From the course: Threat Modeling: Tampering in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Prevention and detection goals

Prevention and detection goals

From the course: Threat Modeling: Tampering in Depth

Start my 1-month free trial

Prevention and detection goals

- [Instructor] In the digital world, bits are easy to modify, permissions will prevent someone from writing a file, but despite what I've been saying, Cryptography doesn't do that. What it does is a little subtler. Cryptographic hashes are designed so that changing a single bit of the file changes the output of the hash. I added the A that the Apollo voice activated mike probably didn't pick up and the hash is completely different. A digital signature is a mathematical operation that uses the hash of a file and a private key to produce output that can be checked by anyone with the mathematically related public key. Crypto ensures that only a person, A, not the, or software that controls the relevant keys can make changes to the file and then provide an appropriate signature or integrity code. Let's go back to the example with checks. Software needs to notice that the message and signature don't match and then decide…

Contents