Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

HMAC vs digital signature

Автор: Jan Goebel

Загружено: 2021-12-06

Просмотров: 5814

Описание:

🔥More exclusive content: https://productioncoder.com/you-decid...
Twitter:   / _jgoebel  
Website: https://jangoebel.com
Blog: https://productioncoder.com

00:00 Difference between HMAC and digital signature
01:19 How to create an HMAC with a shared secret
01:44 How to create digital signatures
02:07 Guarantees that HMACs and digital signatures provide
04:36 Should you use digital signatures or HMACs?
05:50 What signature algorithm should you use?

HMAC stands for keyed hashed message authentication code. To create an HMAC you need to make up a secret a secret which is then used with the content and a predefined hash function (like SHA 256) to create the HMAC. To verify an HMAC, you need to know the exact same secret that was used to create it. This can sometimes be problematic if you do not trust the respective other party. If two companies collaborate and were to share a secret and one company falls victim to a hacking attack, then the other party's system is also at least partly compromised.


To avoid this, people tend to prefer digital signatures which leverage public key cryptography. The idea is to generate a key pair with a private and a public key. The private key can be used to create the digital signature. The public key can only be used to verify a digital signature, but you cannot create a new signature with the public key itself. You then keep your private key for yourself and distribute the public key. Like so you do not need a shared secret which reduces the overall risk of getting compromised. Because digital signatures leverage public key cryptography and because you do not have a shared secret with them, they offer the property of non-repudiation. This means that the party that made up the key pair and kept the private key for themselves cannot deny that it created a digital signature (unless they have been hacked).

HMAC vs digital signature

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Unsecured JWTs are a huge security vulnerability

Unsecured JWTs are a huge security vulnerability

HMAC explained | keyed hash message authentication code

HMAC explained | keyed hash message authentication code

Intro to Digital Signatures & HMACs (and a little about TLS :)

Intro to Digital Signatures & HMACs (and a little about TLS :)

CertMike объясняет, что такое цифровые подписи

CertMike объясняет, что такое цифровые подписи

Secure your Cloud Services with TLS X.509 Client Certificates

Secure your Cloud Services with TLS X.509 Client Certificates

Key Exchange Problems - Computerphile

Key Exchange Problems - Computerphile

MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

JWS vs JWE

JWS vs JWE

What are Digital Signatures? - Computerphile

What are Digital Signatures? - Computerphile

Symmetrical vs asymmetrical Encryption Pros and Cons by Example

Symmetrical vs asymmetrical Encryption Pros and Cons by Example

Хеширование и цифровые подписи — CompTIA Security+ SY0-701 — 1.4

Хеширование и цифровые подписи — CompTIA Security+ SY0-701 — 1.4

Securing Stream Ciphers (HMAC) - Computerphile

Securing Stream Ciphers (HMAC) - Computerphile

Tech Talk: What is Public Key Infrastructure (PKI)?

Tech Talk: What is Public Key Infrastructure (PKI)?

Intro to Hashing | SHA1, SHA2 and SHA256, MD5, Hash Tables, Digitally Signing

Intro to Hashing | SHA1, SHA2 and SHA256, MD5, Hash Tables, Digitally Signing

128 Bit or 256 Bit Encryption? - Computerphile

128 Bit or 256 Bit Encryption? - Computerphile

Digital Signatures and Digital Certificates

Digital Signatures and Digital Certificates

AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Hashing vs Encryption Differences

Hashing vs Encryption Differences

Почему JWT популярен?

Почему JWT популярен?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]