Digital Signature

Поділитися
Вставка
  • Опубліковано 19 лис 2024

КОМЕНТАРІ • 23

  • @BeAFreeSoul
    @BeAFreeSoul 4 роки тому +2

    Hi Hemang sir. Ur all cisa related videos are v helpful. I read CRM and watched ur cisa videos and recently passed cisa exam in just one month. Thanks a lot.

    • @HemangDoshi
      @HemangDoshi  4 роки тому +2

      Congratulations Manoj on your CISA success

  • @talatechinc4571
    @talatechinc4571 5 років тому +3

    Sir u are the main actor of CISA exam preparation , salute sir keep on doing the good job.. tell me more about the changes in the 2019 curriculum.

    • @HemangDoshi
      @HemangDoshi  5 років тому +2

      Thanks dear. We are working on new updates

    • @amanmahajan123
      @amanmahajan123 4 роки тому +1

      @@HemangDoshi Do we know what exactly are the changes in 2020 or do we stick to your videos itself ?

    • @HemangDoshi
      @HemangDoshi  4 роки тому +2

      @@amanmahajan123 there are no changes in 2020. CRM 2019 is the latest one

  • @johnnigesh8834
    @johnnigesh8834 8 років тому +2

    Very good video Hemang Doshi sir.... Thanks very for ur kind support to us. Its really very nice explanation.

  • @bronte346
    @bronte346 8 років тому +5

    Very much appreciated. This helped me!

  • @jitendrachivate5243
    @jitendrachivate5243 3 роки тому

    very simply explained. very nince

  • @kattopeter7280
    @kattopeter7280 3 роки тому +2

    thank you sir for your nice explanation. In CRM, the Digital Signature has extended to anther part known as "Digital Envelope' and another added part is :Quantum Cryptograph", should you explain it at least on briefing way, thank you

  • @mariusciobanu2025
    @mariusciobanu2025 3 роки тому +1

    Excellent explanation!

    • @HemangDoshi
      @HemangDoshi  3 роки тому +1

      Thanks Marius. You can access complete cisa lectures at www.udemy.com/course/certified-in-information-system-audit/?referralCode=54D937D43960E2956A8C

  • @LakshmiSahithiRaiti
    @LakshmiSahithiRaiti 6 років тому +3

    Thank you sir

  • @HemangDoshi
    @HemangDoshi  8 років тому +2

    E-book version with QAE on digital signature as per CISA exam pattern is as follow:
    www.smashwords.com/books/view/648923

  • @ekiwephiri6954
    @ekiwephiri6954 4 роки тому +1

    I scored 107 mock 2 and 104 Mock 1 do i need to study more or are there other mock i can do comparisons before final exams

  • @enikovarga7342
    @enikovarga7342 10 місяців тому

    Hi, thank you for your videos. So much clearer than CISA's book! In the last question of this video, you say that the correct answer is C, but that says that the hash value was created from the entire message content. Is that still the correct answer? Thank you

    • @HemangDoshi
      @HemangDoshi  10 місяців тому

      Hi. Yes correct answer is c

  • @ramkrishnaghildiyal9188
    @ramkrishnaghildiyal9188 6 років тому +1

    Around 3:20, you say "receiver will hash 8AM and hen match ". If receiver already knows the message text then why do he need to do anything??

    • @HemangDoshi
      @HemangDoshi  6 років тому +13

      Hi Ram, let me try this way:
      I want to give you a message ' I love you' . So along with message , I will also send hash of the message i.e. some alphanumberical value.
      Now from me you will get two things (1) I love you (2) abc123abc123
      Now, to ensure that someone has not changed the message in between (man in the middle attack), you create hash of the mesaage.
      If you get value as abc123abc123, you can rejoice as I actually sent the same message and it's not been tampered with.
      But if you get some other value, that means I don't love you and someone else has played with your emotions. 😊

    • @manishj80
      @manishj80 6 років тому +6

      hahahaha... awesome.. so basically hash ensures integrity and not confidentiality

  • @AmeyKadam1
    @AmeyKadam1 Рік тому

    How would the integrity be maintained if the decryption is happening through A's public key..
    Decryption should happen with private key of B coz the msg hash has to be encrypted with B's public key

    • @HemangDoshi
      @HemangDoshi  Рік тому

      Dear Amey, you need to understand what is the objective of encryption. Please note digital signature is always done by sender' s private key.
      If objective is confidentiality then receiver's public should be used for encryption.

    • @HemangDoshi
      @HemangDoshi  Рік тому

      ua-cam.com/video/mCM6dyQ_KmQ/v-deo.html&feature=shares
      Please check above video to understand this.