Explain how hashing provides integrity and digital signatures provide authentication.
- [Instructor] A big part of working with SSL and TLS…includes hashing and digital signatures.…These are methods that fall into the big picture…of securing network communications.…Let's define how that works.…We'll start by talking about hashing.…Hashing doesn't necessarily require a PKI certificate…and it might not even be used for network communications.…However, it can be.…So it can be used to verify…the integrity of network messages,…or simply the integrity of files that are stored somewhere.…
And also to verify machine boot-up settings.…When we say verify the integrity, what we mean is…we want to make sure that these things…have not been tampered with, they've not been modified…by unauthorized parties.…So hashing then doesn't provide data confidentiality…that would be encryption.…Hashing can also be used with SSL and TLS…and we'll identify that a little bit later…when we talk about digital signatures.…Hashing uses a one-way algorithm that results…in a unique value and that unique value…is called a hash or a message digest.…
Author
Released
2/21/2019- Symmetric and asymmetric encrypting
- How certificates are issued and managed
- Configuring a Linux OpenSSL PKI environment
- How TLS supersedes SSL and is considered more secure
- Acquiring a web server certificate
- Acquiring a code-signing certificate
- Configuring a website with a certificate
- Securing files and folders with EFS
- Configuring a TLS VPN
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Cryptography and Network Security (2015)
with Lisa Bock1h 45m Intermediate
-
Introduction
-
What you should know2m 5s
-
1. PKI Overview
-
Cryptography overview4m 47s
-
PKI hierarchy4m 47s
-
Certificate authorities6m 29s
-
Certificates8m 11s
-
-
2. PKI CA Implementation
-
3. PKI Certificate Acquisition
-
SSL vs. TLS9m 50s
-
-
4. PKI Certificate Usage
-
Configure a TLS VPN8m 12s
-
Conclusion
-
Next steps1m 9s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Hashing and digital signatures