Chapter 13. Implementing Digital Signatures

<feature><title></title>

This chapter covers the following topics:

  • Examining hash algorithms: This section explores the construction and use of hash algorithms. It examines a variety of hash algorithms and discusses their relative strengths and weaknesses in practical application.

  • Using digital signatures: This section examines the components that make up a digital signature, as well as the application of these as a means of proving the authenticity of a message.

</feature>

As you examine the security at play in your network and seek to increase your defenses, it is important to have a general understanding of cryptography and digital signatures. In cryptography, a cryptographic hash function is a transformation ...

Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.