Digital Signatures and Digital Certificates

This video explains the purpose of digital signatures and how they work. It begins by reviewing encryption and decryption using an asymmetric pair of keys, and then explains the significance of this when it comes to digital signatures, namely that it doesn’t matter which of the key pair is made public and which is kept private. The video then illustrates the digital signing process. Specifically, the creation of a hash value for the document (also known as a digest) using a hash algorithm such as SHA256 (which was created by the National Security Agency). It shows how document digest is then encrypted using the sender’s private key before being attached to the document. When the document is received, the recipient decrypts the digest using the sender’s public key. The recipient also recalculates the hash. If the hash values match, the recipient can be confident that document has not been tampered with in transit. The role of a certification authority is also covered. A certification authority issues its customer with a special file called a digital certificate which binds their public key to identifying information. This video also mentions the importance of digital signatures which it comes to cryptocurrencies. A cryptocurrency such as Bitcoin requires a secure mechanism for updating its decentralised ledger.

Пікірлер: 276

  • @ramasif9983
    @ramasif99834 жыл бұрын

    This is by far the most simple explanation of the presented concepts - in a way that everyone understands it and from then can move on to the more complicated parts. Excellent.

  • @kisme01
    @kisme014 жыл бұрын

    this is the only video you need to watch if you want a practical understanding of digital signatures

  • @seetsamolapo5600
    @seetsamolapo5600 Жыл бұрын

    Wow! This might be the best video on data integrity and data authentication - digital signatures rely on asymmetric cryptography.

  • @kadircangulde2322
    @kadircangulde23222 жыл бұрын

    Such an explanation with downgraded complexity, but with an upgraded realization. Exceptionally wonderful.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you :)KD

  • @saikrishnasunkam4344
    @saikrishnasunkam43443 жыл бұрын

    This is the single best illustration/explanation of this concept on the internet. Keep making these videos man, you've got talent.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @3a1Va1
    @3a1Va1 Жыл бұрын

    Used this video to get my Sec+ a few years back now... Back to refresh myself on this for my SSCP. Awesome video. Thank you so much!

  • @ashokantony694
    @ashokantony6945 жыл бұрын

    Studying for CCNA Cyberops , the Cisco documentation on this is a complete mess. This video is pure gold , incredibly simple and clear. Thank you sir , keep up the great work . On more subscriber for your great channel :)

  • @zakariyaal2848

    @zakariyaal2848

    4 жыл бұрын

    Exactly here for the same reason, good luck on you exam.

  • @billchen4923
    @billchen49233 жыл бұрын

    Amazing teaching. After viewing this video, finally I can understand the concept clearly.

  • @fromdil6470
    @fromdil6470 Жыл бұрын

    Thank you for simplifying the concept of digital keys and explaining the role of hashing in it. Your explanation has made it easy for anyone to understand these complex theories.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    You are most welcome :)KD

  • @reduser77
    @reduser773 жыл бұрын

    2 days on the internet trying to understand this subject , your 11 min video made it , thank you alot !

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Glad to be of service :)KD

  • @AliShaikh_744
    @AliShaikh_7442 жыл бұрын

    I love the narration, the humour, the analogies and the simple and easily understandable format. Thank you!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    You are most welcome :)KD

  • @seetsamolapo5600

    @seetsamolapo5600

    Жыл бұрын

    ​@@ComputerScienceLessonsthe explanation is phenomenal sir. I wish you could make more videos on cybersecurity topics esp security+. I'd gladly join your patteon

  • @aaronstones100
    @aaronstones1003 жыл бұрын

    This is by far the best explanation i've ever seen of this. Thanks a lot :D.

  • @amir_shayesteh_tabar
    @amir_shayesteh_tabar2 жыл бұрын

    10 from 10! so easy to understand, A good lesson for other KZreadrs talking about Digital Signature!

  • @ITTechTips4You
    @ITTechTips4You2 жыл бұрын

    Perfect! At 6:19 I first thought you made a mistake but after finnishing the whole video you carefully explain how a CA works. Brilliant. Thank you.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    You are very welcome.

  • @jyoti9273
    @jyoti92733 жыл бұрын

    It's crystal clear the way you explain and demonstrate with animation.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @ShijenN
    @ShijenN3 жыл бұрын

    This is the best explanation of digital certificates and digital signature i have come across. Thank you :)

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @mostinho7
    @mostinho74 жыл бұрын

    Done thanks 0:15 explaining RSA 1:30 digital signatures: it doesn’t matter what key we encrypt with (public or private) the message can only be decrypted with the other key. A message can be digitally signed by encrypting it with the private key and then others can verify the signature by decrypting with public key. 3:58 digital signature example 5:40 sender hashes the message, encrypts the hash with their private key. Receiver decrypts the hash with the sender’s public key, and if it matches the message then receiver knows message came from sender 7:00 why we need digital certificates on top of digital signatures. Someone could be pretending to be the sender, and digitally signs the message. The receiver has no way of verifying the sender’s identity. Digital certificates is how the receiver can verify that a public key actually belongs to the sender 8:00 how certificate authority works

  • @soamesphares
    @soamesphares4 жыл бұрын

    You have talent to explain concepts...Thank you

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    You're very kind. Thanks for the comment. :)KD

  • @gittesilberglarsen1262
    @gittesilberglarsen12622 жыл бұрын

    wow! that is very well made. direct, clear and no annoying repetitions

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you :)KD

  • @morshedulislamriaad6496
    @morshedulislamriaad64962 жыл бұрын

    You deserve an Oscar for that kind of explanation .

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you. I'll start writing my speech. :)KD

  • @PumpkinJ36
    @PumpkinJ363 жыл бұрын

    Finally, thank you so much I've been trying to understand this for a while now.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You're most welcome. :)KD

  • @petercooper3468
    @petercooper34683 жыл бұрын

    Finally, you explain it crystal clear! Thanks you very much!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You're most welcome. Thanks for commenting :)KD

  • @kisme01
    @kisme014 жыл бұрын

    i just saw this one video, but this is enough reason to subscribe. whatever you post I'm gonna watch it. damn

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Welcome aboard :)KD

  • @romeo98711
    @romeo987114 жыл бұрын

    What a brilliant work !

  • @sadafali4516
    @sadafali45164 жыл бұрын

    I cannot thank you enogh for this video. You explained it without extra info Thanks alot 👍👍👍

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    You welcome. Thanks for the lovely comment. :)KD

  • @geoff1121
    @geoff11214 жыл бұрын

    finally, someone who puts it clearly and totally

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thanks for the comment. Really appreciated. :)KD

  • @VictoriaOtunsha
    @VictoriaOtunsha Жыл бұрын

    Thank for this breakdown, it gave me a better understanding of the entire concept.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    You are most welcome :)KD

  • @Jonathan-dy9ju
    @Jonathan-dy9ju5 ай бұрын

    THanks so much for this video, Fought hours to understand this

  • @prabhuyou1
    @prabhuyou13 жыл бұрын

    Excellent!! Explained in such a simple way. Thanks!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you too :)KD

  • @VishalKumar-hn7mi
    @VishalKumar-hn7mi10 ай бұрын

    Thanks for this amazing video, it helped me understand digital signature more better

  • @vijayjangid8967
    @vijayjangid89673 жыл бұрын

    This channel is underrated!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @osamaa.h.altameemi5592
    @osamaa.h.altameemi55924 жыл бұрын

    Best explanation ever. Thank you Sir.

  • @navneetiyer
    @navneetiyer5 жыл бұрын

    Thanks for the video. Keep up the good work 👍

  • @tanvirkazi6889
    @tanvirkazi68893 жыл бұрын

    Such a clear explanation - thank you !

  • @sabitkondakc9147
    @sabitkondakc91472 жыл бұрын

    fabulous explanation, simple and clear.

  • @RaiBilalHaider
    @RaiBilalHaider Жыл бұрын

    This is best and simplest explanation. Thanks

  • @yeahright5663
    @yeahright5663 Жыл бұрын

    This is so lucid. Beautifully explained

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @naveenchandrakumar480
    @naveenchandrakumar480 Жыл бұрын

    Love this video. 100 out of 10 ( ten, yes ), you deciphered it properly.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you so much :)KD

  • @rushedhu
    @rushedhu4 жыл бұрын

    Best video about digital certificates ever.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thank you so much :)KD

  • @user-bv6bi2sz8r
    @user-bv6bi2sz8r3 жыл бұрын

    Really great video! Explained the things clearly.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Delighted to help :)KD

  • @hadisoeharto8684
    @hadisoeharto86844 жыл бұрын

    Very good and clear explanation.

  • @ajay7818
    @ajay78183 жыл бұрын

    Finally I got this concept!!! Thanks!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Delighted to help - it's actually a brilliantly simple idea isn't it!? :)KD

  • @farahnawafleh9460
    @farahnawafleh94603 жыл бұрын

    That was all I ever needed thank you so much for explaining with that great tone! You made my day :)

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thanks for the complement :)KD

  • @marcelorodrigues1683
    @marcelorodrigues16835 жыл бұрын

    Very helpful, thanks a lot !

  • @saadtalani2234
    @saadtalani22344 жыл бұрын

    Amazing explanation. Thanks

  • @cajuncajun183
    @cajuncajun1832 жыл бұрын

    exceptionally clear and easy to understand

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you :)KD

  • @ruibozhang3196
    @ruibozhang31965 жыл бұрын

    Very impressive explanation

  • @charanpreet2211
    @charanpreet22114 жыл бұрын

    Great Explanation! Much appreciated

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    You're very welcome :)KD

  • @douglaskaicong131
    @douglaskaicong1313 жыл бұрын

    Wts thats just genius 👏 how people come out with these stuff

  • @miraj0072004
    @miraj0072004 Жыл бұрын

    I think I attained Nirvana after watching this! Thank you!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    It's been a while since I've done that for anyone. You are very welcome :)KD

  • @sandhyachowdhary2511
    @sandhyachowdhary25113 жыл бұрын

    Great job 👍 amazing explanation 👏 thank you so much .

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You're very welcome. 😳 :)KD

  • @WangaRay317
    @WangaRay3173 жыл бұрын

    Thank you so much!!!! This was SOO helpful.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You are very welcome :)KD

  • @RiyaTheDragonWarrior
    @RiyaTheDragonWarrior3 жыл бұрын

    Wonderful video!! Thanks a lot for great explanation

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You're most welcome. Thanks for the lovely comment. :)KD

  • @siddharthvishnoi1489
    @siddharthvishnoi14892 жыл бұрын

    Thank you very much for clearing the concept

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    You are most welcome :)KD

  • @arminfisher4836
    @arminfisher48362 жыл бұрын

    Good freaking job mate, thanks.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    TY :)KD

  • @nguyentrananhnguyen7900
    @nguyentrananhnguyen79004 жыл бұрын

    you took 10 minutes to teach me whatever my teacher trying to teach me in 3 hours, damn !!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Glad to help :)KD

  • @Muwahid999
    @Muwahid9993 жыл бұрын

    Nice way of explaining through graphics....

  • @JossinJax
    @JossinJax4 жыл бұрын

    Ugh, this is great thank you so much!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    You're welcome. :)KD

  • @MunyaMazvimba
    @MunyaMazvimba3 жыл бұрын

    simple explanation. all i can say is wow!!!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @shreyashjoshi4188
    @shreyashjoshi41883 жыл бұрын

    Awesome explanation.best video found on this topic

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you.

  • @ajaxSAF
    @ajaxSAF4 жыл бұрын

    Fantastic, thank you

  • @adilhassan9443
    @adilhassan94434 жыл бұрын

    This is Gold!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thanks. I appreciate the comment. :)KD

  • @SrRunsis
    @SrRunsis4 жыл бұрын

    Excellent video!!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thx :) KD

  • @d.renewood2657
    @d.renewood2657 Жыл бұрын

    Best explanation I have seen!😁

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @tashad200
    @tashad2004 жыл бұрын

    outstanding video

  • @minefox6071
    @minefox6071 Жыл бұрын

    Best video on the topic

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @omarbashir4087
    @omarbashir40874 жыл бұрын

    The research has came to an end

  • @blessedzaraz6766
    @blessedzaraz67663 жыл бұрын

    Excellent lesson!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @cebrayiltagiyev2439
    @cebrayiltagiyev24394 жыл бұрын

    excellent explanation!!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thanks for saying so. :)KD

  • @sambo7734
    @sambo77343 жыл бұрын

    Thank you for that. The certification authority is the bit missing from most other explanations!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    You are very welcome. :)KD

  • @Yash-Gaikwad
    @Yash-Gaikwad2 ай бұрын

    Best explanation ever ❤ thanks bro

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 ай бұрын

    Thank you so much :)KD

  • @FabioSouza-jj7oo
    @FabioSouza-jj7oo4 жыл бұрын

    Pretty good, thanks a lot!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    Thank you :)KD

  • @defkrogeldiz3197
    @defkrogeldiz31974 жыл бұрын

    Very helpful thanks!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    4 жыл бұрын

    You are welcome. :)KD

  • @vincentadams3807
    @vincentadams3807 Жыл бұрын

    This video is really nice! However there is one part I can't wrap my head around. From my understanding: 1: Person A types a message 2: Person A generates a hash of the message using sha 3: Person A encrypts the generated hash using their private key 4: Person A appends the encrypted hash to the message as a signature, and sends it to person B 5: Person B receives the message along with the signature 6: Person B decrypts the signature (encrypted hash) using person A's public key 7: Person B runs sha on the message to generate a hash. 8: Person B compares the resulting hash from the message to the hash from decrypting the signature 9: If they are the same, it;s been verified successfully. So, what's the point of the sha layer exactly? Why not simply add the message encrypted with person A's private key as a signature? In both cases only person A's public key would be able to decrypt it so I can't see how running it through sha would make a difference.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Nice question. One of the key features of a hash algorithm is that it produces a hash value of a fixed size. SHA256 for example will produce a hash value that is always 256 bits long, no matter how big the original message. This ensures that the digital signature is a manageable size, regardless of the document being signed. You might like my series on cryptocurrency which also explains the benefits of hashing. kzread.info/head/PLTd6ceoshprd7UngbhRHMgKXcWz4PIBEe :)KD

  • @basees2000
    @basees20003 жыл бұрын

    fantastic channel i love it

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you. That's music to my ears :)KD

  • @zamilmastaliyev6967
    @zamilmastaliyev6967 Жыл бұрын

    great content. I wonder if it calculates different hash for different data so digital signature is changed everytime on certificates or not ?

  • @mikespilligan1490
    @mikespilligan14903 жыл бұрын

    Lovely work well done.

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you. Lovin' your name :)KD

  • @user-wy9xi6gh9w
    @user-wy9xi6gh9w3 жыл бұрын

    if someone was in the middle of a digital signature between person a and b couldnt they(person m) hash the email/text and sign it with their own key and send that to person b. Then when person b sends an email back to a, person m can hash the email and send a resigned version back to a?

  • @0xfaizan
    @0xfaizan3 жыл бұрын

    For the past fews months I'm looking for something on cryptography and i found this finally thanks

  • @rumildaolik4905
    @rumildaolik49053 жыл бұрын

    Amazing explanation :-)

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @abhimanyusinghshekhawat6871
    @abhimanyusinghshekhawat68712 жыл бұрын

    This is really a great explanation, Question: If we talk about a real scenario, A client browser want to access some webpage and send a request, what would be the actual message first time from client and what will be the revert from the server? In the example, The message is the actual document but what would be in the actual scenario? is it certificate itself from the web server?, that's what I can guess.

  • @mahdidelavaran1099
    @mahdidelavaran1099 Жыл бұрын

    thanks it helps a lot

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    You're welcome :)KD

  • @carmellourens3423
    @carmellourens34232 жыл бұрын

    This is Bob, Bob is builder !!! caught me so off guard ahahhaahah

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    He says he's a builder, but he's really a con artist :)KD

  • @alksdng97834y
    @alksdng97834y2 жыл бұрын

    thank you!

  • @tendaijakutindi4175
    @tendaijakutindi41759 ай бұрын

    Thank you !!!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    9 ай бұрын

    You are most welcome :)KD

  • @marcello4258
    @marcello42583 жыл бұрын

    so we use the same private key to encrypt data as well as to sign or better use different pairs?

  • @just_shim
    @just_shim Жыл бұрын

    Amazing explanation TQ

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    You're most welcome :)KD

  • @evanstayuka381
    @evanstayuka3812 жыл бұрын

    Very well explained

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you :)KD

  • @SmartWentCrazy
    @SmartWentCrazy4 жыл бұрын

    So if you don't have a certificate authority where does Jill's computer look to verify the public key?

  • @danym-98
    @danym-982 жыл бұрын

    great explanation

  • @ComputerScienceLessons

    @ComputerScienceLessons

    2 жыл бұрын

    Thank you. You might like my crypto videos :)KD

  • @raymeiers7949
    @raymeiers79493 жыл бұрын

    Is the Digital Certificate embedded in the document that is being sent or attached to the email message with the document? What prevents a bad guy from obtaining a copy of someone else's digital certificate and using it to pass himself off as the rightful owner of the digital certificate?

  • @qlf3896
    @qlf38963 жыл бұрын

    So a CA signs everything they send to their client?

  • @user-ux1mz9ox6j
    @user-ux1mz9ox6j3 жыл бұрын

    Good Explanation

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Thank you :)KD

  • @roasted_guava5706
    @roasted_guava57063 жыл бұрын

    If the public key has the algorithm to encrypt a message if someone has the same public key can't he reverse engineer it and decrypt it?

  • @aady69ias
    @aady69ias2 жыл бұрын

    very lucid!

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @christopherrobbertse3416
    @christopherrobbertse3416 Жыл бұрын

    great video

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @pradeepvc1307
    @pradeepvc1307 Жыл бұрын

    6:44 What is the use of encrypting the hash value here using BOB Private key and sending, As however it can be decrypted by BOB's public key which is available to everyone You can directly send the hash value or use Gill public key and encrypt and send right?

  • @amanali9501
    @amanali9501 Жыл бұрын

    Good content 🙂

  • @ComputerScienceLessons

    @ComputerScienceLessons

    Жыл бұрын

    Thank you :)KD

  • @rajkirannatarajan9276
    @rajkirannatarajan92763 жыл бұрын

    Bob looks like the POTUS 45

  • @bluerfoot
    @bluerfoot3 жыл бұрын

    never having worked with this stuff I really don't understand. jack presents his public key along with the digest and puts it in a digital certificate. Jill trusts this because she trusts the 3rd party that "vouched" for jack. I get that in a very generic sense. but what exactly does jill see when she compares the certificate to whatever she sees when she queries the certification authority?

  • @ComputerScienceLessons

    @ComputerScienceLessons

    3 жыл бұрын

    Hopefully, nothing. The process is carried out by the web browser in the background. If there's a problem she may see a message saying the websites certificate in invalid. (double click the little padlock in your browser's address bar). :)KD