You are on page 1of 5

2.

Public Key Encryption Using Digital

Signatures and Hash Digests Hash function:


Mathematical algorithm that produces fixed-length number called message or hash digest A HAS FUNCTION CEN BE SIMPLE, AND COUNT THE NUMBER OF DIGITAL 1S IN A MESSAGE, OR It can be more complex, and produce a 128 bit number that reflects the number of 0s and 1s , the number 00s , 11s, and so on. Example: MD4, MD5, SHA-1, SHA-2 Hash digest of message sent to recipient along with message to verify integrity (Hash digest and message) encrypted with recipients public key Entire cipher text then encrypted with Sender private keycreating digital signature (e - signature)for authenticity, nonrepudiation

Slide 5-1

Copyright 2010 Pearson Education, Inc.

Public Key Encryption Using Digital Signatures and Hash Digests

A digital signature or signed cipher text that can be sent over the Internet. A digital signature is a close parallel to a handwritten signature. Like a handwritten signature, a digital signature is unique. When used with a hash function, the digital signature is even more unique than a handwritten signature. And changes for every document.

Copyright 2010 Pearson Education, Inc.

MD5 Overview (Just concept)

Copyright 2010 Pearson Education, Inc.

Public Key Cryptography with Digital Signatures

HASH + MESSAGE

HASH + MESSAGE

Figure 5.9, Page 291


Copyright 2010 Pearson Education, Inc. Slide 5-4

Public Key Encryption Using Digital Signatures and Hash Digests

The receiver of this signed cipher( message + message digest) first uses the senders public key to authenticate the message. Once Authenticate, the recipient uses his or her private key to obtain the hash result (message digest) and original message. As a final step, the recipient applies the same hash function to the original text (original message) and compares the result with the result sent by the sender. If the results are same (Send message digest = receiver message digest) the receiver now knows the message has not been changed during transmission The message has integrity.

Copyright 2010 Pearson Education, Inc.

You might also like