From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Digital signatures
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Digital signatures
- [Instructor] Digital signatures provide an electronic counterpart to physical signatures. Digital signatures use asymmetric cryptography to achieve the goals of integrity, authentication and non-repudiation. When the recipient of a digitally signed message verifies that message's signature, they know three things. First, that the person owning the public key used to sign the message is actually the person who signed the message, that's authentication. Second, that the message was not altered after being signed, that's integrity. And finally, that the sender could prove these facts to a third party if necessary, that's non-repudiation. The use of digital signatures depends upon two important concepts discussed earlier in this course. First, that hash functions are collision resistant. For a strong hash function, you can't find two inputs that produce the same output. Second, that anything encrypted with one key from an…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
Digital signature standard1m 40s
-
(Locked)
Create a digital certificate4m 55s
-
(Locked)
Revoke a digital certificate1m 41s
-
(Locked)
Certificate stapling2m 29s
-
(Locked)
Certificate authorities6m 13s
-
(Locked)
Certificate subjects3m 35s
-
(Locked)
Certificate types2m 55s
-
(Locked)
Certificate formats2m 30s
-
(Locked)
-
-
-
-
-