LT   EN   RU  
Wednesday 27 January 2021 - Independent and informative portal
Register   Login
News subscribe
Subscribe   Unsubscribe
Visits since 2002 09 12 - 67288023
Pages in 40735
  Computers > Computer technologies > Security > Cryptography
Lankomumo reitingas Print version Print version
Digital Signatures

Some public-key algorithms can be used to generate digital signatures. A digital signature is a small amount of data that was created using some private key, and there is a public key that can be used to verify that the signature was really generated using the corresponding private key. The algorithm used to generate the signature must be such that without knowing the private key it is not possible to create a signature that would verify as valid.

Digital signatures are used to verify that a message really comes from the claimed sender (assuming only the sender knows the private key corresponding to the public key). This is called (data origin) authentication. They can also be used to timestamp documents: a trusted party signs the document and its timestamp with his/her private key, thus testifying that the document existed at the stated time.

Digital signatures can also be used to certify that a public key belongs to a particular entity. This is done by signing the combination of the public key and the information about its owner by a trusted key. The resulting data structure is often called a public-key certificate (or simply, a certificate). Certificates can be thought of as analogous to passports that guarantee the identity of their bearers.

The trusted party who issues certificates to the identified entities is called a certification authority (CA). Certification authorities can be thought of as being analogous to governments issuing passports for their citizens.

A certification authority can be operated by an external certification service provider, or even by a government, or the CA can belong to the same organization as the entities. CAs can also issue certificates to other (sub-)CAs. This leads to a tree-like certification hierarchy. The highest trusted CA in the tree is called a root CA. The hierarchy of trust formed by end entities, sub-CAs, and root CA is called a public-key infrastructure (PKI).

A public-key infrastructure does not necessarily require an universally accepted hierarchy or roots, and each party may have different trust points. This is the web of trust concept used, for example, in PGP.

A digital signature of an arbitrary document is typically created by computing a message digest from the document, and concatenating it with information about the signer, a timestamp, etc. This can be done by applying a cryptographic hash function on the data. The resulting string is then encrypted using the private key of the signer using a suitable algorithm. The resulting encrypted block of bits is the signature. It is often distributed together with information about the public key that was used to sign it.

To verify a signature, the recipient first determines whether it trusts that the key belongs to the person it is supposed to belong to (using a certificate or a priori knowledge), and then decrypts the signature using the public key of the person. If the signature decrypts properly and the information matches that of the message (proper message digest etc.), the signature is accepted as valid. In addition to authentication, this technique also provides data integrity, which means that unauthorized alteration of the data during transmission is detected.

Several methods for making and verifying digital signatures are freely available. The most widely known algorithm is RSA.

Lankomumo reitingas

Diskusijos - Discusions

Versija spausdinimui - Print version

Random tags:    Krishnaism (10)    Formula 1 (2)    Education (174)    Computer games (64)    Computers (355)    Vampire (6)    Agrobusiness (2)    Cryptography (10)    Films (10)    History (4)    Gymnastics (9)    Tourism (46)    Hackers (59)    Skydiving (10)    Astrology (10)    Medicine (5)    Music (10)    Yoga (4)    PHP (3)    Biology (66)    Countries (43)    Philately (8)    Sport gymnastics (9)    Sound systems (10)    Hobby (25)    Style (3)    Buddhism (10)    Fencing (2)    Cinema (20)    Internet (4)    Health (20)    Transport (54)    Horoscopes (4)    Hardware (43)    Architecture (2)    Narcotics no (13)    Martial arts (7)    Operating systems (19)    Geology (4)    Love (48)    Science (163)    Viruses (10)    Hunting (3)    V.Nabokov (54)    Energetics (2)    Laptops (10)    S.Valiulis (2)    Law (11)    Casino’s (10)    Mysticism 2 (3)
1. Cryptography
2. A Brief History of Cryptography - compiled by Shireen Hebert
3. Cryptography: History
4. Introduction to Cryptosystems
5. Cryptanalysis and Attacks on Cryptosystems
6. Strength of Cryptographic Algorithms
7. Cryptographic Random Number Generators
8. Cryptographic Hash Functions
9. Basic Cryptographic Algorithms
1. Cryptanalysis and Attacks on Cryptosystems
2. A Brief History of Cryptography - compiled by Shireen Hebert
3. Strength of Cryptographic Algorithms
4. Basic Cryptographic Algorithms
5. Cryptography: History
6. Introduction to Cryptosystems
7. Cryptography
8. Cryptographic Hash Functions
9. Cryptographic Random Number Generators