2 cissp ® Official Study Guide Eighth Edition


Understand how digital signatures are generated and verified



Download 19,3 Mb.
Pdf ko'rish
bet259/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   255   256   257   258   259   260   261   262   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand how digital signatures are generated and verified.
To digitally sign a mes-
sage, first use a hashing function to generate a message digest. Then encrypt the digest with 
your private key. To verify the digital signature on a message, decrypt the signature with 
the sender’s public key and then compare the message digest to one you generate yourself. If 
they match, the message is authentic.
Know the components of the Digital Signature Standard (DSS).
The Digital Signature 
Standard uses the SHA-1, SHA-2, and SHA-3 message digest functions along with one of 
three encryption algorithms: the Digital Signature Algorithm (DSA); the Rivest, Shamir, 
Adleman (RSA) algorithm; or the Elliptic Curve DSA (ECDSA) algorithm.
Understand the public key infrastructure (PKI).
In the public key infrastructure, cer-
tificate authorities (CAs) generate digital certificates containing the public keys of system 
users. Users then distribute these certificates to people with whom they want to communi-
cate. Certificate recipients verify a certificate using the CA’s public key.


270
Chapter 7 

PKI and Cryptographic Applications
Know the common applications of cryptography to secure email.
The emerging standard 
for encrypted messages is the S/MIME protocol. Another popular email security tool is Phil 
Zimmerman’s Pretty Good Privacy (PGP). Most users of email encryption rely on having 
this technology built into their email client or their web-based email service.
Know the common applications of cryptography to secure web activity.
The de facto 
standard for secure web traffic is the use of HTTP over Transport Layer Security (TLS) or 
the older Secure Sockets Layer (SSL). Most web browsers support both standards, but many 
websites are dropping support for SSL due to security concerns.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   255   256   257   258   259   260   261   262   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish