Abstract
Now that we’ve covered the simple cryptographic primitives, its time to build more complex things using those primitives. The first of those is a digital signature, which provides message integrity, detection of tampering and non-repudiation. This is created using a hash function and asymmetric cryptography. The second of these is a digital envelope that provides privacy. This is created using symmetric key cryptography and asymmetric key cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Hughes, L.E. (2022). Digital Signature and Digital Envelope. In: Pro Active Directory Certificate Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7486-6_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7486-6_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7488-0
Online ISBN: 978-1-4842-7486-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)