Requirement of cryptography

Cryptography techniques

Cipher modes

Symmetric

Asymmetric

BlockStream

Your identity—

the digital signatureo

Working of digital signature

Creating a digital signature

Digital signature classes

Digital signature uses

Hash functions

U se of hash functions in blockchain

Hash function security for blockchain

Types of hash functions

Digital certificates

Obtaining a digital certificate—

the process

Conclusion

K eywords

Questions

Objectives

The chapter’s obj ectives include introducing you to cryptography,

explaining its strength, knowing its requirement, and providing an

understanding of cryptography techniques. The various cipher modes—

symmetric, asymmetric, block, and stream are described. The authentication

of an electronic document is important, and the way to ensure it is through

digital signature, explain the working of digital signature, learn to create a

digital signature, and describe the three classes of digital signatures. An

understanding of several use cases of digital signatures is provided. There