Skip to Content
Fundamentals of Information Systems Security, 4th Edition
book

Fundamentals of Information Systems Security, 4th Edition

by David Kim, Michael G. Solomon
December 2021
Beginner
550 pages
20h 48m
English
Jones & Bartlett Learning
Content preview from Fundamentals of Information Systems Security, 4th Edition

Digital Signatures and Hash Functions

For many business requirements, you should understand the use of digital signatures and hash functions and what types of ciphers to use.

Hash Functions

To ensure that the values of a message have not changed—either deliberately or through transmission error—a summary of the information, which can be verified through a repeatable process, can be appended. This summary is called a checksum. For example, to make sure a string of digits has not changed in transmission, you could append the sum of all the digits to the end of the message. If the recipient adds up the digits and reaches a different value, then the recipient can assume that there was an error in transmission and the message should be resent. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Fundamentals of Information Systems Security, 3rd Edition

Fundamentals of Information Systems Security, 3rd Edition

David Kim, Michael G. Solomon

Publisher Resources

ISBN: 9781284220742