Completion requirements
View
This video shows how to apply public key cryptography with hash functions to add a digital signature to the authentication process. Observe that, given your encryption and decryption knowledge from previous units, you have the ability to implement these systems. You only need to understand how the various architectures address confidentiality, authentication, and non-repudiation.
Source: Steven Gordon, https://www.youtube.com/watch?v=wixALaqnMqw This work is licensed under a Creative Commons Attribution 3.0 License.