Chapter 10. Using Digital Signatures

THE FOLLOWING CCNA-SECURITY EXAM TOPICS ARE COVERED IN THIS CHAPTER:

  • Hashing overview

  • Explain hash function and values

  • Explain hashing algorithms

  • Explain digital signatures

Using Digital Signatures

Once you have an understanding of hashing and its components, we will discuss digital signatures. We will look at the features that make up digital signatures and the algorithms that generate them.

Hashing Overview

What is hashing? Simply put, hashing is taking some type of input data and generating some sort of value. This value is typically a fixed-length integer. The process of taking input data and generating the value is called a hash function ...

Get CCNA® Security Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.