1 00:00:00,160 --> 00:00:02,760 Speaker 1: Streaming TV shows and movies directly to your home is 2 00:00:02,759 --> 00:00:05,560 Speaker 1: a breeze with Netflix. As a Netflix member, you can 3 00:00:05,600 --> 00:00:09,040 Speaker 1: instantly watch TV and movies on your PC, mac, mobile device, 4 00:00:09,160 --> 00:00:12,440 Speaker 1: or television. Get a free thirty day trial membership. Go 5 00:00:12,520 --> 00:00:15,200 Speaker 1: to Netflix dot com, slash stuff and sign up today. 6 00:00:15,840 --> 00:00:19,160 Speaker 1: Welcome to Brainstuff from house stuff works dot com where 7 00:00:19,160 --> 00:00:29,840 Speaker 1: smart happens. Hi, I'm our so brain with today's question, 8 00:00:30,320 --> 00:00:35,520 Speaker 1: what is a digital signature? A digital signature is basically 9 00:00:35,560 --> 00:00:38,760 Speaker 1: a way to ensure that an electronic document, like an 10 00:00:38,760 --> 00:00:42,880 Speaker 1: email message, or a spreadsheet or a text file, is authentic. 11 00:00:43,360 --> 00:00:46,840 Speaker 1: Authentic means that you know who created the document, and 12 00:00:46,920 --> 00:00:49,280 Speaker 1: you know that it has not been altered in any 13 00:00:49,280 --> 00:00:53,760 Speaker 1: way since that person created it. Digital signatures rely on 14 00:00:53,960 --> 00:00:58,640 Speaker 1: certain types of encryption to ensure that authentication. Encryption is 15 00:00:58,680 --> 00:01:01,600 Speaker 1: the process of taking all the data that one computer 16 00:01:01,720 --> 00:01:04,959 Speaker 1: is sending to another computer and encoding it into a 17 00:01:05,040 --> 00:01:08,240 Speaker 1: form that only the receiving computer will be able to decode. 18 00:01:08,720 --> 00:01:13,679 Speaker 1: Authentication is the process of verifying that unaltered information is 19 00:01:13,720 --> 00:01:18,040 Speaker 1: coming from a trusted source. These two processes were cand 20 00:01:18,080 --> 00:01:21,520 Speaker 1: in hand for digital signatures. There are several ways to 21 00:01:21,600 --> 00:01:25,600 Speaker 1: authenticate a person or information on a computer. The most 22 00:01:25,680 --> 00:01:28,840 Speaker 1: common way is to use some kind of password scheme. 23 00:01:29,400 --> 00:01:32,440 Speaker 1: The use of a user name and password provide the 24 00:01:32,480 --> 00:01:36,360 Speaker 1: most common form of authentication. You enter your name and 25 00:01:36,480 --> 00:01:39,720 Speaker 1: password when prompted by the computer. It checks the pair 26 00:01:39,760 --> 00:01:43,280 Speaker 1: against the secure file to confirm. If either the name 27 00:01:43,400 --> 00:01:46,279 Speaker 1: or the password don't match, then you're not allowed further 28 00:01:46,400 --> 00:01:50,600 Speaker 1: access to the document. Many text editors, like Microsoft Word 29 00:01:50,680 --> 00:01:54,840 Speaker 1: offer this feature. You simply encode the document before you 30 00:01:54,880 --> 00:01:57,480 Speaker 1: send it, put the password on it, and then the 31 00:01:57,680 --> 00:02:00,520 Speaker 1: recipient who you tell the password to, the only one 32 00:02:00,560 --> 00:02:05,040 Speaker 1: who can read that document. The second idea is a checksum. 33 00:02:05,080 --> 00:02:07,920 Speaker 1: It's probably one of the oldest methods of ensuring that 34 00:02:08,040 --> 00:02:12,400 Speaker 1: data is correct, and checksums also provide a form of authentication, 35 00:02:12,560 --> 00:02:16,440 Speaker 1: since an invalid checksums suggests that the data has been 36 00:02:16,480 --> 00:02:19,880 Speaker 1: compromised in some fashion while it was being sent. A 37 00:02:20,040 --> 00:02:23,239 Speaker 1: checksum is determined in one of two ways. Let's say 38 00:02:23,280 --> 00:02:26,640 Speaker 1: that the checksum of a packet is one bite long, 39 00:02:27,000 --> 00:02:29,120 Speaker 1: which means it can have a maximum value of two 40 00:02:29,520 --> 00:02:32,640 Speaker 1: fifty five. If the sum of all the bites in 41 00:02:32,680 --> 00:02:35,080 Speaker 1: the packet is two fifty five or less, then the 42 00:02:35,200 --> 00:02:39,160 Speaker 1: checksum contains that exact value. However, if the sum of 43 00:02:39,200 --> 00:02:41,519 Speaker 1: the other bites is more than two D fifty five, 44 00:02:41,880 --> 00:02:45,080 Speaker 1: then the checksum is the remainder of the total value 45 00:02:45,120 --> 00:02:48,280 Speaker 1: after it's been divided by two D fifty six. Another 46 00:02:48,400 --> 00:02:53,160 Speaker 1: technique called a CRC or cyclic redundancy check, is similar 47 00:02:53,200 --> 00:02:58,240 Speaker 1: in concept to checksums. Neither checksums or CRCs really provide 48 00:02:58,280 --> 00:03:00,720 Speaker 1: any protection of the data. They just tell you that 49 00:03:00,800 --> 00:03:03,440 Speaker 1: it hasn't been tampered with as it made its way 50 00:03:03,480 --> 00:03:08,480 Speaker 1: to your computer. Then there's private key encryption. Private key 51 00:03:08,560 --> 00:03:12,320 Speaker 1: means that each computer as a secret key or secret 52 00:03:12,400 --> 00:03:15,520 Speaker 1: code that it can use to encrypt a packet of 53 00:03:15,560 --> 00:03:18,680 Speaker 1: information before it's sent over the network to the other computer. 54 00:03:19,400 --> 00:03:22,960 Speaker 1: Private key requires that you know which computers will talk 55 00:03:23,000 --> 00:03:25,480 Speaker 1: to each other and install the key on each one 56 00:03:25,520 --> 00:03:29,000 Speaker 1: ahead of time. Private key encryption is essentially the same 57 00:03:29,040 --> 00:03:32,240 Speaker 1: as a secret code that the two computers must each 58 00:03:32,440 --> 00:03:36,040 Speaker 1: know in order to decode the information when it arrives. 59 00:03:36,560 --> 00:03:39,840 Speaker 1: The code would provide the key to decoding the message. 60 00:03:40,280 --> 00:03:43,240 Speaker 1: Your friend gets the message and then decodes it. Anyone 61 00:03:43,280 --> 00:03:47,160 Speaker 1: else who sees the message will see only nonsense because 62 00:03:47,160 --> 00:03:50,920 Speaker 1: they don't have the key. Then there's public key encryption. 63 00:03:51,400 --> 00:03:54,960 Speaker 1: Public key encryption uses a combination of a private key 64 00:03:55,000 --> 00:03:58,120 Speaker 1: and a public key. The private key is known only 65 00:03:58,160 --> 00:04:01,800 Speaker 1: to your computer, while the public key is given by 66 00:04:01,880 --> 00:04:05,400 Speaker 1: your computer to any computer that wants to communicate with it. 67 00:04:05,840 --> 00:04:09,640 Speaker 1: To decode an encrypted message, a computer must use the 68 00:04:09,720 --> 00:04:13,680 Speaker 1: public key provided by the originating computer and its own 69 00:04:13,880 --> 00:04:18,680 Speaker 1: private key, and then there are digital certificates. To implement 70 00:04:18,800 --> 00:04:21,640 Speaker 1: public key encryption on a large scale, such as a 71 00:04:21,800 --> 00:04:26,400 Speaker 1: secure web server might need, requires a different approach. This 72 00:04:26,480 --> 00:04:30,320 Speaker 1: is where digital certificates come in. A digital certificate is 73 00:04:30,400 --> 00:04:33,440 Speaker 1: essentially a bit of information that says the web server 74 00:04:33,680 --> 00:04:39,080 Speaker 1: is trusted by an independent source known as a certificate authority. 75 00:04:39,120 --> 00:04:43,560 Speaker 1: The certificate authority acts as a middleman that both computers trust. 76 00:04:44,000 --> 00:04:46,760 Speaker 1: It confirms that each computer is in fact who they 77 00:04:46,800 --> 00:04:49,720 Speaker 1: say they are, and then provides the public keys of 78 00:04:49,839 --> 00:04:54,359 Speaker 1: each computer to the other. The Digital Signature Standard is 79 00:04:54,520 --> 00:04:58,200 Speaker 1: based on a type of public key encryption that uses 80 00:04:58,320 --> 00:05:03,000 Speaker 1: the digital signature out gorhythm. The Digital Signature Standard is 81 00:05:03,040 --> 00:05:06,200 Speaker 1: the format for digital signals that's been endorsed by the 82 00:05:06,279 --> 00:05:10,919 Speaker 1: US government. For more on this and thousands of other topics, 83 00:05:11,080 --> 00:05:13,479 Speaker 1: visit how Stuff Works dot com, and don't forget to 84 00:05:13,520 --> 00:05:15,360 Speaker 1: check out the brain Stuff blog on the house stuff 85 00:05:15,400 --> 00:05:17,920 Speaker 1: works dot com home page. You can also follow brain 86 00:05:18,000 --> 00:05:21,320 Speaker 1: stuff on Facebook or Twitter at brain stuff hs W. 87 00:05:25,040 --> 00:05:28,359 Speaker 1: Audible dot com is the leading provider of downloadable digital 88 00:05:28,400 --> 00:05:32,080 Speaker 1: audio books and spoken word entertainment. Audible has over one 89 00:05:32,120 --> 00:05:35,000 Speaker 1: hundred thousand titles to choose from to be downloaded to 90 00:05:35,040 --> 00:05:38,560 Speaker 1: your iPod or MP three player. Go to audible podcast 91 00:05:38,680 --> 00:05:41,040 Speaker 1: dot com slash brain stuff to get a free audio 92 00:05:41,080 --> 00:05:43,480 Speaker 1: book download of your choice when you sign up today.