Why digital certificate?
Digital Signature:
https://www.youtube.com/watch?v=TmA2QWSLSPg&t=2s
Digital signature is used for authentication, non-repudiation and data integrity, but there is one weakness of digital signature alone: man-in-the-middle attack.
Digital certificates are electronic credentials issued by a trusted third party. A digital certificate not only verifies the identity of the owner, but also verifies that the owner owns the public key.
In this video, I will demonstrate why digital signature has weakness and how digital certificate comes in place to make sure digitally signed document must come originally from the claimed sender.
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Please leave comments, questions and
please subscribe!
Sunny Classroom
Видео Why digital certificate? канала Sunny Classroom
https://www.youtube.com/watch?v=TmA2QWSLSPg&t=2s
Digital signature is used for authentication, non-repudiation and data integrity, but there is one weakness of digital signature alone: man-in-the-middle attack.
Digital certificates are electronic credentials issued by a trusted third party. A digital certificate not only verifies the identity of the owner, but also verifies that the owner owns the public key.
In this video, I will demonstrate why digital signature has weakness and how digital certificate comes in place to make sure digitally signed document must come originally from the claimed sender.
Advanced Cryptography:
https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7
Playlist: Basic Cryptography
https://www.youtube.com/watch?v=vk3py9M2IfE&list=PLSNNzog5eyduN6o4e6AKFHekbH5-37BdV
Please leave comments, questions and
please subscribe!
Sunny Classroom
Видео Why digital certificate? канала Sunny Classroom
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What is digital signature?Kerberos - authentication protocolDigital Certificates Explained - How digital certificates bind owners to their public keyPrivate Key Encryption (Symmetric Key Encryption)PKI - trust & chain of trust -why, who and how?Intro to Digital CertificatesTCP vs. UDPProxy serverHow hash function work?How SSL certificate works?How TCP starts and close session?All about USBHoneynet and DMZHow does HTTPS work? What's a CA? What's a self-signed Certificate?Digital Signatures and Digital CertificatesHashing vs Encryption DifferencesPublic Key Encryption (Asymmetric Key Encryption)Dictionary Attack and Brute Force Attack: hacking passwordsWhat are Digital Signatures? - Computerphile