From the course: SSL/TLS for Beginners: Securing Network Communications

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Hashing and digital signatures

Hashing and digital signatures - Active Directory Tutorial

From the course: SSL/TLS for Beginners: Securing Network Communications

Start my 1-month free trial

Hashing and digital signatures

- [Instructor] A big part of working with SSL and TLS includes hashing and digital signatures. These are methods that fall into the big picture of securing network communications. Let's define how that works. We'll start by talking about hashing. Hashing doesn't necessarily require a PKI certificate and it might not even be used for network communications. However, it can be. So it can be used to verify the integrity of network messages, or simply the integrity of files that are stored somewhere. And also to verify machine boot-up settings. When we say verify the integrity, what we mean is we want to make sure that these things have not been tampered with, they've not been modified by unauthorized parties. So hashing then doesn't provide data confidentiality that would be encryption. Hashing can also be used with SSL and TLS and we'll identify that a little bit later when we talk about digital signatures. Hashing uses a one-way algorithm that results in a unique value and that unique…

Contents