From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Digital signatures

Digital signatures

- [Instructor] Digital signatures provide an electronic counterpart to physical signatures. Digital signatures use asymmetric cryptography to achieve the goals of integrity, authentication and non-repudiation. When the recipient of a digitally signed message verifies that messages signature, they know three things. First, that the person owning the public key used to sign the message is actually the person who signed the message. That's authentication. Second, that the message was not altered after being signed. That's integrity. And finally that the sender could prove these facts to a third party if necessary. That's not repudiation. The use of digital signatures depends upon two important concepts discussed earlier in this course. First that hash functions are collision-resistant. For a strong hash function, you can't find two inputs that produce the same output. Second, that anything encrypted with one key from…

Contents