From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Digital signatures
From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Digital signatures
- [Instructor] Digital signatures provide an electronic counterpart to physical signatures. Digital signatures use asymmetric cryptography to achieve the goals of integrity, authentication and non-repudiation. When the recipient of a digitally signed message verifies that messages signature, they know three things. First, that the person owning the public key used to sign the message is actually the person who signed the message. That's authentication. Second, that the message was not altered after being signed. That's integrity. And finally that the sender could prove these facts to a third party if necessary. That's not repudiation. The use of digital signatures depends upon two important concepts discussed earlier in this course. First that hash functions are collision-resistant. For a strong hash function, you can't find two inputs that produce the same output. Second, that anything encrypted with one key from…
Contents
-
-
-
-
-
-
-
-
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
Key exchange2m 49s
-
(Locked)
Diffie-Hellman4m 33s
-
(Locked)
Key escrow2m 58s
-
(Locked)
Key stretching1m 43s
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
TLS and SSL5m 4s
-
(Locked)
IPsec2m 49s
-
(Locked)
Securing common protocols7m 58s
-
-
-
-
-
-
-
-