Non-Repudiation is like returning something to the store and needing to have a Receipt and the card used during purchase?
@afjelidfjssaf8 ай бұрын
yeah something along those lines
@konteezy203Ай бұрын
I look at it as, no takebacksies.
@shobha000s Жыл бұрын
Prof. Messer, how will Bob know which hash algorithm Alice used so that he can compare two hash values. Given, the public key does not contain any information about hash algorithm. Do Alice and Bob agree on a specific hash function (e.g., SHA-256, SHA-3) in first place that will be used for hashing during the digital signature process?
@fundamxd10 ай бұрын
You totally get it! This is exactly what happens.
@thatguy13987 ай бұрын
@@fundamxd is this agreement automatic? Or do they literally agree beforehand?
@fundamxd7 ай бұрын
@@thatguy1398 They literally agree beforehand
@thatguy13987 ай бұрын
@@fundamxdthank you
@fundamxd7 ай бұрын
@@thatguy1398 You're welcome
@tekguru75 ай бұрын
Absolute fantastic training. You are an absolute gem. Thank you for all you have done to contribute to society. Question: When did Alice ever create the public key to give to Bob? When was that key ever created for Bob to gain from Alice? You mentioned in the process that Alice created a private key for herself so she could encrypt with the digital signature, but at what point did Alice ever create the public key? Update: Explained in another video. I realize now both keys are generated at the same time of encryption.
@ethanpayne41165 ай бұрын
The public/private key pair is generated by Alice using some mathematics that you can read more in detail elsewhere, and the same key can be used to encrypt many documents so Alice can have created her keys potentially a long time before the interaction with Bob
@tesfalegntadesse31239 ай бұрын
any one who passed CompTIA Security+ exam I wan to ask you that regarding the multiple-choice questions. For each question, is there only one correct answer, or might there be more than one correct answer?
@michael20939 ай бұрын
unless the question says to pick multiple than there is only one right answer. its tough, pick the best one that fits the question.
@tesfalegntadesse31239 ай бұрын
@@michael2093 Thanks so much for your information
@Jays3DP23 күн бұрын
@@michael2093That is not entirely true. Some answers may be more right than others, but there are multiple right answers in some cases. The most right answer will have the most points, whereas the somewhat right answers may have partial or no points. the question may not even be weighed at all, as some questions are experimental. Just answers to the best of your knowledge and you’ll be fine.
@benjamin27132 ай бұрын
Very useful infographics in this video!
@Vonnaismable6 ай бұрын
Professor, with there being so much job-hiring scams, could this be a good way to verify authentication of emails or detecting phishing?
@hatboxpirate4 ай бұрын
Yes, it sure can, to an extent. Using DKIM, companies can post their public keys in their DNS records and then digitally sign their emails. Recipients could use the public key to make sure emails came from the sender and are legitimate.