Digital Signature

Published on December 2016 | Categories: Documents | Downloads: 56 | Comments: 0 | Views: 453
of x
Download PDF   Embed   Report

Comments

Content

Digital Signature
‡A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document ‡A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit ‡Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery and tampering. ‡Digital signatures employ a type of asymmetric cryptography.

Public Key Encryption

Creating Digital Signature
‡ Digital Signature are created using the keys with the appropriate software. ‡ The software transforms the data into few lines called hashing. ‡ A hash function is defined as the process that can take an arbitary length message into a fixed length value from that message. ‡ It is easy to find the hash for a message ‡ It is hard to find the message that produces the same hash.

Contd

Message Tampering
‡ If a user gets the message then it is decrypted by public key which authenticates that message came from the sender ‡ Then receiver hashes the document data into message digest is same data is authenticated.

Digital Certificate
‡ If somebody sends a wrong pair of keys to the sender than the message is going to be forged ‡ To avoid this we require CA(Certificate Authority). Who signs the public key of any person. ‡ This is known as trusted certificate

Uses
‡ Message Authenication:Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user ‡ Integrity:the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. ‡ Non-repudiation, or more specifically non-repudiation of origin, is an important aspect of digital signatures. By this property an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close