Digital Signature Algorithm (DSA) - Cryptography - Practical TLS

  Рет қаралды 59,106

Practical Networking

Practical Networking

2 жыл бұрын

The Digital Signature Algorithm (DSA) is an Asymmetric Encryption algorithm... but it's different from the other Asymmetric Encryption algorithms we've discussed (RSA & DH). DSA has only two functions: Signature Generation and Signature Verification. It cannot do Encryption, it cannot do Decryption, it cannot do a Key Exchange. It's use is purely creating and verifying Signatures, which provides Integrity and Authentication to what is signed.
This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
🔐 More details about the course:
classes.pracnet.net/courses/p...
🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
💬 Join Practical Networking Discord
/ discord
🖧 Want to learn how how data moves through a network?
• Networking Fundamentals
Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100

Пікірлер: 36
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
👉 *More free lessons:* kzbin.info/aero/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY ✨ *Full course:* pracnet.net/tls 💲 *Coupon Code* for 50% off: youtube50
@VideosfromElle
@VideosfromElle 2 жыл бұрын
I'll be signing up for the class Friday 😀 I have watched so many of your videos, it's the least I can do lol Absolutely confident it's worth every penny!
@lizgm1723
@lizgm1723 5 ай бұрын
Visuals were a perfect complement to explanation. Thank you.
@tarikibouzidene6399
@tarikibouzidene6399 Жыл бұрын
So clear, you are the best trainer ever I follow.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Thank you for the kind words, Tarik. Cheers.
@askaripayalo8191
@askaripayalo8191 Жыл бұрын
Thank you for sharing knowledge.
@rotorfpv4117
@rotorfpv4117 2 ай бұрын
Very informative, thanks
@IliyaDamyanov
@IliyaDamyanov 7 ай бұрын
Very good explanation.
@nournote
@nournote 5 ай бұрын
Perfectly summarized
@lherfel
@lherfel Жыл бұрын
thanks, very nice overview
@citizenoftheworldsz9
@citizenoftheworldsz9 Жыл бұрын
simply excellent!
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Thank you =)
@krishnamohanyerrabilli4040
@krishnamohanyerrabilli4040 Жыл бұрын
Clearly understood thankyou.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
you're welcome, Krishnamohan
@Don-Carillo
@Don-Carillo 2 жыл бұрын
Thanks very much,. it would be good to explain how a certificate in a chain uses the public key of the cert above it in the chain to verify it. I am probably not explaining very well but how it uses it to decyrpyt the signature that has been signed by the CA private key. Hope that makes some sense :)
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
Hey Don. All that is unpacked in the full TLS course. It's on sale now if you want instant access.
@upelister
@upelister Жыл бұрын
Thank you.
@PracticalNetworking
@PracticalNetworking Жыл бұрын
You're welcome, Umut =)
@arunsankpal4219
@arunsankpal4219 2 жыл бұрын
Thank you sir 🙏 🇮🇳
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
You're welcome!
@ayradizem2770
@ayradizem2770 2 жыл бұрын
Thank you for the video, we need an exemple where to use this algorithms with practucal, also I will begin to learn how to use GNS3 for to practise my knowledge in network,, can I practise this video in GNS3?? thank you in advance
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
The end user rarely uses the algorithms themselves. But they use software which then make use of the example. For instance, you use a web browser, which makes HTTPS connections... your webbrowser uses the algorithms in the process of creating the HTTPS/SSL connection.
@ayradizem2770
@ayradizem2770 2 жыл бұрын
@@PracticalNetworking thank you for your explain
@pickle1987
@pickle1987 11 ай бұрын
Hello, can you please do a video about the ed25519 vs rsa? I've heard ed25519 is more secure and fast
@PracticalNetworking
@PracticalNetworking 11 ай бұрын
I have plans to one day cover elliptic curves entirely.
@Cutrexxx
@Cutrexxx 2 жыл бұрын
can ecdsa also only sinature a massege?
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
Yes. ECDSA is like DSA in so far as what it can be used for. In fact, all the "EC" variants are simply the same core protocols done with Elliptic Curves. More details here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
@rafay1708
@rafay1708 2 жыл бұрын
Thanks
@PracticalNetworking
@PracticalNetworking 2 жыл бұрын
You're welcome!
@admin_e
@admin_e 2 жыл бұрын
👍👍👍
@dan5640
@dan5640 Жыл бұрын
why is it called asymmetric encryption if it doesn't actually encrypt?
@PracticalNetworking
@PracticalNetworking Жыл бұрын
Great question =). You're right, Asymmetric Encryption is _not_ the best terminology. I wrote about that here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/ _"some might even hesitate to use the term “Asymmetric Encryption” for these algorithms, and instead elect to use “Asymmetric Cryptosystem” - since again, only one of these algorithms involves actual “encryption”._
@thestudy6875
@thestudy6875 13 күн бұрын
Came to the comments to see if anyone else was scratching their head on this one too!
@fugoogle_was_already_taken
@fugoogle_was_already_taken 11 күн бұрын
It is asymetric cryptography/cryptosystem, not encryption. There are cryptographic capabilities. Some of them are key exchange (like diffie helman), encryption (like rsa) and authentication (like digital signatures, rsa). There are many cryptographic protocols/schemes, but not all of them provide all the cryptographic capabilities. For example, you cannot use diffie helman for encryption. Because its just not possible. You can use it for key exchange, and then use symetric cryptography for encryption, but you cannot encrypt anything with diffie helman.
@Liltheo626
@Liltheo626 21 күн бұрын
Okay
@user-mf8nn3tl5w
@user-mf8nn3tl5w Ай бұрын
I saw its math somewhere else I hoped you'd get into the math part 🥲
TLS / SSL - The complete sequence - Practical TLS
6:15
Practical Networking
Рет қаралды 72 М.
Indian sharing by Secret Vlog #shorts
00:13
Secret Vlog
Рет қаралды 56 МЛН
어른의 힘으로만 할 수 있는 버블티 마시는법
00:15
진영민yeongmin
Рет қаралды 9 МЛН
Digital Signature Algorithm (DSA) in Network Security
12:17
Chirag Bhalodia
Рет қаралды 49 М.
Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
11:42
Digital Signatures and Digital Certificates
11:22
Computer Science
Рет қаралды 173 М.
Digital Signatures - Data authenticity and integrity protection
9:27
What is SSL & TLS ?   What is HTTPS ?   What is an SSL VPN? - Practical TLS
7:34
Practical Networking
Рет қаралды 136 М.
2 - Cryptography Basics - Digital Signature
5:17
CBTVid
Рет қаралды 26 М.
POCO F6 PRO - ЛУЧШИЙ POCO НА ДАННЫЙ МОМЕНТ!
18:51
Apple, как вас уделал Тюменский бренд CaseGuru? Конец удивил #caseguru #кейсгуру #наушники
0:54
CaseGuru / Наушники / Пылесосы / Смарт-часы /
Рет қаралды 4,5 МЛН
How charged your battery?
0:14
V.A. show / Магика
Рет қаралды 2,9 МЛН
Xiaomi Note 13 Pro по безумной цене в России
0:43
Простые Технологии
Рет қаралды 1,9 МЛН
Mi primera placa con dios
0:12
Eyal mewing
Рет қаралды 409 М.
How much charging is in your phone right now? 📱➡️ 🔋VS 🪫
0:11