Abstract
So far, we have covered three pillars of our four pillars of cryptography. We discussed integrity and how cryptographic primitives, like hashing with SHA-256, can help us solve that problem. We then discussed authentication and I explained hashed message authentication codes, such as HMAC-SHA-256. We then covered confidentiality by looking at both symmetric and asymmetric encryption. In this chapter we will take a look at the non-repudiation pillar of cryptography by discussing digital signatures.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Stephen Haunts
About this chapter
Cite this chapter
Haunts, S. (2019). Digital Signatures. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4375-6_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4374-9
Online ISBN: 978-1-4842-4375-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)