Digital Signature Algorithm (DSA) - Cryptography - Practical TLS

2021 ж. 21 Қар.
58 150 Рет қаралды

The Digital Signature Algorithm (DSA) is an Asymmetric Encryption algorithm... but it's different from the other Asymmetric Encryption algorithms we've discussed (RSA & DH). DSA has only two functions: Signature Generation and Signature Verification. It cannot do Encryption, it cannot do Decryption, it cannot do a Key Exchange. It's use is purely creating and verifying Signatures, which provides Integrity and Authentication to what is signed.
This lesson is a free sample lesson from the the greatest TLS and SSL training course ever created. No instructor rambling on about pointless stories. No slides with massive walls of text. No time wasting. Only simple, effective, and precise explanations. Complimented with practical illustrations and visuals.
🔐 More details about the course:
classes.pracnet.net/courses/p...
🏢 Do you configure or troubleshoot TLS/SSL for work? If so, I'm willing to bet your employer would happily pay for this SSL training. Reach out if you'd like to coordinate an introduction for a bulk license purchase with your company. I'm happy to provide a generous referral bonus =)
💬 Join Practical Networking Discord
/ discord
🖧 Want to learn how how data moves through a network?
• Networking Fundamentals
Since you've made it to the bottom of the Description, here's a $100 off coupon code you can use on the full course =)
YT100

Пікірлер
  • 👉 *More free lessons:* kzhead.info/channel/PLIFyRwBY_4bTwRX__Zn4-letrtpSj1mzY.html ✨ *Full course:* pracnet.net/tls 💲 *Coupon Code* for 50% off: youtube50

    @PracticalNetworking@PracticalNetworking2 жыл бұрын
    • I'll be signing up for the class Friday 😀 I have watched so many of your videos, it's the least I can do lol Absolutely confident it's worth every penny!

      @VideosfromElle@VideosfromElle2 жыл бұрын
  • Visuals were a perfect complement to explanation. Thank you.

    @lizgm1723@lizgm17234 ай бұрын
  • So clear, you are the best trainer ever I follow.

    @tarikibouzidene6399@tarikibouzidene6399 Жыл бұрын
    • Thank you for the kind words, Tarik. Cheers.

      @PracticalNetworking@PracticalNetworking Жыл бұрын
  • Thank you for sharing knowledge.

    @askaripayalo8191@askaripayalo8191 Жыл бұрын
  • Very informative, thanks

    @rotorfpv4117@rotorfpv41172 ай бұрын
  • Very good explanation.

    @IliyaDamyanov@IliyaDamyanov7 ай бұрын
  • thanks, very nice overview

    @lherfel@lherfel Жыл бұрын
  • Perfectly summarized

    @nournote@nournote5 ай бұрын
  • simply excellent!

    @citizenoftheworldsz9@citizenoftheworldsz9 Жыл бұрын
    • Thank you =)

      @PracticalNetworking@PracticalNetworking Жыл бұрын
  • Clearly understood thankyou.

    @krishnamohanyerrabilli4040@krishnamohanyerrabilli4040 Жыл бұрын
    • you're welcome, Krishnamohan

      @PracticalNetworking@PracticalNetworking Жыл бұрын
  • Thank you.

    @upelister@upelister Жыл бұрын
    • You're welcome, Umut =)

      @PracticalNetworking@PracticalNetworking Жыл бұрын
  • Thanks very much,. it would be good to explain how a certificate in a chain uses the public key of the cert above it in the chain to verify it. I am probably not explaining very well but how it uses it to decyrpyt the signature that has been signed by the CA private key. Hope that makes some sense :)

    @Don-Carillo@Don-Carillo2 жыл бұрын
    • Hey Don. All that is unpacked in the full TLS course. It's on sale now if you want instant access.

      @PracticalNetworking@PracticalNetworking2 жыл бұрын
  • Thank you sir 🙏 🇮🇳

    @arunsankpal4219@arunsankpal42192 жыл бұрын
    • You're welcome!

      @PracticalNetworking@PracticalNetworking2 жыл бұрын
  • Thank you for the video, we need an exemple where to use this algorithms with practucal, also I will begin to learn how to use GNS3 for to practise my knowledge in network,, can I practise this video in GNS3?? thank you in advance

    @ayradizem2770@ayradizem27702 жыл бұрын
    • The end user rarely uses the algorithms themselves. But they use software which then make use of the example. For instance, you use a web browser, which makes HTTPS connections... your webbrowser uses the algorithms in the process of creating the HTTPS/SSL connection.

      @PracticalNetworking@PracticalNetworking2 жыл бұрын
    • @@PracticalNetworking thank you for your explain

      @ayradizem2770@ayradizem27702 жыл бұрын
  • Hello, can you please do a video about the ed25519 vs rsa? I've heard ed25519 is more secure and fast

    @pickle1987@pickle198711 ай бұрын
    • I have plans to one day cover elliptic curves entirely.

      @PracticalNetworking@PracticalNetworking11 ай бұрын
  • Thanks

    @rafay1708@rafay17082 жыл бұрын
    • You're welcome!

      @PracticalNetworking@PracticalNetworking2 жыл бұрын
  • can ecdsa also only sinature a massege?

    @Cutrexxx@Cutrexxx2 жыл бұрын
    • Yes. ECDSA is like DSA in so far as what it can be used for. In fact, all the "EC" variants are simply the same core protocols done with Elliptic Curves. More details here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/

      @PracticalNetworking@PracticalNetworking2 жыл бұрын
  • 👍👍👍

    @admin_e@admin_e2 жыл бұрын
  • Okay

    @Liltheo626@Liltheo62611 күн бұрын
  • why is it called asymmetric encryption if it doesn't actually encrypt?

    @dan5640@dan5640 Жыл бұрын
    • Great question =). You're right, Asymmetric Encryption is _not_ the best terminology. I wrote about that here: www.practicalnetworking.net/practical-tls/rsa-diffie-hellman-dsa-asymmetric-cryptography-explained/ _"some might even hesitate to use the term “Asymmetric Encryption” for these algorithms, and instead elect to use “Asymmetric Cryptosystem” - since again, only one of these algorithms involves actual “encryption”._

      @PracticalNetworking@PracticalNetworking Жыл бұрын
    • Came to the comments to see if anyone else was scratching their head on this one too!

      @thestudy6875@thestudy68753 күн бұрын
    • It is asymetric cryptography/cryptosystem, not encryption. There are cryptographic capabilities. Some of them are key exchange (like diffie helman), encryption (like rsa) and authentication (like digital signatures, rsa). There are many cryptographic protocols/schemes, but not all of them provide all the cryptographic capabilities. For example, you cannot use diffie helman for encryption. Because its just not possible. You can use it for key exchange, and then use symetric cryptography for encryption, but you cannot encrypt anything with diffie helman.

      @fugoogle_was_already_taken@fugoogle_was_already_takenКүн бұрын
  • I saw its math somewhere else I hoped you'd get into the math part 🥲

    @user-mf8nn3tl5w@user-mf8nn3tl5wАй бұрын
KZhead