Cryptography: Hashes, PKI, Digital Signatures, and Trust Models
VerifiedAdded on 2020/10/09
|5
|1391
|186
Report
AI Summary
This report delves into the core concepts of cryptography, focusing on crypto hashes and Public Key Infrastructure (PKI). It explains cryptographic hash functions, including their properties like pre-image resistance and collision resistance, and their application in Message Authentication Codes (MACs) and digital fingerprints. The report further explores digital signatures, detailing the Digital Signature Algorithm (DSA) and the role of Certificate Authorities (CAs) in verifying identities and issuing certificates. It examines the components of a PKI, including certificate construction, issuance, signing, and revocation. Additionally, the report discusses Pretty Good Privacy (PGP), its trust models, and the concept of a Web of Trust. The report concludes by emphasizing the importance of PKI in establishing secure communication and facilitating trusted transactions, covering topics such as non-repudiation and secrecy, and the role of certificates in building trust relationships.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 out of 5