolute fantastic training. You are an absolute gem. Thank you for all you have done to contribute to society. Question: When did Alice ever create the public key to give to Bob? When was that key ever created for Bob to gain from Alice? You mentioned in the process that Alice created a private key for herself so she could encrypt with the digital signature, but at what point did Alice ever create the public key? Update: Explained in another video. I realize now both keys are generated at the same time of encryption.
The public/private key pair is generated by Alice using some mathematics that you can read more in detail elsewhere, and the same key can be used to encrypt many documents so Alice can have created her keys potentially a long time before the interaction with Bob
Prof. Messer, how will Bob know which hash algorithm Alice used so that he can compare two hash values. Given, the public key does not contain any information about hash algorithm. Do Alice and Bob agree on a specific hash function (e.g., SHA-256, SHA-3) in first place that will be used for hashing during the digital signature process?
any one who passed CompTIA Security+ exam I wan to ask you that regarding the multiple-choice questions. For each question, is there only one correct answer, or might there be more than one correct answer?
@@michael2093That is not entirely true. Some answers may be more right than others, but there are multiple right answers in some cases. The most right answer will have the most points, whereas the somewhat right answers may have partial or no points. the question may not even be weighed at all, as some questions are experimental. Just answers to the best of your knowledge and you’ll be fine.
Yes, it sure can, to an extent. Using DKIM, companies can post their public keys in their DNS records and then digitally sign their emails. Recipients could use the public key to make sure emails came from the sender and are legitimate.
Non-Repudiation is like returning something to the store and needing to have a Receipt and the card used during purchase?
yeah something along those lines
I look at it as, no takebacksies.
Absolute fantastic training. You are an absolute gem. Thank you for all you have done to contribute to society.
Question: When did Alice ever create the public key to give to Bob? When was that key ever created for Bob to gain from Alice? You mentioned in the process that Alice created a private key for herself so she could encrypt with the digital signature, but at what point did Alice ever create the public key?
Update: Explained in another video. I realize now both keys are generated at the same time of encryption.
The public/private key pair is generated by Alice using some mathematics that you can read more in detail elsewhere, and the same key can be used to encrypt many documents so Alice can have created her keys potentially a long time before the interaction with Bob
Prof. Messer, how will Bob know which hash algorithm Alice used so that he can compare two hash values. Given, the public key does not contain any information about hash algorithm.
Do Alice and Bob agree on a specific hash function (e.g., SHA-256, SHA-3) in first place that will be used for hashing during the digital signature process?
You totally get it! This is exactly what happens.
@@fundamxd is this agreement automatic? Or do they literally agree beforehand?
@@thatguy1398 They literally agree beforehand
@@fundamxdthank you
@@thatguy1398 You're welcome
Very useful infographics in this video!
Thank you for this excellent video!!
Bravo feellas!
🏆 thank you for this content 🥇
any one who passed CompTIA Security+ exam I wan to ask you that regarding the multiple-choice questions. For each question, is there only one correct answer, or might there be more than one correct answer?
unless the question says to pick multiple than there is only one right answer. its tough, pick the best one that fits the question.
@@michael2093 Thanks so much for your information
@@michael2093That is not entirely true. Some answers may be more right than others, but there are multiple right answers in some cases. The most right answer will have the most points, whereas the somewhat right answers may have partial or no points. the question may not even be weighed at all, as some questions are experimental. Just answers to the best of your knowledge and you’ll be fine.
Professor, with there being so much job-hiring scams, could this be a good way to verify authentication of emails or detecting phishing?
Yes, it sure can, to an extent. Using DKIM, companies can post their public keys in their DNS records and then digitally sign their emails. Recipients could use the public key to make sure emails came from the sender and are legitimate.
Szczęść Boże