0% found this document useful (0 votes)
14 views3 pages

6

Uploaded by

J A M S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views3 pages

6

Uploaded by

J A M S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BATACLAN BATACLAN BATACLAN CLAN CLAN

NO LLEVO PARA MI CASA A UNA MUJER BARACUNATANA, PORQUE


PUEDEN PENSAR QUE ESTOY LOCO LOCO LOCO LO
BATACLAN BATACLAN BATACLAN CLAN CLAN
ME LEVANTO DE LA CAMA TARDE
QUE ALEGRIA OTRO DIA VIVA
DESPIERTA DORMILON TE SOY INFIEL CON EL SOL
BATACLAN BATACLAN BATACLAN CLAN CLAN CLAN
GUNUMU BUGUNUMU GECELEDIMIN CALDIN CAN BIN CANIN
SAGOLSUN CANIN SAGOLSUN CANIN SAGOLSUN BUCAN FEDA OLSUN
BATACLAN BATACLAN BATACLAN CLAN CLAN

4.4.2 Creating a Digital Signature


Digital signatures use asymmetric cryptography. A public key algorithm
like RSA generates two mathematically related keys: one private and
one public.
But how is a digital signature created? Let’s look at an example to find
out.
Alice wants to send Bob an email that contains important information
about the rollout of a new @Apollo product. Alice wants to make sure
that Bob knows that the message came from her, and that the message
did not change after she sent it.

Select the arrows to learn how a digital signature works in this case.
- Create a message and encrypt it with a private key: Alice creates the
message along with a digest of the message. She then encrypts this
digest with her private key.
- Send the encrypted message with a public key: Alice bundles the
message, the encrypted message digest and her public key together to
create the signed document. Alice sends this to Bob.
- Read the encrypted message using the public key: Bob receives the
message and reads it. To make sure that the message came from Alice,
he creates a message digest. He takes the encrypted message digest
received from Alice and decrypts it using Alice’s public key. Bob
compares the message digest received from Alice with the one he
generated. If they match, Bob knows that he can trust that no one
tampered with the message.

4.4.3 Use Classic and Modern Encryption Algorithms


This is a media player component. Select the play / pause button to
watch or listen.
In this Lab, you will learn how to:
- Use a classic encryption algorithm.
- Use a modern symmetrical encryption algorithm.
- Use a modern asymmetrical encryption algorithm.
Press the play button to view this short demo video. (Video)
Now, get a real-world, hands on experience by following the
instructions and practicing this activity on your own laptop or desktop
computer.
Download the 4.4.3 Lab - Use Classic and Modern Encryption Algorithms
- Answer Key.pdf for instructions. (Donwnloaded)

You might also like