Back to Course
Data Protection in the IT Department
0% Complete
0/0 Steps
-
Introduction IT Security1 Topic
-
Protection Goals4 Topics|1 Quiz
-
Encryption and Signature3 Topics|1 Quiz
-
Deletion of Data1 Topic|1 Quiz
-
IT-Forensics1 Topic|1 Quiz
-
Safety in the Network4 Topics|1 Quiz
-
Attack Scenarios2 Topics|1 Quiz
-
IT Security in the Overall Concept3 Topics|1 Quiz
-
Cloud Computing1 Topic|1 Quiz
-
IT Security Act and IT Communication2 Topics|1 Quiz
Lesson 3, Topic 3
In Progress
Digital Signatures
Lesson Progress
0% Complete
A distinction is also made between symmetrical and asymmetrical procedures for digital signatures. Symmetrical signatures are called Message Authentication Code and asymmetrical ones are called electronic signatures.
Everyone is certainly familiar with digital signatures when sending or receiving e-mails. What is automatically sent at the end of an e-mail – especially when exchanging with business contacts – and usually consists of a combination of the author’s name and the company logo – is such a signature. Digital signatures are also used to secure web browsers, digital certificates, update software and sign digital contracts. From a mathematical point of view, a signature consists of a large natural number, for example 3000 bits long.
