Requirement of cryptography
Cryptography techniques
Cipher modes
Symmetric
Asymmetric
BlockStream
Your identity—
the digital signatureo
Working of digital signature
Creating a digital signature
Digital signature classes
Digital signature uses
Hash functions
U se of hash functions in blockchain
Hash function security for blockchain
Types of hash functions
Digital certificates
Obtaining a digital certificate—
the process
Conclusion
K eywords
Questions
Objectives
The chapter’s obj ectives include introducing you to cryptography,
explaining its strength, knowing its requirement, and providing an
understanding of cryptography techniques. The various cipher modes—
symmetric, asymmetric, block, and stream are described. The authentication
of an electronic document is important, and the way to ensure it is through
digital signature, explain the working of digital signature, learn to create a
digital signature, and describe the three classes of digital signatures. An
understanding of several use cases of digital signatures is provided. There