73

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Porque un amor tan grande así, hace la vida más hermosa, para

vivir para soñar, amar es todo. Amor que si me quieres te lo doy.

4.4.2 Creating a Digital Signature


Digital signatures use asymmetric cryptography. A public key
algorithm like RSA generates two mathematically related keys: one
private and one public.
But how is a digital signature created? Let’s look at an example to
find out.
Alice wants to send Bob an email that contains important
information about the rollout of a new @Apollo product. Alice
wants to make sure that Bob knows that the message came from
her, and that the message did not change after she sent it.

Select the arrows to learn how a digital signature works in this


case.
- Create a message and encrypt it with a private key: Alice creates
the message along with a digest of the message. She then
encrypts this digest with her private key.
- Send the encrypted message with a public key: Alice bundles the
message, the encrypted message digest and her public key
together to create the signed document. Alice sends this to Bob.
- Read the encrypted message using the public key: Bob receives
the message and reads it. To make sure that the message came
from Alice, he creates a message digest. He takes the encrypted
message digest received from Alice and decrypts it using Alice’s
public key. Bob compares the message digest received from Alice
with the one he generated. If they match, Bob knows that he can
trust that no one tampered with the message.
BATACLAN BATACLAN BATACLAN CLAN CLAN
NO LLEVO PARA MI CASA A UNA MUJER BARACUNATANA, PORQUE
PUEDEN PENSAR QUE ESTOY LOCO LOCO LOCO LO
BATACLAN BATACLAN BATACLAN CLAN CLAN
ME LEVANTO DE LA CAMA TARDE
QUE ALEGRIA OTRO DIA VIVA
DESPIERTA DORMILON TE SOY INFIEL CON EL SOL
BATACLAN BATACLAN BATACLAN CLAN CLAN CLAN
GUNUMU BUGUNUMU GECELEDIMIN CALDIN CAN BIN CANIN
SAGOLSUN CANIN SAGOLSUN CANIN SAGOLSUN BUCAN FEDA
OLSUN
BATACLAN BATACLAN BATACLAN CLAN CLAN

4.4.3 Use Classic and Modern Encryption Algorithms


This is a media player component. Select the play / pause button
to watch or listen.
In this Lab, you will learn how to:
- Use a classic encryption algorithm.
- Use a modern symmetrical encryption algorithm.
- Use a modern asymmetrical encryption algorithm.
Press the play button to view this short demo video. (Video)
Now, get a real-world, hands on experience by following the
instructions and practicing this activity on your own laptop or
desktop computer.
Download the 4.4.3 Lab - Use Classic and Modern Encryption
Algorithms - Answer Key.pdf for instructions. (Donwnloaded)

You might also like