3. Secure Communications# 3.1. Authenticity 3.2. Digital Signatures 3.2.1. Signing 3.2.2. Verifying 3.2.3. Why Sign the Hash? 3.2.4. Recommended Video 3.3. Digital Certificates 3.3.1. Contents of a Digital Certificate 3.3.2. Signing a Digital Certificate 3.3.3. Verifying a Digital Certificate 3.4. Certificate Authorities 3.4.1. Certificate Authority Hierarchy 3.5. Secure Communication and TLS 3.5.1. Transport Layer Security (TLS) 3.5.2. TLS Handshake 3.5.3. TLS Session 3.5.4. Recommended Video 3.6. Extension: Secure Random Number Generation 3.6.1. PRNGs: Pseudorandom Number Generators 3.6.2. Cryptographic Random Number Generators (CSPRNGs) 3.6.3. Recommended Video