0% found this document useful (0 votes)
17 views2 pages

70

Uploaded by

J A M S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

70

Uploaded by

J A M S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Porque un amor tan grande así, hace la vida más hermosa, para vivir para soñar, amar es

todo.

4.4.2 Creating a Digital Signature


Digital signatures use asymmetric cryptography. A public key algorithm like RSA generates
two mathematically related keys: one private and one public.
But how is a digital signature created? Let’s look at an example to find out.
Alice wants to send Bob an email that contains important information about the rollout of a
new @Apollo product. Alice wants to make sure that Bob knows that the message came from
her, and that the message did not change after she sent it.

Select the arrows to learn how a digital signature works in this case.
- Create a message and encrypt it with a private key: Alice creates the message along with a
digest of the message. She then encrypts this digest with her private key.
- Send the encrypted message with a public key: Alice bundles the message, the encrypted
message digest and her public key together to create the signed document. Alice sends this
to Bob.
- Read the encrypted message using the public key: Bob receives the message and reads it.
To make sure that the message came from Alice, he creates a message digest. He takes the
encrypted message digest received from Alice and decrypts it using Alice’s public key. Bob
compares the message digest received from Alice with the one he generated. If they match,
Bob knows that he can trust that no one tampered with the message.
BATACLAN BATACLAN BATACLAN CLAN CLAN
NO LLEVO PARA MI CASA A UNA MUJER BARACUNATANA, PORQUE PUEDEN
PENSAR QUE ESTOY LOCO LOCO LOCO LO
BATACLAN BATACLAN BATACLAN CLAN CLAN
ME LEVANTO DE LA CAMA TARDE
QUE ALEGRIA OTRO DIA VIVA
DESPIERTA DORMILON TE SOY INFIEL CON EL SOL
BATACLAN BATACLAN BATACLAN CLAN CLAN CLAN
GUNUMU BUGUNUMU GECELEDIMIN CALDIN CAN BIN CANIN SAGOLSUN CANIN
SAGOLSUN CANIN SAGOLSUN BUCAN FEDA OLSUN
BATACLAN BATACLAN BATACLAN CLAN CLAN
4.4.3 Use Classic and Modern Encryption Algorithms
This is a media player component. Select the play / pause button to watch or listen.
In this Lab, you will learn how to:
- Use a classic encryption algorithm.
- Use a modern symmetrical encryption algorithm.
- Use a modern asymmetrical encryption algorithm.
Press the play button to view this short demo video. (Video)
Now, get a real-world, hands on experience by following the instructions and practicing this
activity on your own laptop or desktop computer.
Download the 4.4.3 Lab - Use Classic and Modern Encryption Algorithms - Answer Key.pdf
for instructions. (Donwnloaded)

You might also like