Excellent video. At last somebody who goes beyond saying "the sender signs the transaction with his/her private key to generate a digital signature that allows the receiver to verify identity and message", and actually show how this is done!!!!
@zhenminliu7 жыл бұрын
Hi, this tutorial on digital signature is getting into the complex part of block chain. Tutorial 6 needs to be view several times for a proper understanding. Not easy, but it's intriguing. Thanks for the tutorial.
@RahulSaini-wu2rl6 жыл бұрын
hi mobilefish , you really a greate explainer, i tried many videos and artical but you are awesome
@deepakguru77916 жыл бұрын
Thanks for clearing explaining the confusing topic.
@mfahad53 жыл бұрын
U are amaizng mannn... U are Making crypto easier by your lectures thanks alot man. High respect for u 🌹
@2030beau5 жыл бұрын
very nice ... thanks for the demo and very clear.
@darrenditto98245 жыл бұрын
Great explanation!
@ianbates_6 жыл бұрын
Thank you! Brilliant! Bravo! This really helped!
@MastaChafa7 жыл бұрын
Thank you! I was looking for this kind of technical explanation!
@prayanshsrivastava18107 жыл бұрын
This series is youtube gold
@fariman-kashani6 жыл бұрын
best explanation
@Murugavel-ee123 Жыл бұрын
Is there will be a validation for this document by other nodes!?
@_darkerblue Жыл бұрын
have watched this multiple times,but couldn't understand one part - Alice first hashes the data then uses pvt key to encrypt the hash but why hash the data in the first place when you can simply encrypt the data?
@dec41rus5 жыл бұрын
Thank you!
@user-rp9iis1en6h7 жыл бұрын
thank you very much.
@gloriagain77397 жыл бұрын
always grateful~~
@fakhredin1004 жыл бұрын
In 2:24, he says the data which is the document is now hashed which gives hash value for comparison. My question is how Bob has the actual data? wasn't he supposed to be the receiver? According to the explanation, so-far he has only decrypted the digital signature which gave him the original hash value which is not the actual data. Can someone please explain. Thank you!
@salarhussain61893 жыл бұрын
bob has the actual data. bob is only trying to verify that the sender of data is alice and the data is not changed in any way. So bob rehashes the actual data and decrypts the digital signature using alice's public key to get the hash that will be compared
@KurtBogaert2 жыл бұрын
@@salarhussain6189 which actually means Alice will send 3 pieces of information to Bob : the document unencrypted, her digital signature AND the public key (to decrypt the digital signature to get hash A and to hash the text to get hash B). Right?
@coronhardman97182 жыл бұрын
Bob receives two separate things: 1) the document and 2) the digital signature, separately. Remember, the digital signature is encrypted with both the document and private key together.He puts the 1) document through the hash and creates that hash value. And then he decrypts the 2) signature with her public key), which reveals another hash value for the document. Then he compares both of those values to make sure that they are exactly the same.
@0xcoder5426 жыл бұрын
Thank you for the video. Would you mind also explain to use the Web3.eth.sign in this case? Much appreciated.
@Mobilefish6 жыл бұрын
I have created some Web3 API examples: www.mobilefish.com/download/ethereum/web3api.html several months ago (I am not sure if the example still works, as web3 API evolve very fast). But to be honest I have not use Web3.eth.sign in a real use case..
@0xcoder5426 жыл бұрын
Many Thanks. Yes, Indeed. The version 1.0 is releasing soon.
@gianlucacucchietti55337 жыл бұрын
Thanks!!
@vvsatyadv70536 жыл бұрын
Different different algorithms (MD5 and sha1) give same hash function ? While checking (encryption and decryption) digital signature.? Is it possible if encryption with MD5 and decryption with sha1 algorithms ? Thanks for your tutorial.
@Mobilefish6 жыл бұрын
1) MD5 and SHA1 are different hash functions and do not produce the same output. MD5 output size 128 bits SHA1 output size 160 bits 2) MD5 and SHA1 are hash functions, which means for example a document can be hashed to produce a unique "fingerprint". Which means you cannot create the document with this "fingerprint". Hash functions are one-way functions. MD5 and SHA1 are NOT symmetric or asymmetric key algorithms.
@leeladrttit88025 жыл бұрын
What are the requirements for implementation
@baatar5 жыл бұрын
Is non-repudiation really enforceable under this scheme? Somebody could have had their private key stolen from them.
@hachimitsuchai6 жыл бұрын
How come sometimes I need to import Crypto and sometimes I don't? i.e. sometimes just the "from Crypto.Hash import RSA" works without importing Crypto and sometimes I do have to import Crypto. Also curious why don't you use RSA 2048 instead of 1024? Isn't it more secure?
@Mobilefish6 жыл бұрын
It is recommended that you use RSA 2048. Computers are getting stronger, key lengths less than 2048 bits are now considered deprecated by the NIST. Key use prediction: 1024-bit is OK until 2010, then 2048-bit until 2030, then 3072-bit after that. Please keep in mind, the increase in key length corresponds to an exponential increase in CPU usage. 2048 bit key lengths can take upwards of 4 times as much CPU usage compared to 1024 bit key lengths.
@hachimitsuchai6 жыл бұрын
ok and when you write "from Crypto.Hash import RSA" why don't you need to import Crypto since Crypto is a python module? Thanks.
@Mobilefish6 жыл бұрын
Sorry, do not know the answer.
@jiaxinl.50977 жыл бұрын
Thank you. is it possible we can have the slides?
@Mobilefish7 жыл бұрын
All slides can be found at: www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html
@RahulSaini-wu2rl6 жыл бұрын
i am working on web3 and try to use web3.eth.call() but struggling to find a right way to apply this one
@Mobilefish6 жыл бұрын
Sorry, but I have never used that api call before. I did not find a use for it...
@blacksea36775 жыл бұрын
Please give me the file SHA256, RSA, Random. thank you
@web3dopamine6 жыл бұрын
wher can i get the python files which you have shown in this video and previous video of cryptography ?