Feb. 22, 2023, 1:17 p.m. | JANBAR MOHAMMED

System Weakness - Medium systemweakness.com

A simple introduction to DSA

As you know the digital signature is used to verify :

  • The document is created by the author with public key
  • The message or document is not tampared

This Digital signature can be generated by any cryptographic hash function like SHA256.

We can say that Digital signatures are an asymmetrically encrypted hash of a digital message (data), It is a value that can provide a guarantee of authenticity, non-repudiation and integrity.

The most important thing …

algorithm author cybersecurity data development devsecops digital digital signature digital signatures document elliptic encrypted flaw function generated guarantee hacking hash hash function important integrity introduction message non pentesting public sha256 signature signatures simple value verify

Application Security Assurance Associate

@ DTCC | Tampa, FL, United States

Threat Hunter II

@ Microsoft | Hyderabad, Telangana, India

Staff Cyber Security Engineer (Application Security, Emerging Platforms)

@ NBCUniversal | Englewood Cliffs, NEW JERSEY, United States

Cyber Security Senior Cyber Security Engineer

@ Sopra Steria | Noida, Uttar Pradesh, India

Data Protection and Privacy Manager

@ Future PLC | London, England, United Kingdom

RSOC Manager

@ The University of Texas at Austin | AUSTIN, TX