课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Digital signatures

Digital signatures

- [Instructor] Digital signatures provide an electronic counterpart to physical signatures. Digital signatures use asymmetric cryptography to achieve the goals of integrity, authentication, and non-repudiation. When the recipient of a digitally signed message verifies that message's signature, they know three things. First, that the person owning the public key used to sign the message is actually the person who signed the message. That's authentication. Second, that the message was not altered after being signed. That's integrity. And finally, that the sender could prove these facts to a third party if necessary. That's non-repudiation. The use of digital signatures depends upon two important concepts discussed earlier in this course. First, that hash functions are collision-resistant. For a strong hash function, you can't find two inputs that produce the same output. Second, that anything encrypted with one key from an asymmetric key pair may only be decrypted with the other key…

内容