Changes

Jump to: navigation, search

Cryptography Basics

75 bytes added, 19:00, 20 July 2009
no edit summary
<hr>
<google>BUY_SECURITYPLUS</google>
An essential component of IT security involves the use of cryptography. In this chapter we will look at the basics of cryptography and provide an overview of a number of different types of cryptography.
Once a document has been signed with a digital signature it is essential that a message digest be created using a hash function. This ensures that if the document is modified the change will be detected because the hash will fail verification by the recipient. Asymmetric encryption is also used to verify that the signature was indeed signed by the apparent document sender. To achieve this the hash is typically encrypted using the senders private key. If the recipient is able to decrypt the hash using the senders public key then the message is deemed to be authentic. It will not go unnoticed to those who have read the previous sections that this involves ''authentication'', ''integrity'' and ''nonrepudiation''.
<google>BUY_SECURITYPLUS_BOTTOM</google>
<hr>

Navigation menu