Chapter 13. Implementing Digital Signatures
This chapter covers the following topics:
Examining hash algorithms: This section explores the construction and use of hash algorithms. It examines a variety of hash algorithms and discusses their relative strengths and weaknesses in practical application.
Using digital signatures: This section examines the components that make up a digital signature, as well as the application of these as a means of proving the authenticity of a message.
As you examine the security at play in your network and seek to increase your defenses, it is important to have a general understanding of cryptography and digital signatures. In cryptography, a cryptographic hash function is a transformation ...
Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.