图文并茂解释数字证书(转)

http://www.youdzone.com/signature.htmlWhat is a Digital Signature?An introduction to Digital Signatures, by David Youd



Bob

(Bob‘s public key)


(Bob‘s private key)

Bob has been given two keys. One of Bob‘s keys is called a Public Key, the other is called a Private Key.

Bob‘s Co-workers:

Anyone can get Bob‘s Public Key, but Bob keeps his Private Key to himself
Pat Doug Susan

Bob‘s Public key is available to anyone who needs it, but he keeps his Private Key to himself. Keys are used to encrypt information. Encrypting information means "scrambling it up", so that only a person with the appropriate key can make it readable again. Either one of Bob‘s two keys can encrypt data, and the other key can decrypt that data.

Susan (shown below) can encrypt a message using Bob‘s Public Key. Bob uses his Private Key to decrypt the message. Any of Bob‘s coworkers might have access to the message Susan encrypted, but without Bob‘s Private Key, the data is worthless.

"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!" HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A

HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A "Hey Bob, how about lunch at Taco Bell. I hear they have free refills!"

With his private key and the right software, Bob can put digital signatures on documents and other data. A digital signature is a "stamp" Bob places on the data which is unique to Bob, and is very difficult to forge. In addition, the signature assures that any changes made to the data that has been signed can not go undetected.

To sign a document, Bob‘s software will crunch down the data into just a few lines by a process called "hashing". These few lines are called a message digest. (It is not possible to change a message digest back into the original data from which it was created.)

Bob‘s software then encrypts the message digest with his private key. The result is the digital signature.

Finally, Bob‘s software appends the digital signature to document. All of the data that was hashed has been signed.

Bob now passes the document on to Pat.

First, Pat‘s software decrypts the signature (using Bob‘s public key) changing it back into a message digest. If this worked, then it proves that Bob signed the document, because only Bob has his private key. Pat‘s software then hashes the document data into a message digest. If the message digest is the same as the message digest created when the signature was decrypted, then Pat knows that the signed data has not been changed.

Plot complication...

Doug (our disgruntled employee) wishes to deceive Pat. Doug makes sure that Pat receives a signed message and a public key that appears to belong to Bob. Unbeknownst to Pat, Doug deceitfully sent a key pair he created using Bob‘s name. Short of receiving Bob‘s public key from him in person, how can Pat be sure that Bob‘s public key is authentic?

It just so happens that Susan works at the company‘s certificate authority center. Susan can create a digital certificate for Bob simply by signing Bob‘s public key as well as some information about Bob.

Bob Info: 
    Name 
    Department 
    Cubical Number

Certificate Info: 
    Expiration Date 
    Serial Number

Bob‘s Public Key: 
   


Now Bob‘s co-workers can check Bob‘s trusted certificate to make sure that his public key truly belongs to him. In fact, no one at Bob‘s company accepts a signature for which there does not exist a certificate generated by Susan. This gives Susan the power to revoke signatures if private keys are compromised, or no longer needed. There are even more widely accepted certificate authorities that certify Susan.

Let‘s say that Bob sends a signed document to Pat. To verify the signature on the document, Pat‘s software first uses Susan‘s (the certificate authority‘s) public key to check the signature on Bob‘s certificate. Successful de-encryption of the certificate proves that Susan created it. After the certificate is de-encrypted, Pat‘s software can check if Bob is in good standing with the certificate authority and that all of the certificate information concerning Bob‘s identity has not been altered.

Pat‘s software then takes Bob‘s public key from the certificate and uses it to check Bob‘s signature. If Bob‘s public key de-encrypts the signature successfully, then Pat is assured that the signature was created using Bob‘s private key, for Susan has certified the matching public key. And of course, if the signature is valid, then we know that Doug didn‘t try to change the signed content.

Although these steps may sound complicated, they are all handled behind the scenes by Pat‘s user-friendly software. To verify a signature, Pat need only click on it.

时间: 2024-07-30 02:32:49

图文并茂解释数字证书(转)的相关文章

一句话解释数字签名。一句话解释数字证书

一句话解释数字签名 数字签名是:远程主机端将需要返回给客户端的原始信息,用Hash函数,生成摘要(digest)信息,然后用主机端的私钥对摘要(digest)信息加密,加密后的信息就成了数字签名.整个过程经历了三种信息1.原始信息.2.用Hash函数将原始信息转换成的摘要(digest)信息.3.用主机私钥加密摘要(digest)信息后,生成数字签名. 经过这三种转换后,主机将数字签名追加到原始信息后面,一起返回给客户端. 一句话解释数字证书数字证书:"证书中心"(certificat

关于数字证书理解的简单整理以及12306网站证书简单分析

首先简单理解一下什么是数字证书.这里是一篇英文文档,描述的很形象.形象的描述了什么是公钥,什么是私钥,如果确保数字证书的可靠性等. 下面,我们看一个应用"数字证书"的实例:https协议.这个协议主要用于网页加密. 一般我们电脑的浏览器中都有一些受信任的证书颁发机构列表, 里边存储的都是一些机构的信息.这些机构都是权威的.当然可以通过安装软件的方式,来增加证书颁发机构,比如中国银行的根证书软件,阿里巴巴的根证书软件.默认我们认为这些软件都是从官网下载的,是绝对的没被篡改的,可靠的.简单

数字证书原理【转】

转自http://www.cnblogs.com/JeffreySun/archive/2010/06/24/1627247.html 文中首先解释了加密解密的一些基础知识和概念,然后通过一个加密通信过程的例子说明了加密算法的作用,以及数字证书的出现所起的作用.接着对数字证书做一个详细的解释,并讨论一下windows中数字证书的管理,最后演示使用makecert生成数字证书.如果发现文中有错误的地方,或者有什么地方说得不够清楚,欢迎指出! 1.基础知识 这部分内容主要解释一些概念和术语,最好是先

【转】什么是非对称加密、数字签名、数字证书

被苹果的开发者账号.证书.p12文件.描述信息折磨的够呛……为了搞懂啥是代码签名,又看了一遍非对称加密,总是忘……看到啦下面的一篇通俗易懂的文章,mark一下在此. 转自:http://justjavac.iteye.com/blog/1144151 今天,我读到一篇好文章. 它用图片通俗易懂地解释了,"数字签名"(digital signature)和"数字证书"(digital certificate)到底是什么. 我对这些问题的理解,一直是模模糊糊的,很多细节

数字证书原理

文中首先解释了加密解密的一些基础知识和概念,然后通过一个加密通信过程的例子说明了加密算法的作用,以及数字证书的出现所起的作用.接着对数字证书做一个详细的解释,并讨论一下windows中数字证书的管理,最后演示使用makecert生成数字证书.如果发现文中有错误的地方,或者有什么地方说得不够清楚,欢迎指出! 1.基础知识 这部分内容主要解释一些概念和术语,最好是先理解这部分内容. 1.1.公钥密码体制(public-key cryptography) 公钥密码体制分为三个部分,公钥.私钥.加密解密

数字证书验证

2.6 完整过程: step1: “客户”向服务端发送一个通信请求 “客户”->“服务器”:你好 step2: “服务器”向客户发送自己的数字证书.证书中有一个公钥用来加密信息,私钥由“服务器”持有 “服务器”->“客户”:你好,我是服务器,这里是我的数字证书 step3: “客户”收到“服务器”的证书后,它会去验证这个数字证书到底是不是“服务器”的,数字证书有没有什么问题,数字证书如果检查没有问题,就说明数字证书中的公钥确实是“服务器”的.检查数字证书后,“客户”会发送一个随机的字符串给“服

转: 数字证书原理 https 完整过程解析

点评: 讲的非常的详细与全面,值得一看. 转: http://www.cnblogs.com/JeffreySun/archive/2010/06/24/1627247.html 文中首先解释了加密解密的一些基础知识和概念,然后通过一个加密通信过程的例子说明了加密算法的作用,以及数字证书的出现所起的作用.接着对数字证书做一个详细的解释,并讨论一下windows中数字证书的管理,最后演示使用makecert生成数字证书.如果发现文中有错误的地方,或者有什么地方说得不够清楚,欢迎指出! 1.基础知识

浅谈https\ssl\数字证书[转载]

在互联网安全通信方式上,目前用的最多的就是https配合ssl和数字证书来保证传输和认证安全了.本文追本溯源围绕这个模式谈一谈. 名词解释 首先解释一下上面的几个名词: https:在http(超文本传输协议)基础上提出的一种安全的http协议,因此可以称为安全的超文本传输协议.http协议直接放置在TCP协议之上,而https提出在http和TCP中间加上一层加密层.从发送端看,这一层负责把http的内容加密后送到下层的TCP,从接收方看,这一层负责将TCP送来的数据解密还原成http的内容.

数字证书原理——转(知识分享)

此文描述得非常清晰.顾不得不转载过来细细品读..也分享下 文中首先解释了加密解密的一些基础知识和概念,然后通过一个加密通信过程的例子说明了加密算法的作用,以及数字证书的出现所起的作用.接着对数字证书做一个详细的解释,并讨论一下windows中数字证书的管理,最后演示使用makecert生成数字证书.如果发现文中有错误的地方,或者有什么地方说得不够清楚,欢迎指出! 1.基础知识 这部分内容主要解释一些概念和术语,最好是先理解这部分内容. 1.1.公钥密码体制(public-key cryptogr