this is the only video you need to watch if you want a practical understanding of digital signatures
@ramasif99834 жыл бұрын
This is by far the most simple explanation of the presented concepts - in a way that everyone understands it and from then can move on to the more complicated parts. Excellent.
@seetsamolapo5600 Жыл бұрын
Wow! This might be the best video on data integrity and data authentication - digital signatures rely on asymmetric cryptography.
@kadircangulde23222 жыл бұрын
Such an explanation with downgraded complexity, but with an upgraded realization. Exceptionally wonderful.
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@mostinho74 жыл бұрын
Done thanks 0:15 explaining RSA 1:30 digital signatures: it doesn’t matter what key we encrypt with (public or private) the message can only be decrypted with the other key. A message can be digitally signed by encrypting it with the private key and then others can verify the signature by decrypting with public key. 3:58 digital signature example 5:40 sender hashes the message, encrypts the hash with their private key. Receiver decrypts the hash with the sender’s public key, and if it matches the message then receiver knows message came from sender 7:00 why we need digital certificates on top of digital signatures. Someone could be pretending to be the sender, and digitally signs the message. The receiver has no way of verifying the sender’s identity. Digital certificates is how the receiver can verify that a public key actually belongs to the sender 8:00 how certificate authority works
@reduser774 жыл бұрын
2 days on the internet trying to understand this subject , your 11 min video made it , thank you alot !
@ComputerScienceLessons4 жыл бұрын
Glad to be of service :)KD
@morshedulislamriaad64963 жыл бұрын
You deserve an Oscar for that kind of explanation .
@ComputerScienceLessons3 жыл бұрын
Thank you. I'll start writing my speech. :)KD
@3a1Va1 Жыл бұрын
Used this video to get my Sec+ a few years back now... Back to refresh myself on this for my SSCP. Awesome video. Thank you so much!
@saikrishnasunkam43444 жыл бұрын
This is the single best illustration/explanation of this concept on the internet. Keep making these videos man, you've got talent.
@ComputerScienceLessons4 жыл бұрын
Thank you :)KD
@fromdil6470 Жыл бұрын
Thank you for simplifying the concept of digital keys and explaining the role of hashing in it. Your explanation has made it easy for anyone to understand these complex theories.
@ComputerScienceLessons Жыл бұрын
You are most welcome :)KD
@ITTechTips4You3 жыл бұрын
Perfect! At 6:19 I first thought you made a mistake but after finnishing the whole video you carefully explain how a CA works. Brilliant. Thank you.
@ComputerScienceLessons3 жыл бұрын
You are very welcome.
@vijayjangid89674 жыл бұрын
This channel is underrated!
@ComputerScienceLessons4 жыл бұрын
Thank you :)KD
@ashokantony6945 жыл бұрын
Studying for CCNA Cyberops , the Cisco documentation on this is a complete mess. This video is pure gold , incredibly simple and clear. Thank you sir , keep up the great work . On more subscriber for your great channel :)
@zakariyaal28484 жыл бұрын
Exactly here for the same reason, good luck on you exam.
@soamesphares5 жыл бұрын
You have talent to explain concepts...Thank you
@ComputerScienceLessons5 жыл бұрын
You're very kind. Thanks for the comment. :)KD
@ShijenN3 жыл бұрын
This is the best explanation of digital certificates and digital signature i have come across. Thank you :)
@ComputerScienceLessons3 жыл бұрын
Thank you :)KD
@jyoti92733 жыл бұрын
It's crystal clear the way you explain and demonstrate with animation.
@ComputerScienceLessons3 жыл бұрын
Thank you :)KD
@AliShaikh_7442 жыл бұрын
I love the narration, the humour, the analogies and the simple and easily understandable format. Thank you!
@ComputerScienceLessons2 жыл бұрын
You are most welcome :)KD
@seetsamolapo5600 Жыл бұрын
@@ComputerScienceLessonsthe explanation is phenomenal sir. I wish you could make more videos on cybersecurity topics esp security+. I'd gladly join your patteon
@VishalKumar-hn7mi Жыл бұрын
Thanks for this amazing video, it helped me understand digital signature more better
@billchen49234 жыл бұрын
Amazing teaching. After viewing this video, finally I can understand the concept clearly.
@nguyentrananhnguyen79004 жыл бұрын
you took 10 minutes to teach me whatever my teacher trying to teach me in 3 hours, damn !!!
@ComputerScienceLessons4 жыл бұрын
Glad to help :)KD
@gittesilberglarsen12622 жыл бұрын
wow! that is very well made. direct, clear and no annoying repetitions
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@amir_shayesteh_tabar2 жыл бұрын
10 from 10! so easy to understand, A good lesson for other KZbinrs talking about Digital Signature!
@Jonathan-dy9ju10 ай бұрын
THanks so much for this video, Fought hours to understand this
@cajuncajun1832 жыл бұрын
exceptionally clear and easy to understand
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@rushedhu4 жыл бұрын
Best video about digital certificates ever.
@ComputerScienceLessons4 жыл бұрын
Thank you so much :)KD
@sabitkondakc91472 жыл бұрын
fabulous explanation, simple and clear.
@miraj00720042 жыл бұрын
I think I attained Nirvana after watching this! Thank you!!
@ComputerScienceLessons2 жыл бұрын
It's been a while since I've done that for anyone. You are very welcome :)KD
@petercooper34683 жыл бұрын
Finally, you explain it crystal clear! Thanks you very much!
@ComputerScienceLessons3 жыл бұрын
You're most welcome. Thanks for commenting :)KD
@aaronstones1003 жыл бұрын
This is by far the best explanation i've ever seen of this. Thanks a lot :D.
@VictoriaOtunsha Жыл бұрын
Thank for this breakdown, it gave me a better understanding of the entire concept.
@ComputerScienceLessons Жыл бұрын
You are most welcome :)KD
@sadafali45165 жыл бұрын
I cannot thank you enogh for this video. You explained it without extra info Thanks alot 👍👍👍
@ComputerScienceLessons5 жыл бұрын
You welcome. Thanks for the lovely comment. :)KD
@yeahright5663 Жыл бұрын
This is so lucid. Beautifully explained
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@naveenchandrakumar4802 жыл бұрын
Love this video. 100 out of 10 ( ten, yes ), you deciphered it properly.
@ComputerScienceLessons2 жыл бұрын
Thank you so much :)KD
@PumpkinJ363 жыл бұрын
Finally, thank you so much I've been trying to understand this for a while now.
@ComputerScienceLessons3 жыл бұрын
You're most welcome. :)KD
@geoff11214 жыл бұрын
finally, someone who puts it clearly and totally
@ComputerScienceLessons4 жыл бұрын
Thanks for the comment. Really appreciated. :)KD
@prabhuyou14 жыл бұрын
Excellent!! Explained in such a simple way. Thanks!
@ComputerScienceLessons4 жыл бұрын
Thank you too :)KD
@vincentadams3807 Жыл бұрын
This video is really nice! However there is one part I can't wrap my head around. From my understanding: 1: Person A types a message 2: Person A generates a hash of the message using sha 3: Person A encrypts the generated hash using their private key 4: Person A appends the encrypted hash to the message as a signature, and sends it to person B 5: Person B receives the message along with the signature 6: Person B decrypts the signature (encrypted hash) using person A's public key 7: Person B runs sha on the message to generate a hash. 8: Person B compares the resulting hash from the message to the hash from decrypting the signature 9: If they are the same, it;s been verified successfully. So, what's the point of the sha layer exactly? Why not simply add the message encrypted with person A's private key as a signature? In both cases only person A's public key would be able to decrypt it so I can't see how running it through sha would make a difference.
@ComputerScienceLessons Жыл бұрын
Nice question. One of the key features of a hash algorithm is that it produces a hash value of a fixed size. SHA256 for example will produce a hash value that is always 256 bits long, no matter how big the original message. This ensures that the digital signature is a manageable size, regardless of the document being signed. You might like my series on cryptocurrency which also explains the benefits of hashing. kzbin.info/aero/PLTd6ceoshprd7UngbhRHMgKXcWz4PIBEe :)KD
@ajay78183 жыл бұрын
Finally I got this concept!!! Thanks!!
@ComputerScienceLessons3 жыл бұрын
Delighted to help - it's actually a brilliantly simple idea isn't it!? :)KD
@osamaa.h.altameemi55924 жыл бұрын
Best explanation ever. Thank you Sir.
@romeo987115 жыл бұрын
What a brilliant work !
@RaiBilalHaider2 жыл бұрын
This is best and simplest explanation. Thanks
@hadisoeharto86844 жыл бұрын
Very good and clear explanation.
@DebasishMandal3 ай бұрын
In asymmetric cryptography, there are two keys: a public key and a private key. Each key has a specific role: Encryption: Typically, the public key is used to encrypt data. The corresponding private key is used to decrypt the data. Decryption: Only the private key can decrypt the data encrypted with the public key. However, the roles can be reversed in a different context, such as digital signatures: Signing: The private key is used to create a digital signature. The public key is used to verify the signature.
@wwolfram33 Жыл бұрын
@6:12 If How does Jill know that she cannot decrypt Jacks signature with his Public Key? Does the attempted decryption show a 'fail' message or code?
@ComputerScienceLessons Жыл бұрын
This functionality is built into software such as a web browser. Jill will get a message like 'could not logon' or 'transaction failed' depending on what she is trying to do. :)KD
@wwolfram33 Жыл бұрын
@@ComputerScienceLessons Thanks, this video was helpful!
@Yash-Gaikwad7 ай бұрын
Best explanation ever ❤ thanks bro
@ComputerScienceLessons7 ай бұрын
Thank you so much :)KD
@d.renewood26572 жыл бұрын
Best explanation I have seen!😁
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@sandhyachowdhary25113 жыл бұрын
Great job 👍 amazing explanation 👏 thank you so much .
@ComputerScienceLessons3 жыл бұрын
You're very welcome. 😳 :)KD
@kisme014 жыл бұрын
i just saw this one video, but this is enough reason to subscribe. whatever you post I'm gonna watch it. damn
@ComputerScienceLessons4 жыл бұрын
Welcome aboard :)KD
@程龙-b1w4 жыл бұрын
Really great video! Explained the things clearly.
@ComputerScienceLessons4 жыл бұрын
Delighted to help :)KD
@tomparke24073 жыл бұрын
1:36 Isn't the public key derived from the private key? If someone has a private key can't they generate the public key themselves?
@ComputerScienceLessons3 жыл бұрын
Hi Tom. The public and private keys are created together. They are mathematically related, very large, numbers. They are useless without each other and cannot be created independently of each other (without an impractical amount of computation - or a quantum computer). This video should clear up the relationship between the keys... :)KD kzbin.info/www/bejne/mXy6cmucbN2Xgpo
@siddharthvishnoi14892 жыл бұрын
Thank you very much for clearing the concept
@ComputerScienceLessons2 жыл бұрын
You are most welcome :)KD
@MunyaMazvimba4 жыл бұрын
simple explanation. all i can say is wow!!!!
@ComputerScienceLessons4 жыл бұрын
Thank you :)KD
@shreyashjoshi41883 жыл бұрын
Awesome explanation.best video found on this topic
@ComputerScienceLessons3 жыл бұрын
Thank you.
@pradeepvc1307 Жыл бұрын
6:44 What is the use of encrypting the hash value here using BOB Private key and sending, As however it can be decrypted by BOB's public key which is available to everyone You can directly send the hash value or use Gill public key and encrypt and send right?
@navneetiyer5 жыл бұрын
Thanks for the video. Keep up the good work 👍
@douglaskaicong1314 жыл бұрын
Wts thats just genius 👏 how people come out with these stuff
@Muwahid9994 жыл бұрын
Nice way of explaining through graphics....
@arminfisher48363 жыл бұрын
Good freaking job mate, thanks.
@ComputerScienceLessons3 жыл бұрын
TY :)KD
@RiyaTheDragonWarrior3 жыл бұрын
Wonderful video!! Thanks a lot for great explanation
@ComputerScienceLessons3 жыл бұрын
You're most welcome. Thanks for the lovely comment. :)KD
@mikespilligan14903 жыл бұрын
Lovely work well done.
@ComputerScienceLessons3 жыл бұрын
Thank you. Lovin' your name :)KD
@charanpreet22114 жыл бұрын
Great Explanation! Much appreciated
@ComputerScienceLessons4 жыл бұрын
You're very welcome :)KD
@just_shim Жыл бұрын
Amazing explanation TQ
@ComputerScienceLessons Жыл бұрын
You're most welcome :)KD
@pats.42684 жыл бұрын
"This is Bob. Bob's a builder" Man/Woman of culture, I see.
@ComputerScienceLessons4 жыл бұрын
Oh yes. I'm currently in talks wit the Teletubbies. :)KD
@tanvirkazi68893 жыл бұрын
Such a clear explanation - thank you !
@evanstayuka3812 жыл бұрын
Very well explained
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@minefox60712 жыл бұрын
Best video on the topic
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@basees20003 жыл бұрын
fantastic channel i love it
@ComputerScienceLessons3 жыл бұрын
Thank you. That's music to my ears :)KD
@sambo77344 жыл бұрын
Thank you for that. The certification authority is the bit missing from most other explanations!
@ComputerScienceLessons4 жыл бұрын
You are very welcome. :)KD
@ranapratapsingh341610 ай бұрын
The presentation is really clean.
@ComputerScienceLessons10 ай бұрын
Thank you :)KD
@tashad2005 жыл бұрын
outstanding video
@blessedzaraz67664 жыл бұрын
Excellent lesson!
@ComputerScienceLessons4 жыл бұрын
Thank you :)KD
@WangaRay3173 жыл бұрын
Thank you so much!!!! This was SOO helpful.
@ComputerScienceLessons3 жыл бұрын
You are very welcome :)KD
@ruibozhang31965 жыл бұрын
Very impressive explanation
@carmellourens34232 жыл бұрын
This is Bob, Bob is builder !!! caught me so off guard ahahhaahah
@ComputerScienceLessons2 жыл бұрын
He says he's a builder, but he's really a con artist :)KD
@danym-982 жыл бұрын
great explanation
@ComputerScienceLessons2 жыл бұрын
Thank you. You might like my crypto videos :)KD
@zamilmastaliyev6967 Жыл бұрын
great content. I wonder if it calculates different hash for different data so digital signature is changed everytime on certificates or not ?
@amanali95012 жыл бұрын
Good content 🙂
@ComputerScienceLessons2 жыл бұрын
Thank you :)KD
@farahnawafleh94604 жыл бұрын
That was all I ever needed thank you so much for explaining with that great tone! You made my day :)
@ComputerScienceLessons4 жыл бұрын
Thanks for the complement :)KD
@user-ux1mz9ox6j3 жыл бұрын
Good Explanation
@ComputerScienceLessons3 жыл бұрын
Thank you :)KD
@abhimanyusinghshekhawat68713 жыл бұрын
This is really a great explanation, Question: If we talk about a real scenario, A client browser want to access some webpage and send a request, what would be the actual message first time from client and what will be the revert from the server? In the example, The message is the actual document but what would be in the actual scenario? is it certificate itself from the web server?, that's what I can guess.
@jded13467 ай бұрын
great explanation. If the message was intended to be confidential, wouldn't Jack want to encrypt the message with Jill's public key?
@JossinJax4 жыл бұрын
Ugh, this is great thank you so much!
@ComputerScienceLessons4 жыл бұрын
You're welcome. :)KD
@saadtalani22344 жыл бұрын
Amazing explanation. Thanks
@0xfaizan3 жыл бұрын
For the past fews months I'm looking for something on cryptography and i found this finally thanks
@reconarmor994 жыл бұрын
I'm still unclear on how asymmetric encryption works. It makes sense when you use the public to encrypt and the private key to decrypt. But if A sent a message to B and used the private key to encrypt it and B will use the public key to decrypt it, what would stop C from intercepting the message and using the public key to decrypt it? Or is it a situation where you *can* use the private key to encrypt and the public key to decrypt, but you wouldn't because then anyone with the public key could decrypt it?
@ComputerScienceLessons4 жыл бұрын
You are correct. The public key is used to encrypt the message and the private key yo decrypt it. It's like me sending you a box with an open padlock, but keeping the key to myself. You could lock something inside the box and send it back to me (locked). Only I have the key. Have you watched this one yet? kzbin.info/www/bejne/o5u6hYhjnbegr8k :)KD
@hvzvrds75654 жыл бұрын
@@ComputerScienceLessons than why does jill use private key to encrypt?
@heliusstha25144 жыл бұрын
@@ComputerScienceLessons but you are saying sompletely different thing in the video mate.
@rumildaolik49053 жыл бұрын
Amazing explanation :-)
@ComputerScienceLessons3 жыл бұрын
Thank you :)KD
@cebrayiltagiyev24394 жыл бұрын
excellent explanation!!!
@ComputerScienceLessons4 жыл бұрын
Thanks for saying so. :)KD
@omarbashir40874 жыл бұрын
The research has came to an end
@badge22042 жыл бұрын
this is the easiest explanation , because the author used the stories and pics.
@ComputerScienceLessons2 жыл бұрын
Glad you like my pics.
@bluerfoot4 жыл бұрын
never having worked with this stuff I really don't understand. jack presents his public key along with the digest and puts it in a digital certificate. Jill trusts this because she trusts the 3rd party that "vouched" for jack. I get that in a very generic sense. but what exactly does jill see when she compares the certificate to whatever she sees when she queries the certification authority?
@ComputerScienceLessons4 жыл бұрын
Hopefully, nothing. The process is carried out by the web browser in the background. If there's a problem she may see a message saying the websites certificate in invalid. (double click the little padlock in your browser's address bar). :)KD
@nerd25442 жыл бұрын
sorry to bother you after 2-3 years mate but in the video it's explicitly mentioned multiple times throughout, that the senders and receivers "really do not care if anyone sees the message" because the public key is...well..public [and that they just want to verify each other's identities] what happens if we do care about people snooping then? if A encrypts a secret message with their private key then sends it to B, how can they be sure that no C or D intercepts them and reads A's message instead. (or is secure data transmission a completely different topic and not related to key encryption whatsoever?) or is just the fact that we simply never use our/the sender's private keys to encrypt outgoing messages and that we instead use the receiver's public key instead? ,so in our case A uses B's public key to encrypt his secret message so that B and only B can read it with their private key? (actually I think this is it and I regret asking the stupid stuff above but it'd be nice if someone could verify this info)
@ComputerScienceLessons2 жыл бұрын
This is a tricky concept to get your head around if you are new to it. You seem to have got it... If I wanted to send YOU an encrypted message, then you would create the public and private keys, and send me your public key. When I receive your public key, I would use it to encrypt my message, and I would send you the ciphertext. Only YOU possess the matching private key, so only YOU can decrypt the message. This all happens automatically when we use a web browser to connect to a secure website. You may find this interesting... kzbin.info/www/bejne/o5u6hYhjnbegr8k and this... kzbin.info/www/bejne/mXy6cmucbN2Xgpo :)KD
@nerd25442 жыл бұрын
@@ComputerScienceLessons thanks a lot, love your channel, keep it up 👍
@christopherrobbertse3416 Жыл бұрын
great video
@ComputerScienceLessons Жыл бұрын
Thank you :)KD
@SrRunsis5 жыл бұрын
Excellent video!!!
@ComputerScienceLessons5 жыл бұрын
Thx :) KD
@charan_752 жыл бұрын
How does the receiver know that she has to use SHA 256? Are these agreed before?
@ComputerScienceLessons2 жыл бұрын
Encrypted communications are typically managed automatically by the software being used by the people communicating. The cryptosystem being used is built into the software. For example, when we buy things online, our web browser and the sellers webserver take care of everything for us. :)KD
@adilhassan94435 жыл бұрын
This is Gold!
@ComputerScienceLessons5 жыл бұрын
Thanks. I appreciate the comment. :)KD
@m_t_t_3 жыл бұрын
Does Jill contact the certificate authority to make sure the public key on the certificate (that is sent to her by jack) is the same as the one in the certificate authorities database? If not, surely the digital certificate could just be ‘forged’
@urssaf3432 жыл бұрын
the certificate is signed by the CA. if the signature isn't valid it's forged
@marcello42584 жыл бұрын
so we use the same private key to encrypt data as well as to sign or better use different pairs?
@simpleidea28253 жыл бұрын
Very nice explaination. Only one questions, can a hacker make a fake digital certificate ?
@ComputerScienceLessons3 жыл бұрын
Sadly yes. You could set up a fake certification authority. :)KD
@simpleidea28253 жыл бұрын
Ok, thanks for the reply :)
@roasted_guava57063 жыл бұрын
If the public key has the algorithm to encrypt a message if someone has the same public key can't he reverse engineer it and decrypt it?
@raymeiers79494 жыл бұрын
Is the Digital Certificate embedded in the document that is being sent or attached to the email message with the document? What prevents a bad guy from obtaining a copy of someone else's digital certificate and using it to pass himself off as the rightful owner of the digital certificate?