Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers digital signatures, MACs and hashes. With a digital signature, the hash is encrypted with the sender's private key. The Recipient is able to decrypt is with the sender's public key. If the hashes match, we know the message has not been modified. This lesson also covers Message Authentication Code (MACs) which provide integrity and some reasonable authenticity.