What is a Digital Signature?


Bob

(Bob‘s public key)


(Bob‘s private key)

Bob has been given two keys. One of Bob‘s keys is called a Public Key, the other is called a Private Key.

Bob‘s Co-workers:

Anyone can get Bob‘s Public Key, but Bob keeps his Private Key to himself
Pat Doug Susan

Bob‘s Public key is available to anyone who needs it, but he keeps his Private Key to himself. Keys are used to encrypt information. Encrypting information means "scrambling it up", so that only a person with the appropriate key can make it readable again. Either one of Bob‘s two keys can encrypt data, and the other key can decrypt that data.

Susan (shown below) can encrypt a message using Bob‘s Public Key. Bob uses his Private Key to decrypt the message. Any of Bob‘s coworkers might have access to the message Susan encrypted, but without Bob‘s Private Key, the data is worthless.

"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!" HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A
HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A "Hey Bob, how about lunch at Taco Bell. I hear they have free refills!"

With his private key and the right software, Bob can put digital signatures on documents and other data. A digital signature is a "stamp" Bob places on the data which is unique to Bob, and is very difficult to forge. In addition, the signature assures that any changes made to the data that has been signed can not go undetected.

To sign a document, Bob‘s software will crunch down the data into just a few lines by a process called "hashing". These few lines are called a message digest. (It is not possible to change a message digest back into the original data from which it was created.)

Bob‘s software then encrypts the message digest with his private key. The result is the digital signature.

Finally, Bob‘s software appends the digital signature to document. All of the data that was hashed has been signed.

Bob now passes the document on to Pat.

First, Pat‘s software decrypts the signature (using Bob‘s public key) changing it back into a message digest. If this worked, then it proves that Bob signed the document, because only Bob has his private key. Pat‘s software then hashes the document data into a message digest. If the message digest is the same as the message digest created when the signature was decrypted, then Pat knows that the signed data has not been changed.

Plot complication...

Doug (our disgruntled employee) wishes to deceive Pat. Doug makes sure that Pat receives a signed message and a public key that appears to belong to Bob. Unbeknownst to Pat, Doug deceitfully sent a key pair he created using Bob‘s name. Short of receiving Bob‘s public key from him in person, how can Pat be sure that Bob‘s public key is authentic?

It just so happens that Susan works at the company‘s certificate authority center. Susan can create a digital certificate for Bob simply by signing Bob‘s public key as well as some information about Bob.

Bob Info: 
    Name 
    Department 
    Cubical Number

Certificate Info: 
    Expiration Date 
    Serial Number

Bob‘s Public Key: 
    


Now Bob‘s co-workers can check Bob‘s trusted certificate to make sure that his public key truly belongs to him. In fact, no one at Bob‘s company accepts a signature for which there does not exist a certificate generated by Susan. This gives Susan the power to revoke signatures if private keys are compromised, or no longer needed. There are even more widely accepted certificate authorities that certify Susan.

Let‘s say that Bob sends a signed document to Pat. To verify the signature on the document, Pat‘s software first uses Susan‘s (the certificate authority‘s) public key to check the signature on Bob‘s certificate. Successful de-encryption of the certificate proves that Susan created it. After the certificate is de-encrypted, Pat‘s software can check if Bob is in good standing with the certificate authority and that all of the certificate information concerning Bob‘s identity has not been altered.

Pat‘s software then takes Bob‘s public key from the certificate and uses it to check Bob‘s signature. If Bob‘s public key de-encrypts the signature successfully, then Pat is assured that the signature was created using Bob‘s private key, for Susan has certified the matching public key. And of course, if the signature is valid, then we know that Doug didn‘t try to change the signed content.

Although these steps may sound complicated, they are all handled behind the scenes by Pat‘s user-friendly software. To verify a signature, Pat need only click on it.

What is a Digital Signature?,布布扣,bubuko.com

时间: 2024-10-14 22:42:26

What is a Digital Signature?的相关文章

数字证书(Digital Signature)

平时上网时,经常会遇到诸如"https访问错误"."证书错误"等问题, 有没有想过这其中到底涉及什么概念,以下几篇文章,作者觉得写得比较好 What is a Digital Signature? 数字签名是什么? 图解HTTPS 讲的非常清楚,仔细看看就应该明白了.

数据签名标准算法-DSA (Digital signature Algorithm DSA)

支持的算法有 : SHA1withDSA  224 , 256 , 384, 512 public abstract class DSACoderSignature { private static final String PRIVATE_KEY = "RSAPrivate_Key"; private static final String PUBLIC_KEY = "RSAPublic_key"; private static final int KEY_SIZ

密码学初级教程(五)数字签名 Digital Signature

密码学家工具箱中的6个重要的工具: 对称密码 公钥密码 单向散列函数 消息认证码 数字签名 伪随机数生成器 提问: 有了消息认证码为什么还要有数字签名? 因为消息认证码无法防止否认.消息认证码可以识别消息是否被篡改或者发送者身份是否被伪装.(消息认证码保证完整性.可以进行认证) 为什么消息认证码无法防止否认,数字签名就能够否认呢? 消息认证码中,能够计算出MAC值的密钥(共享密钥)是由发送者和接受者双方共同持有的,因此发送者和接受者中的任何一方都能够计算MAC值,发送者也就可以声称“这个MAC值

emSecure Use Digital Signatures to protect your products

emSecure Use Digital Signatures to protect your products emSecure is an RSA based software solution to authenticate digital assets. It can be used to secure products at no per unit cost against hacking and cloning. Features RSA - Dual keys, private a

安全与加密(openssl)

一.安全及威胁 NIST(National Institute of Standard and Technology,美国国家标准与技术研究院)制定了安全的数据应该具备的安全属性: 1)保密性 即认为安全的数据是具有隐私性的 2)完整性:数据不可被篡改,包括: 数据完整性: 系统完整性. 3)可用性 加密过的数据可以被还原且继续被使用 威胁我们数据安全的主要有以下攻击方式:STRIDE 1)Spoofing(假冒),arp欺骗等 2)Tampering(篡改) 3)Repudiation(否认)

DSA签名算法笔记

注意:只是个人理解,可能有不正确的地方 DSA(Digital Signature Algorithm)签名算法是由美国国家标准与技术研究院(NIST, National Institute of Standards and Technology)提出的一个关于数字签名的美国联邦信息处理标准(FIPS, Federal Information Processing Standard).该标准在1991年8月提出,1993以FIPS 186被采用,作为数字签名(DSS, Digital Signa

『ENGLISH』

以A字母开头的词汇 英文 中文 abstract module 抽象模组 access 访问.存取 access control 存取控制 access control information 存取控制资讯 access mechanism 存取机制 access rights 存取权限 accessibility 无障碍性 accessibility information 无障碍网页资讯 accessibility problem 无障碍网页问题 accessible 无障碍的 access

Hash function

Hash function From Wikipedia, the free encyclopedia A hash function that maps names to integers from 0 to 15. There is a collision between keys "John Smith" and "Sandra Dee". A hash function is any function that maps data of arbitrary

加密解密

在现代密码学中,加密方法大致可分为对称密钥加密(对称加密)和公开密钥加密(非对称加密). 一. 对称加密(Symmetric-key algorithm,或对等加密: Reciprocal cipher ) 对称加密,即加密和解密使用同一个密钥,或者知道一方密钥能够轻易计算出另一方密钥.其解密(decryption)算法等同于加密算法,也就是说,要还原对等加密的密文,套用加密同样的算法即可得到明文. 对称加密的速度比非对称加密快很多,在很多场合都需要对称加密. 对称加密又可分为分组密码(分组加密