What are Digital Signatures? - Computerphile

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ธ.ค. 2020
  • How do you verify that someone is who they say they are? Dr Mike Pound on digital signatures.
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

ความคิดเห็น • 244

  • @Liamreeves
    @Liamreeves 3 ปีที่แล้ว +344

    Not gonna lie, I came for the information but I stayed for the pen colour change.

    • @bensmith9253
      @bensmith9253 3 ปีที่แล้ว +2

      I just paused the video to look for "this" comment. #wellDoneSir

    • @jem30six
      @jem30six 3 ปีที่แล้ว +1

      very exciting

  • @jacobhall6741
    @jacobhall6741 3 ปีที่แล้ว +426

    Mike is a legend, he explains everything so well and makes it easy for anyone to understand.

    • @t3buron513
      @t3buron513 3 ปีที่แล้ว +3

      agreed

    • @ScreenAgerstheprime11
      @ScreenAgerstheprime11 3 ปีที่แล้ว +1

      @@t3buron513 indeed.

    • @DarthScosha
      @DarthScosha 3 ปีที่แล้ว +15

      Hmm, not sure I agree with you on that. As a student studying an IT degree having recently covered a module on cryptography, I was able to understand most of what he was saying, but if i came here with no background knowledge I would have been completely lost. I'm not criticising him or anything, that's just my opinion on the matter.

    • @aethrya
      @aethrya ปีที่แล้ว

      Truly the sign of somebody who has absolutely mastered their craft.

    • @sbrunner69
      @sbrunner69 10 หลายเดือนก่อน

      He is cool as a cucumber!

  • @mukundyadav6913
    @mukundyadav6913 3 ปีที่แล้ว +682

    Amazing how Tobey Maguire is saving Mary Jane at night and teaching people about computers in the day

    • @bogdanstamenic2836
      @bogdanstamenic2836 3 ปีที่แล้ว +17

      So thats why Dr. Mike Pound looked familiar xD

    • @klyanadkmorr
      @klyanadkmorr 3 ปีที่แล้ว +2

      Nah Mike looks like HUGH GRANT / Frodo and I'm a big Toby McGuire fan but never thought of Toby looking like Mike. It's the Frodo Baggins look

    • @qwerty12341244
      @qwerty12341244 3 ปีที่แล้ว +5

      brilliant but lazy 🤣

    • @AcornElectron
      @AcornElectron 3 ปีที่แล้ว +3

      @@klyanadkmorr Elijah

    • @klyanadkmorr
      @klyanadkmorr 3 ปีที่แล้ว +1

      @@AcornElectron I couldn't remember his name on the tip of my tongue but didn't feel like searching☺

  • @mavezy
    @mavezy 3 ปีที่แล้ว +51

    When I see Mike in the thumbnail, instant click.

    • @Jivvi
      @Jivvi 3 ปีที่แล้ว +9

      When I see Mike, I pound that like button.

  • @forthrightgambitia1032
    @forthrightgambitia1032 3 ปีที่แล้ว +16

    This actually makes a lot more sense than the previous videos on digital signatures on this channels as it actually goes into the details. It was really unclear in my mind before but this is a great explanation of what actually happens.

  • @comradelulz7455
    @comradelulz7455 ปีที่แล้ว +6

    Absolutly love how these guys discuss immensly complex topics, yet when it comes to verifier neither is all that sure how it's spelled! I feel so seen!!!

    • @rdcfrdcf
      @rdcfrdcf ปีที่แล้ว

      :) Yes!

  • @ruhsata
    @ruhsata 2 ปีที่แล้ว +1

    Thank you Dr. Michael Pound. Your explanations are so clear and mind-blowing. One of my favorite channels on TH-cam!

  • @skorp5677
    @skorp5677 3 ปีที่แล้ว +27

    "I'm gonna change my pen colour - it's all very exciting" xD

  • @CorruptoGrande
    @CorruptoGrande 3 ปีที่แล้ว +4

    Thanks for all the videos! I've been watching them and learning from them for years

  • @yaronhb
    @yaronhb 3 ปีที่แล้ว +12

    Dr Pound is one of my favorite to listen to 🤩
    But I feel like it would be nice if this episode included some more information and / or details about digital signatures (maybe some extra bits?😉)

  • @connorcink3972
    @connorcink3972 3 ปีที่แล้ว +3

    So informative yet informal and digestable. Many thanks

  • @gabrielspeed5464
    @gabrielspeed5464 2 ปีที่แล้ว +4

    This video was actually tremendously helpful. I had a rough understanding of PKI with RSA, but I always thought DSA was a totally different process.
    I didn't know it was (effectively) just encrypting the hash of the message with an asymmetric key

  • @polares8187
    @polares8187 3 ปีที่แล้ว +1

    Please do videos about all the topics mentioned in the video. Can't wait to see them.

  • @AlexanderMichelson
    @AlexanderMichelson 3 ปีที่แล้ว +14

    Dr Mike Pound grounds and pounds every problem till it is solved.

  • @Graham_Rule
    @Graham_Rule 3 ปีที่แล้ว +6

    Damn. I've caught up with watching Computerfile. Now I'm going to have to wait for more episodes to come out.

  • @lawrencedoliveiro9104
    @lawrencedoliveiro9104 3 ปีที่แล้ว +18

    9:41 Remember, none of these public keys is confidential. The problem is, you have to trust they are authentic, that they really came from the people they say they’re from.

    • @akashchoudhary8162
      @akashchoudhary8162 3 ปีที่แล้ว +2

      But if they are not the public key from your intended sender then they won't be able to decrypt the encrypted message from your intended sender. So, if the public key itself gets tampered you will know something's not right. Or did I miss something?

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว +7

      @@akashchoudhary8162 You could get fooled into accepting messages from a fake sender instead. So you need to obtain the public key from a trusted source.

    • @Zack_MD
      @Zack_MD 3 ปีที่แล้ว

      @@lawrencedoliveiro9104 Interesting, thanks for the clarification

    • @Rohan-qc8wo
      @Rohan-qc8wo 2 ปีที่แล้ว +1

      If I'm not wrong for that we use digital certificates

  • @gloriascientiae7435
    @gloriascientiae7435 3 ปีที่แล้ว +1

    memorised elgamal, memorised RSA, learned all these protocols and how signatures work... had my exam...
    computerphile video gets published. I swear if it was the other way around, I wouldve included this in my schoolwork for sure.

  • @vimleshkumarkanaujiya
    @vimleshkumarkanaujiya ปีที่แล้ว +2

    Your knowledge as well as English accent is historical.

  • @peschebichsu
    @peschebichsu 2 ปีที่แล้ว +12

    I love it, like every other of your videos. I'm just wondering one thing: He can explain everything so well, why wouldn't he do something like a full structured course with lectures and covering a topic (e.G. encryption, Web security, how the iternet works, ... ) as a whole with all the most important components. I would instantly sign up for that!

    • @silas3463
      @silas3463 ปีที่แล้ว +4

      He is working full-time at a university so I guess this is just a side hustle for him

  • @WiktorJurek
    @WiktorJurek 3 ปีที่แล้ว +1

    Perfect timing lads! Got a Compsec final tomorrow.

  • @huh_wtf
    @huh_wtf 3 ปีที่แล้ว +1

    wow this is the first comphile video I'm watching as soon as it has been published

  • @mathwithjanine
    @mathwithjanine 3 ปีที่แล้ว +4

    Love Mike! He needs his own channel! 🤩

  • @smaeschli
    @smaeschli 3 ปีที่แล้ว +6

    Here I am, Mike Pound. Signed, sealed, delivered - I'm yours!
    Thanks, Computerphile for working with amazing contributors like Dr. Pound, making this material more accessible to a wannabe geek.

  • @lucast2593
    @lucast2593 3 ปีที่แล้ว +7

    Any chance of a video regarding the TPM (trusted platform module ) and how it works, just finished writing an essay and it came up and I found it rather interesting, keep up the great content !

  • @aungthuhein007
    @aungthuhein007 3 ปีที่แล้ว +1

    Dr. Mike Pound finally! Love your vids and Mike :)

  • @daniellambert6207
    @daniellambert6207 3 ปีที่แล้ว

    EXCELLENT use of the Lav mic!

  • @PurpleTeamer
    @PurpleTeamer 3 ปีที่แล้ว +1

    One of the best channel on youtube.

  • @goat5249
    @goat5249 3 ปีที่แล้ว +3

    Is the public key infrastructure video available? I just tried searching for it and couldn't find it!

  • @vilks_jan
    @vilks_jan 3 ปีที่แล้ว +5

    Great video. Maybe it could be interesting to talk about JWT tokens as well

  • @peschebichsu
    @peschebichsu 2 ปีที่แล้ว +2

    I couldn't find the video he mentioned in the end about public key infrastructure. Did I search something wrong or isn't there one?

  • @joaopedrolourencoaffonso2168
    @joaopedrolourencoaffonso2168 2 ปีที่แล้ว +1

    Great video! You helped me a lot!

  • @pjsixhundred
    @pjsixhundred 3 ปีที่แล้ว +1

    Very interesting as always. Thanks.

  • @raiker02
    @raiker02 3 ปีที่แล้ว +98

    Thanks for the lecture, Peter Parker!

  • @bluepumpkin9073
    @bluepumpkin9073 3 ปีที่แล้ว +1

    Thanks Dr. Pound

  • @Guppzor
    @Guppzor 3 ปีที่แล้ว +1

    I have been really enjoying the videos regarding cryptography, security, hashing, etc. I would love to see a video (or maybe a couple if the subject warrants) how the underlying algorithms, specifications, equations, etc could be undermined by an actor (at whatever level [state, provider, ???]) to weaken or at least make it easier for "them" (and ideally/supposedly them and no-one else) to recover or recreate (or even forge or alter) the plain-text information.

    • @MrFair
      @MrFair 3 ปีที่แล้ว +2

      Remember, the specifications of all standard crypto is out in the open. So virtually the only way of attacking a scheme like you said would be to wrongly implement it. And you'd still have to do it in a way that it's compatible with other implementations. Everything else would be noticed quickly for open source projects. For closed source, it get's harder to notice this, but not necessarily impossible.
      Many crypto algorithms use some source of randomness and their security relies critically on this randomness. If you could somehow implement a random generator where only you could predict it's values, that would give you the upper hand. For some schemes you might be able to recover the plaintexts this way. For example because you could predict the choice of secret key or of some information that is used to "cover"/blind the message. It's hard to describe this stuff without going into the details.
      If you propose a new algorithm, the situation is different, of course. But that is one of the reasons why cryptographers advocate so much for using standard and well-researched schemes. :)

  • @arthurthompson3931
    @arthurthompson3931 ปีที่แล้ว +1

    I'm looking for the Public Key Infrastructure video he mentions at the end of this video. It's supposed to be the next video in the series but I can't find it, anyone?

  • @MMLauritsen
    @MMLauritsen 3 ปีที่แล้ว +7

    If you click on the little lock in the address bar of your browser you can see the RSA signed certificate :-)

  • @DailyFrankPeter
    @DailyFrankPeter 3 ปีที่แล้ว +1

    Extra like for the guitar collection! 1:36

  • @diagorasofmel0s
    @diagorasofmel0s 3 ปีที่แล้ว +7

    he says its all very exciting but it really is exciting .

  • @justusstamm1485
    @justusstamm1485 3 ปีที่แล้ว

    Great video!

  • @johntobin9404
    @johntobin9404 ปีที่แล้ว +2

    Question. Emailing a document takes seconds. When the document arrives, it arrives. How could someone have changed the document in between the sending and the receiving? To have altered the document, someone would have to have intercepted it and then changed it. This is a question of time. To intercept something and then change it, wouldn't that mean that an email for example, was hi-jacked, went to another address, and then sent on to the ultimate receiver? If so, there would be a record of where the document went in the SMTP headers, no? How does any of this make sense?

  • @mehmetdemir-lf2vm
    @mehmetdemir-lf2vm 3 ปีที่แล้ว +1

    i didn't learn something new, but liked the video.

  • @marcello4258
    @marcello4258 2 ปีที่แล้ว +1

    we are still waiting for the "next video" you mention at the very end ;)

  • @WujuStyler
    @WujuStyler 3 ปีที่แล้ว +1

    Can you upload the next video tomorrow? I have a computer security exam on these things this coming Monday and these are very useful hahah

  • @uoweme5grand
    @uoweme5grand 2 ปีที่แล้ว +1

    If you can link the video you recommend to watch in your video that would be great...

  • @user-or7ji5hv8y
    @user-or7ji5hv8y 3 ปีที่แล้ว

    in my opinion, I think he's the best explainer of complicated topics.

  • @charan_75
    @charan_75 ปีที่แล้ว +1

    How would we know what kind of hash functions to use to verify the received the document?

  • @fractal_lynn
    @fractal_lynn 3 ปีที่แล้ว

    Nice a new computerphile vid

  • @Jasruler
    @Jasruler 3 ปีที่แล้ว +4

    Mike is the best. I really want to hear him talk about what he likes about C#.

  • @SuperCrazyfin
    @SuperCrazyfin 3 ปีที่แล้ว +6

    Computerphile Time!

  • @PranayZVlogs
    @PranayZVlogs 3 ปีที่แล้ว +8

    boom perfectly timed, in the morning i have to give a viva exam on Internet an Network Security!

  • @edoardottt
    @edoardottt 3 ปีที่แล้ว +2

    Thx Mike!!!

  • @muji_dipto
    @muji_dipto 3 ปีที่แล้ว +1

    so glad i no longer have to hear the sound of marker on paper, that screech gives me chills

    • @KnakuanaRka
      @KnakuanaRka 2 ปีที่แล้ว +1

      Yeah, I love Numberphile, but the merger on butcher paper sound can get annoying. @(>~

  • @fernandob7470
    @fernandob7470 2 ปีที่แล้ว +1

    How does the public keys decryp signatures and matches with private keys? Who owns the private keys´ list master file which is embedded into BTC blockchain?

  • @Sarthakz99
    @Sarthakz99 2 ปีที่แล้ว +1

    how will the verifier know what padding needs to be added before calculating the hash?

  • @vasanthdhage
    @vasanthdhage 3 ปีที่แล้ว +1

    Did anybody find the next continued video after this ?

  • @jamillhallak1844
    @jamillhallak1844 3 ปีที่แล้ว +1

    Assuming I want to send you a btc and I know your public key, but you don't know my public key.
    So I will encrypt my transfer by your public key in ecc method then i will sign it with my private key. Is that correct?
    When you recive btc, how can you varfiy it if you don't know my public key.? Is my public key sent with the encrypted transfer, and if it is, how do you know if it is my public key or something else?

  • @the_real_ch3
    @the_real_ch3 3 ปีที่แล้ว +1

    Well this is timely given the news about solarwinds

  • @nhatquang3807
    @nhatquang3807 3 ปีที่แล้ว

    I love computerphile's videos like this, but can you guys do me a favor, please add the English subtitle since many of your audience is not native English speaker (like me). Thanks a lot.

  • @wellingsrob4
    @wellingsrob4 ปีที่แล้ว +1

    Hi Guys,
    When you sign an e-document (a contract) on a mobile device such as a tablet (with multiple signature boxes), do those signatures have timings that are part of a digital footprint (so-to-speak), that can be revisited at anytime to see when and what time a signature box was signed?
    Thanks in advance.

    • @WolkenDesigns
      @WolkenDesigns ปีที่แล้ว

      Hello Rob,
      this largely depends on the way this box is implememted. Usually these store a small amount of data such as the digital representation of the signature and a timestamp. Quite often this is not verified (even though possible via Timeservers). These basic signatures largely have only the effect of a tick in a checkbox.

    • @wellingsrob4
      @wellingsrob4 ปีที่แล้ว

      @@WolkenDesigns
      Thanks for your reply. Much appreciated. 👍🏻

  • @miketoreno4969
    @miketoreno4969 3 ปีที่แล้ว +1

    Thank you sir.

  • @Pinefenario
    @Pinefenario ปีที่แล้ว +2

    Could you guys perhaps do a video about the Dutch company Diginotar and especially what went wrong? You know a Dutch certificate issuing company that went bankrupt in 2011 after it was hacked. Maybe by the Iranian government or maybe by the NSA.

  • @MNCAMANI15
    @MNCAMANI15 3 ปีที่แล้ว +1

    Private or Symmetrical Encryption means we must both somehow know the key and that's how we'd decrypt whatever it is in question..
    Public or Asymmetric encryption means that me as the sender needs the public key, which everyone might know, of the receiver, so I can send the document there and the reciever will decrypts with the private key
    Question then: If the signing off, or digital signature needs to happen by me as the sender with my private key, and is decryptable with my public key which is public knowledge, then can't anyone decrypt the signature with my public key, or is the message as a whole still sent to the public key of the sender??

  • @user-wy9xi6gh9w
    @user-wy9xi6gh9w 2 ปีที่แล้ว +1

    if someone was in the middle of a digital signature between person a and b couldnt they(person m) hash the email/text and sign it with their own key and send that to person b. Then when person b sends an email back to a, person m can hash the email and send a resigned version back to a?

    • @15justt
      @15justt 2 ปีที่แล้ว

      Well, A would try to decrypt the email/file with B's public key, and it wouldn't work because it would be signed by M instead of B

  • @diegoramos27
    @diegoramos27 3 ปีที่แล้ว +2

    How can the public key decrypt something that the private key encrypted? I thought the main idea was that whatever is encrypted with the public key can only be decrypted using the private key ?

    • @15justt
      @15justt 2 ปีที่แล้ว

      It works both ways:
      Encrypt with public key -> only decrypt through private key
      Encrypt with private key -> only decrypt through public key

  • @jasonsmith8548
    @jasonsmith8548 3 ปีที่แล้ว +1

    Doc should start his own channel

  • @cynx6245
    @cynx6245 3 ปีที่แล้ว +1

    Mike always looks like he's about to burst out laughing

  • @tomaustine3881
    @tomaustine3881 ปีที่แล้ว +1

    Where is the video on public key infrastructure he mentioned?

  • @climatechangedoesntbargain9140
    @climatechangedoesntbargain9140 3 ปีที่แล้ว

    Can you make a video about the Matrix Protocol?

  • @RakeshKumar-ri2hk
    @RakeshKumar-ri2hk 3 ปีที่แล้ว

    I will say one the I first time watched your video almost 5 year back in 2016 and your look didn't changed from 2016 to 2021 now

  • @CarlTSpeak
    @CarlTSpeak 3 ปีที่แล้ว

    Yep, cool beans.
    Usual thing is negotiating the ciphers, then using RSA to encrypt the AES or whatever other symmetrical cipher key.
    Best of both worlds.

  • @anthonyalbertorio5180
    @anthonyalbertorio5180 3 ปีที่แล้ว +1

    Thanks!

  • @shernaj255
    @shernaj255 2 ปีที่แล้ว

    So I receive an email with a digital signature. How do I verify the authenticity of the signature in the email.

  • @OmarQunsul
    @OmarQunsul 3 ปีที่แล้ว

    I wish that it doesn't switch often and quick between Mike and the sketch. Everytime I want to read the sketch it. Around 4:00 and 4:30 for example

  • @NiCeDarox
    @NiCeDarox 2 ปีที่แล้ว +1

    Why should hashing ever lead to data compression? Don't computer already use the most efficent data compression method possible for regular communication?

  • @lawrencedoliveiro9104
    @lawrencedoliveiro9104 3 ปีที่แล้ว +5

    0:38 “Not that quick” as in “a thousand times slower than secret-key encryption such as with AES”.

    • @666Tomato666
      @666Tomato666 3 ปีที่แล้ว +1

      would it by just a thousand times slower? if openssl can do 2000 private key operations per second with 2048 bit keys, that translates to about 480KiB/s throughput. With AES-128-GCM and AES-NI acceleration you should be getting something like 4GiB/s on the same CPU, so it's like 10 thousand times slower

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      @@666Tomato666 I remember seeing a factor of 3000 times, so you’re not too far off.
      Also remember you’re not comparing like with like: hardware acceleration for AES versus none for RSA.

    • @666Tomato666
      @666Tomato666 3 ปีที่แล้ว

      @@lawrencedoliveiro9104 oh, true, but hardware acceleration for AES is very common, hardware acceleration for RSA is in custom hardware with price tag in the 4+ digit range (garden variety smartcards are not accelerators, they barely achieve 1op/s)

  • @hogofwar0
    @hogofwar0 3 ปีที่แล้ว +1

    so what is the best software applications to protect your computer?, and could you disable a computer if you had its IP?

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      1) Avoid using Microsoft Windows.

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      @Dusty 99 If avoiding unnecessarily complex OSes is “lazy”, I don’t wanna be hardworking!

    • @WujuStyler
      @WujuStyler 3 ปีที่แล้ว

      @@lawrencedoliveiro9104 Most people don't have a choice about this, as some of the software people need is proprietary Windows stuff. And Apple like their customers' money just a bit too much.

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      @@WujuStyler So far the only ones insisting on using Windows are gamers.

  • @recklessroges
    @recklessroges 3 ปีที่แล้ว +20

    When's he going to talk about hashing? /s

  • @percyblakeney3743
    @percyblakeney3743 3 ปีที่แล้ว

    This man understands the importance of a naked room.

  • @user-wy9xi6gh9w
    @user-wy9xi6gh9w 2 ปีที่แล้ว

    if someone was in the middle couldnt they trick the verifier?
    For example, A(signer) sends document to verify to C(verifier) through B (B is in the middle. B forwards doc to C.)
    A sends encrypted doc to C through B.
    If B resigns the document with their private key, then when C will just verify it was signed with C's public key correct?

    • @15justt
      @15justt 2 ปีที่แล้ว

      A little late to the party, but I think the explanation is this:
      C tries to decrypt the document signed by B with A's public key. This won't yield the correct results, as it was not signed with A's private key.
      Of course this means that the public key that C has from A is not tampered with. This is the job of PKI (Public Key Infrastructure)

  • @rusiraliyanage6643
    @rusiraliyanage6643 ปีที่แล้ว +1

    how to solve the issue of somebody generating digital certificates on behalf of somebody and sharing ? ... that issued certificate won't represent the actual user :)

  • @chrisphilip8040
    @chrisphilip8040 6 หลายเดือนก่อน

    Have they made a video talking more in detail about PKI?

  • @zaxtx
    @zaxtx 3 ปีที่แล้ว +1

    Why are your videos not translated?

  • @ravendfj
    @ravendfj 2 ปีที่แล้ว

    Hi, first thanks. What is RSA? Does it do the hash claculation?

    • @15justt
      @15justt 2 ปีที่แล้ว

      No, RSA deals with the public/private keys, SHA256 deals with the hashes.

  • @MrYosssup
    @MrYosssup 3 ปีที่แล้ว +1

    12 people actually transmit all their information in clear text

  • @Boitotron
    @Boitotron 3 ปีที่แล้ว +1

    I can't wait to see the PKI video

  • @aaronbaldwin4900
    @aaronbaldwin4900 2 ปีที่แล้ว +1

    Dude is so articulate

  • @albinoasesino
    @albinoasesino 3 ปีที่แล้ว +2

    I don't think this is the right forum to discus this but,
    "Digital Signatures should not replace Wet or Electronic Signatures, rather they should complement traditional signing methods"

  • @msboutin
    @msboutin 11 หลายเดือนก่อน +1

    If I encrypt the digital signature with my private key, then the receiver decrypts the digital signature with the public key, couldnt anyone in the middle just decrypt it? Seems unsecure? Am I missing something?

    • @pjingpjong
      @pjingpjong หลายเดือนก่อน

      A bit late but
      I believe the client also sents its public key to the server. So the server encrypts the response with the client pub key and only the client can decrypt it with its private key

  • @PauxloE
    @PauxloE 3 ปีที่แล้ว +4

    People need to stop explaining signing as "encryption with private key" and verification as "decryption with the public key", at least if you want to explain signatures in general.
    This kinda works for textbook RSA (where the encryption and decryption are just exponentiation), but not for most other signature schemes. Several of those don't even have a corresponding encryption scheme.

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      Actually, I think they all do. Wasn’t DSA designed as an alternative to RSA that was only useful for signatures, not encryption? And didn’t somebody discover that you could use it for encryption, albeit very clumsily and inefficiently?

    • @Theferg1
      @Theferg1 3 ปีที่แล้ว

      @paulo Ebermann where can I go study how Signatures really work?

    • @whuzzzup
      @whuzzzup 3 ปีที่แล้ว

      What are "most signature schemes" that don't use public/private keys?

    • @MrFair
      @MrFair 3 ปีที่แล้ว

      @@Theferg1 There's an excellent textbook by Jonathan Katz on that topic simply called "Digital Signatuers". Another book by Katz "Introduction to Modern Cryptography" would be a better start if you're new to crypto, though!

    • @MrFair
      @MrFair 3 ปีที่แล้ว

      Thank you, happy to see someone else comment this! Exactly my thoughts! I don't know understand why this analogy is still being used either.

  • @dhanvant.p.s6242
    @dhanvant.p.s6242 2 ปีที่แล้ว +2

    My doubt is, how does the verifier know the algorithm for hashing and padding?

  • @INeedAttentionEXE
    @INeedAttentionEXE 3 ปีที่แล้ว

    How would I go about this if I can't trust the client? Like in a game, a hacker may modify the map, how would I verify (as the server) that the hash of a map is correct? I want to also avoid the hacker from modifying the client to just send the same hash on the login.

    • @davidmcgill1000
      @davidmcgill1000 3 ปีที่แล้ว

      Request the client to encrypt a part of their game data and send it to server, then send new data to the client and expect them to encrypt the data again. Server would be knowing the correct answer, but the modified client would need to keep track of what answer it should be expecting.

    • @lawrencedoliveiro9104
      @lawrencedoliveiro9104 3 ปีที่แล้ว

      That’s called “remote attestation”. It’s impossible to trust a PC that is under the control of someone you don’t trust. Unless it has something like a TPM chip in it.
      And that gets controversial.

  • @iddoalexander4750
    @iddoalexander4750 3 ปีที่แล้ว +3

    How do you know that the public key you use to decrypt the signature really belongs to who you think you're communicating with, and not some man-in-the-middle that identified as them instead?
    If the MIIN does this signature verification with each of the parties, they won't know about it

    • @estebangomez1823
      @estebangomez1823 3 ปีที่แล้ว

      Because of the digital certificates, that will contain the public key and also the digital signature

    • @Lucas-md8gg
      @Lucas-md8gg 7 หลายเดือนก่อน

      ​@@estebangomez1823 we can still emit false certificates too

  • @keithminter
    @keithminter 3 ปีที่แล้ว +1

    Need to sort your audio compression out (DB dynamic range, as in the audio plugin you are using , not file size haha). The attack is way too long, for spoken word set to quickest possible so the first part of a sentence doesn't keeping jumping out of people's speakers. You're welcome.

    • @Computerphile
      @Computerphile  3 ปีที่แล้ว +1

      Sorry, this is actually the inbuilt compressor in Mike's camera. It sparked some conversation afterwards :) (when I ask a Q, his gain climbs and by the time he answers the compressor crashes in and the gradually eases off the gain until next question...) -Sean

    • @keithminter
      @keithminter 3 ปีที่แล้ว

      @@Computerphile :)

  • @BossManTee
    @BossManTee 3 ปีที่แล้ว

    What happened to next video?

  • @olmostgudinaf8100
    @olmostgudinaf8100 3 ปีที่แล้ว +4

    I am comfortable with the _concept_ of "digital signatures" but something has always troubled me about the _term._ I just never could put a finger on it... until now.
    A "signature" is something you _generate_ every time you use it. You do not carry a stack of them with you to attach to documents. You do not even need to carry the tools (a pen), someone may lend you one. The one thing you _do_ carry (the muscle memory) can be considered an _algorithm._
    What we call "digital signatures" is probably better described as "digital stamps".

    • @trogdorstrngbd
      @trogdorstrngbd 3 ปีที่แล้ว

      I don't quite understand what you're saying. Your computer does generate a new digital signature every time it sends out a new message that requires it.

    • @olmostgudinaf8100
      @olmostgudinaf8100 3 ปีที่แล้ว

      @@trogdorstrngbd Do you really? I have been "digitally signing" Windows drivers for _years._ You generate the signature _once,_ then attach it to every instance. Embedded firmware tends to be even worse: you do not even generate a new signature for every release. You get _one_ for a company and every firmware release from that company is "signed" with the same one.
      As I say, they are more like rubber stamps than "signatures".

    • @trogdorstrngbd
      @trogdorstrngbd 3 ปีที่แล้ว

      @@olmostgudinaf8100 I see what you're getting at now. I was focusing on that a new signature is generated every time for a _new_ file, whereas you're focusing on the signature being the same (and therefore more like a stamp) when the _same_ file is being distributed over and over to different computers. Note that I am making a distinction between the signature (different for each file) and the Code Signing Certificate (which the company uses over and over until it expires).

  • @Derbauer
    @Derbauer 3 ปีที่แล้ว +1

    More encryption videos from THIS GUY. Or do a video on VPN's.

  • @bruinflight1
    @bruinflight1 3 ปีที่แล้ว +1

    How do we know the certification authorities aren't controlled by the likes of the NSA, for example?

  • @klyanadkmorr
    @klyanadkmorr 3 ปีที่แล้ว +1

    POWND da THUMBS UP!

  • @petephelp971
    @petephelp971 ปีที่แล้ว +1

    Arent hashes one way functions how would you decrypt that or know what the hash should look like after its been sent. Basically if you can't decrypt a hash how does this integrity check really work? Like to me this is really confusing you send the hash to the "Verifier" but can't decrypt it how do you know it wasn't modified. I suppose if you just hash a copy but that hash copy could get modified! (This comment is probably mind boggling especially cause I'm not sure how I should ask this question"

    • @Ort618
      @Ort618 5 หลายเดือนก่อน +1

      Arent hashes one way functions how would you decrypt that

    • @petephelp971
      @petephelp971 5 หลายเดือนก่อน +1

      @@Ort618 I was trying to understand how assymetric encryption (Public & private key) worked.
      I understand it now. Pretty simple when I realized both the client and server would participate.