Page 397 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 397

algorithm.

               Chapter 7 provides details on contemporary hashing algorithms and
               explains how they are used to provide digital signature capability,

               which helps meet the cryptographic goals of integrity and
               nonrepudiation.
   392   393   394   395   396   397   398   399   400   401   402