Great video and thanks for the explanation. Out of curiosity does this process also apply to eSignature platforms e.g. DocuSign or do they work differently?
Mike, Nice video. What would happen if someone accidentally has a public key they used to decrypt your digital signature. What is the Private Key based on ? Your email address?
well explained about digital signatures. One of the best video in this topic
So there is no Confidentality in digital signatures, just Integrity, authentication and Non-repudiation. That helps. Thanks Mike.
if you want confidentiality, you need to encrypt digitally signed Doc with senders public key
The visuals help so much, thank you!
Thank you Mike, I’m preparing for my CISSP and this was very helpful!
Sir.. i have a question? "8:44" How can or by what method Susen know what hash algorithm i have used ?
Great explanation
Very helpful 👍
You explain things so well
great explanation!!!
agreed. CertMike, i'm gonna look at ALL of your clips
Great video and thanks for the explanation. Out of curiosity does this process also apply to eSignature platforms e.g. DocuSign or do they work differently?
Hi Jose, in the sense that you use digital signatures to prove your identity to DocuSign (non-repudiation), basically.
...oo 🎈ookkkk
Great vid
Encrypted MD is the digital signature
Hi, what’s the difference between digital signature and digital certificate ?
Private key vs public key
Mike, Nice video. What would happen if someone accidentally has a public key they used to decrypt your digital signature. What is the Private Key based on ? Your email address?
can you please remove the ad from the videos?
Great explanation