This is part 6 of the Blockchain tutorial explaining what a digital signature is. In this video series different topics will be explained which will help you to …
26 Comments
In 2:24, he says the data which is the document is now hashed which gives hash value for comparison. My question is how Bob has the actual data? wasn't he supposed to be the receiver? According to the explanation, so-far he has only decrypted the digital signature which gave him the original hash value which is not the actual data. Can someone please explain. Thank you!
How come sometimes I need to import Crypto and sometimes I don't? i.e. sometimes just the "from Crypto.Hash import RSA" works without importing Crypto and sometimes I do have to import Crypto. Also curious why don't you use RSA 2048 instead of 1024? Isn't it more secure?
Different different algorithms (MD5 and sha1) give same hash function ? While checking (encryption and decryption) digital signature.? Is it possible if encryption with MD5 and decryption with sha1 algorithms ? Thanks for your tutorial.
Hi, this tutorial on digital signature is getting into the complex part of block chain. Tutorial 6 needs to be view several times for a proper understanding. Not easy, but it's intriguing. Thanks for the tutorial.
In 2:24, he says the data which is the document is now hashed which gives hash value for comparison. My question is how Bob has the actual data? wasn't he supposed to be the receiver? According to the explanation, so-far he has only decrypted the digital signature which gave him the original hash value which is not the actual data. Can someone please explain.
Thank you!
thanks
Lighting fast, user-friendly environment and efficient, Digital Signature software https://digitalsigner.pulkitsoft.com
What are the requirements for implementation
Please give me the file SHA256, RSA, Random. thank you
Great explanation!
Thank you!
Is non-repudiation really enforceable under this scheme? Somebody could have had their private key stolen from them.
very nice … thanks for the demo and very clear.
Thank you! Brilliant! Bravo! This really helped!
best explanation
Thanks for clearing explaining the confusing topic.
How come sometimes I need to import Crypto and sometimes I don't? i.e. sometimes just the "from Crypto.Hash import RSA" works without importing Crypto and sometimes I do have to import Crypto. Also curious why don't you use RSA 2048 instead of 1024? Isn't it more secure?
Different different algorithms (MD5 and sha1) give same hash function ? While checking (encryption and decryption) digital signature.? Is it possible if encryption with MD5 and decryption with sha1 algorithms ?
Thanks for your tutorial.
i am working on web3 and try to use web3.eth.call() but struggling to find a right way to apply this one
hi mobilefish , you really a greate explainer, i tried many videos and artical but you are awesome
wher can i get the python files which you have shown in this video and previous video of cryptography ?
Thank you for the video. Would you mind also explain to use the Web3.eth.sign in this case? Much appreciated.
The way you explain this term is awesome
Hi, this tutorial on digital signature is getting into the complex part of block chain. Tutorial 6 needs to be view several times for a proper understanding. Not easy, but it's intriguing. Thanks for the tutorial.
thank you very much.
Thanks!!
always grateful~~
This series is youtube gold
Thank you. is it possible we can have the slides?
Thank you! I was looking for this kind of technical explanation!