У нас вы можете посмотреть бесплатно Information Security Terminology - Lecture 12/16 - Digital Signatures and Certificates или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
0:00 Lecture 12: Digital Signatures and PKI 0:15 Introduction 1:09 Part 1: Digital Signature Fundamentals / What is a Digital Signature? 1:59 The Signing and Verification Process 2:49 Security Requirements 3:38 Part 2: RSA Signatures / RSA Signature Basics 6:30 PKCS#1 v1.5 Signatures / RSA-PSS (Probabilistic Signature Scheme) 7:34 RSA Signature Key Sizes 8:11 Part 3: Elliptic Curve Signatures / ECDSA (Elliptic Curve Digital Signature Algorithm) 9:45 The Random Number Critical Requirement 10:31 EdDSA (Edwards-curve Digital Signature Algorithm) 12:36 Part 4: Additional Signature Schemes / Schnorr Signatures 13:30 BLS Signatures 14:31 Post-Quantum Signatures 15:30 Part 5: Public Key Infrastructure Fundamentals / The Trust Problem 16:00 PKI Components 16:46 The Web of Trust Model 17:41 Part 6: X.509 Certificates / Certificate Structure 19:12 Distinguished Names 19:54 Certificate Types 20:44 Certificate Chains 21:29 Part 7: Certificate Lifecycle / Certificate Issuance 22:19 Certificate Revocation 23:11 Short-Lived Certificates 23:29 Part 8: TLS 1.3 / Why TLS Matters 24:00 TLS 1.3 Handshake 25:04 TLS 1.3 Cipher Suites 26:04 Certificate Verification in TLS 27:02 Part 9: Certificate Transparency / The Problem 27:23 How CT Works 27:46 CT Logs 28:25 Monitoring 28:53 Part 10: ACME Protocol / Automated Certificate Management 29:16 ACME Overview 29:57 ACME Challenges 30:37 Let's Encrypt 31:02 Part 11: Code Signing 31:12 Why Code Signing? 31:33 Code Signing Certificates 32:05 Timestamping 32:15 Platform-Specific Considerations 32:42 Part 12: Best Practices / Signature Algorithm Selection (2025-2026) 33:37 Certificate Management 34:09 TLS Configuration 34:41 Private Key Protection 35:05 Conclusion 36:35 Discussion Questions 37:17 Review Questions 38:04 Key Terms 40:32 References and Further Reading