Blockchain tutorial 6: Digital signature

  Рет қаралды 42,425

Mobilefish.com

Mobilefish.com

Күн бұрын

Пікірлер: 40
@stefanoruns
@stefanoruns 3 жыл бұрын
Excellent video. At last somebody who goes beyond saying "the sender signs the transaction with his/her private key to generate a digital signature that allows the receiver to verify identity and message", and actually show how this is done!!!!
@TellaTrix
@TellaTrix 7 жыл бұрын
The way you explain this term is awesome
@zhenminliu
@zhenminliu 7 жыл бұрын
Hi, this tutorial on digital signature is getting into the complex part of block chain. Tutorial 6 needs to be view several times for a proper understanding. Not easy, but it's intriguing. Thanks for the tutorial.
@fakhredin100
@fakhredin100 4 жыл бұрын
In 2:24, he says the data which is the document is now hashed which gives hash value for comparison. My question is how Bob has the actual data? wasn't he supposed to be the receiver? According to the explanation, so-far he has only decrypted the digital signature which gave him the original hash value which is not the actual data. Can someone please explain. Thank you!
@salarhussain6189
@salarhussain6189 3 жыл бұрын
bob has the actual data. bob is only trying to verify that the sender of data is alice and the data is not changed in any way. So bob rehashes the actual data and decrypts the digital signature using alice's public key to get the hash that will be compared
@KurtBogaert
@KurtBogaert 2 жыл бұрын
@@salarhussain6189 which actually means Alice will send 3 pieces of information to Bob : the document unencrypted, her digital signature AND the public key (to decrypt the digital signature to get hash A and to hash the text to get hash B). Right?
@coronhardman9718
@coronhardman9718 2 жыл бұрын
Bob receives two separate things: 1) the document and 2) the digital signature, separately. Remember, the digital signature is encrypted with both the document and private key together.He puts the 1) document through the hash and creates that hash value. And then he decrypts the 2) signature with her public key), which reveals another hash value for the document. Then he compares both of those values to make sure that they are exactly the same.
@deepakguru7791
@deepakguru7791 6 жыл бұрын
Thanks for clearing explaining the confusing topic.
@RahulSaini-wu2rl
@RahulSaini-wu2rl 6 жыл бұрын
hi mobilefish , you really a greate explainer, i tried many videos and artical but you are awesome
@mfahad5
@mfahad5 4 жыл бұрын
U are amaizng mannn... U are Making crypto easier by your lectures thanks alot man. High respect for u 🌹
@2030beau
@2030beau 6 жыл бұрын
very nice ... thanks for the demo and very clear.
@Murugavel-ee123
@Murugavel-ee123 Жыл бұрын
Is there will be a validation for this document by other nodes!?
@darrenditto9824
@darrenditto9824 5 жыл бұрын
Great explanation!
@_darkerblue
@_darkerblue Жыл бұрын
have watched this multiple times,but couldn't understand one part - Alice first hashes the data then uses pvt key to encrypt the hash but why hash the data in the first place when you can simply encrypt the data?
@ianbates_
@ianbates_ 6 жыл бұрын
Thank you! Brilliant! Bravo! This really helped!
@MastaChafa
@MastaChafa 7 жыл бұрын
Thank you! I was looking for this kind of technical explanation!
@fariman-kashani
@fariman-kashani 6 жыл бұрын
best explanation
@leeladrttit8802
@leeladrttit8802 5 жыл бұрын
What are the requirements for implementation
@prayanshsrivastava1810
@prayanshsrivastava1810 7 жыл бұрын
This series is youtube gold
@0xcoder542
@0xcoder542 7 жыл бұрын
Thank you for the video. Would you mind also explain to use the Web3.eth.sign in this case? Much appreciated.
@Mobilefish
@Mobilefish 7 жыл бұрын
I have created some Web3 API examples: www.mobilefish.com/download/ethereum/web3api.html several months ago (I am not sure if the example still works, as web3 API evolve very fast). But to be honest I have not use Web3.eth.sign in a real use case..
@0xcoder542
@0xcoder542 7 жыл бұрын
Many Thanks. Yes, Indeed. The version 1.0 is releasing soon.
@gloriagain7739
@gloriagain7739 7 жыл бұрын
always grateful~~
@vvsatyadv7053
@vvsatyadv7053 6 жыл бұрын
Different different algorithms (MD5 and sha1) give same hash function ? While checking (encryption and decryption) digital signature.? Is it possible if encryption with MD5 and decryption with sha1 algorithms ? Thanks for your tutorial.
@Mobilefish
@Mobilefish 6 жыл бұрын
1) MD5 and SHA1 are different hash functions and do not produce the same output. MD5 output size 128 bits SHA1 output size 160 bits 2) MD5 and SHA1 are hash functions, which means for example a document can be hashed to produce a unique "fingerprint". Which means you cannot create the document with this "fingerprint". Hash functions are one-way functions. MD5 and SHA1 are NOT symmetric or asymmetric key algorithms.
@hachimitsuchai
@hachimitsuchai 6 жыл бұрын
How come sometimes I need to import Crypto and sometimes I don't? i.e. sometimes just the "from Crypto.Hash import RSA" works without importing Crypto and sometimes I do have to import Crypto. Also curious why don't you use RSA 2048 instead of 1024? Isn't it more secure?
@Mobilefish
@Mobilefish 6 жыл бұрын
It is recommended that you use RSA 2048. Computers are getting stronger, key lengths less than 2048 bits are now considered deprecated by the NIST. Key use prediction: 1024-bit is OK until 2010, then 2048-bit until 2030, then 3072-bit after that. Please keep in mind, the increase in key length corresponds to an exponential increase in CPU usage. 2048 bit key lengths can take upwards of 4 times as much CPU usage compared to 1024 bit key lengths.
@hachimitsuchai
@hachimitsuchai 6 жыл бұрын
ok and when you write "from Crypto.Hash import RSA" why don't you need to import Crypto since Crypto is a python module? Thanks.
@Mobilefish
@Mobilefish 6 жыл бұрын
Sorry, do not know the answer.
@baatar
@baatar 6 жыл бұрын
Is non-repudiation really enforceable under this scheme? Somebody could have had their private key stolen from them.
@dec41rus
@dec41rus 5 жыл бұрын
Thank you!
@jiaxinl.5097
@jiaxinl.5097 7 жыл бұрын
Thank you. is it possible we can have the slides?
@Mobilefish
@Mobilefish 7 жыл бұрын
All slides can be found at: www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html
@user-rp9iis1en6h
@user-rp9iis1en6h 7 жыл бұрын
thank you very much.
@RahulSaini-wu2rl
@RahulSaini-wu2rl 6 жыл бұрын
i am working on web3 and try to use web3.eth.call() but struggling to find a right way to apply this one
@Mobilefish
@Mobilefish 6 жыл бұрын
Sorry, but I have never used that api call before. I did not find a use for it...
@gianlucacucchietti5533
@gianlucacucchietti5533 7 жыл бұрын
Thanks!!
@blacksea3677
@blacksea3677 5 жыл бұрын
Please give me the file SHA256, RSA, Random. thank you
@web3dopamine
@web3dopamine 7 жыл бұрын
wher can i get the python files which you have shown in this video and previous video of cryptography ?
Blockchain tutorial 7: Modulo operation
4:18
Mobilefish.com
Рет қаралды 10 М.
Blockchain tutorial 11: Elliptic Curve key pair generation
18:58
Mobilefish.com
Рет қаралды 60 М.
I Sent a Subscriber to Disneyland
0:27
MrBeast
Рет қаралды 104 МЛН
24 Часа в БОУЛИНГЕ !
27:03
A4
Рет қаралды 7 МЛН
Digital Signatures - Data authenticity and integrity protection
9:27
Blockchain 101 - A Visual Demo
17:50
Anders Brownworth
Рет қаралды 2,8 МЛН
Cryptocurrency. Part Five: Transaction Validation
18:05
Computer Science Lessons
Рет қаралды 10 М.
John McAfee: about blockchain, bitcoins and cyber security
37:51
How to Web
Рет қаралды 855 М.
But how does bitcoin actually work?
25:16
3Blue1Brown
Рет қаралды 16 МЛН
ECDSA Signatures | How does ECDSA work and what are Elliptic Curves?
10:10
Ciara Nightingale
Рет қаралды 2,7 М.
What is Blockchain
13:58
zlotolow
Рет қаралды 3,3 МЛН
Introduction to Cryptography in Blockchain Explained | Blockchain Cryptography
8:58
How to Trace Bitcoin Transactions (and avoid yours being traced)
14:25
I Sent a Subscriber to Disneyland
0:27
MrBeast
Рет қаралды 104 МЛН