Digital Signature Algorithm (DSA) - Cryptography - Practical TLS

Поділитися
Вставка

КОМЕНТАРІ • 38

  • @PracticalNetworking
    @PracticalNetworking  3 роки тому +4

    📢 *Black Friday / Cyber Monday Promotion*
    👉 Practical TLS for only $50 (originally $297)
    💻 Use code *BFCM2024* --> pracnet.net/tls
    📅 Offer expires Dec 6

    • @VideosfromElle
      @VideosfromElle 3 роки тому +1

      I'll be signing up for the class Friday 😀 I have watched so many of your videos, it's the least I can do lol Absolutely confident it's worth every penny!

  • @tarikibouzidene6399
    @tarikibouzidene6399 2 роки тому +11

    So clear, you are the best trainer ever I follow.

  • @lizgm1723
    @lizgm1723 11 місяців тому +1

    Visuals were a perfect complement to explanation. Thank you.

  • @rotorfpv4117
    @rotorfpv4117 9 місяців тому +1

    Very informative, thanks

  • @nournote
    @nournote Рік тому

    Perfectly summarized

  • @IliyaDamyanov
    @IliyaDamyanov Рік тому

    Very good explanation.

  • @askaripayalo8191
    @askaripayalo8191 Рік тому

    Thank you for sharing knowledge.

  • @ayradizem2770
    @ayradizem2770 3 роки тому +2

    Thank you for the video, we need an exemple where to use this algorithms with practucal, also I will begin to learn how to use GNS3 for to practise my knowledge in network,, can I practise this video in GNS3?? thank you in advance

    • @PracticalNetworking
      @PracticalNetworking  3 роки тому

      The end user rarely uses the algorithms themselves. But they use software which then make use of the example. For instance, you use a web browser, which makes HTTPS connections... your webbrowser uses the algorithms in the process of creating the HTTPS/SSL connection.

    • @ayradizem2770
      @ayradizem2770 3 роки тому +1

      @@PracticalNetworking thank you for your explain

  • @krishnamohanyerrabilli4040
    @krishnamohanyerrabilli4040 2 роки тому +1

    Clearly understood thankyou.

  • @arunsankpal4219
    @arunsankpal4219 3 роки тому +2

    Thank you sir 🙏 🇮🇳

  • @Don-Carillo
    @Don-Carillo 3 роки тому +1

    Thanks very much,. it would be good to explain how a certificate in a chain uses the public key of the cert above it in the chain to verify it. I am probably not explaining very well but how it uses it to decyrpyt the signature that has been signed by the CA private key. Hope that makes some sense :)

    • @PracticalNetworking
      @PracticalNetworking  3 роки тому +2

      Hey Don. All that is unpacked in the full TLS course. It's on sale now if you want instant access.

  • @pickle1987
    @pickle1987 Рік тому +1

    Hello, can you please do a video about the ed25519 vs rsa? I've heard ed25519 is more secure and fast

  • @sahanashreeg611
    @sahanashreeg611 Місяць тому

    Thank you sir❤

  • @Cutrexxx
    @Cutrexxx 2 роки тому +1

    can ecdsa also only sinature a massege?

    • @PracticalNetworking
      @PracticalNetworking  2 роки тому +3

      Yes. ECDSA is like DSA in so far as what it can be used for. In fact, all the "EC" variants are simply the same core protocols done with Elliptic Curves. More details here:
      www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

  • @lherfel
    @lherfel Рік тому

    thanks, very nice overview

  • @citizenoftheworldsz9
    @citizenoftheworldsz9 2 роки тому +1

    simply excellent!

  • @dan5640
    @dan5640 2 роки тому +3

    why is it called asymmetric encryption if it doesn't actually encrypt?

    • @PracticalNetworking
      @PracticalNetworking  2 роки тому

      Great question =). You're right, Asymmetric Encryption is _not_ the best terminology. I wrote about that here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/
      _"some might even hesitate to use the term “Asymmetric Encryption” for these algorithms, and instead elect to use “Asymmetric Cryptosystem” - since again, only one of these algorithms involves actual “encryption”._

    • @thestudy6875
      @thestudy6875 6 місяців тому +1

      Came to the comments to see if anyone else was scratching their head on this one too!

    • @fugoogle_was_already_taken
      @fugoogle_was_already_taken 6 місяців тому

      It is asymetric cryptography/cryptosystem, not encryption. There are cryptographic capabilities. Some of them are key exchange (like diffie helman), encryption (like rsa) and authentication (like digital signatures, rsa). There are many cryptographic protocols/schemes, but not all of them provide all the cryptographic capabilities. For example, you cannot use diffie helman for encryption. Because its just not possible. You can use it for key exchange, and then use symetric cryptography for encryption, but you cannot encrypt anything with diffie helman.

  • @upelister
    @upelister 2 роки тому +1

    Thank you.

  • @l--1998
    @l--1998 Місяць тому

    Я пришёл за мат. частью. Чтобы она была у меня на столе до обеда!

  • @BigSnowman626
    @BigSnowman626 7 місяців тому

    Okay

  • @rafay1708
    @rafay1708 3 роки тому

    Thanks

  • @admin_e
    @admin_e 3 роки тому +1

    👍👍👍

  • @Nxtfbrdf
    @Nxtfbrdf 7 місяців тому +1

    I saw its math somewhere else I hoped you'd get into the math part 🥲