5 views

Uploaded by ajhired

fghgfhf

- Digital Signature
- Digital Signature Project Report
- Digital Signature & Digital Certificate
- DesignImplementationAndDeploymentOfiKPSecureElectronicPaymentSystem_Mihir.pdf
- neco.pdf
- Digital Signature Act 1997
- seminar-151029231027-lva1-app6892
- Identity Based Cryptosystem
- RSA Algorithm.ppt
- Multi-Tenant Data Architecture
- Lecture 1 - Cryptography
- Porting Java Public Key PDF
- FAQ IT Act 2000 and Amendments 2008
- DesignImplementationAndDeploymentOfiKPSecureElectronicPaymentSystem_Mihir.pdf
- Sys-Log Database Manipulation Security Protocol by Message splitting
- B.Tech-4-1Syllabus-1.rtf.pdf
- An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
- Faculty of Mathematics and Computer Science Institute of Computer Science
- Merged Document
- Cyber

You are on page 1of 3

Bob

Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key. Bob's Co-workers:

Anyone can get Bob's Public Key, but Bob keeps his Private Key to himself

Pat

Doug

Susan

Bob's Public key is available to anyone who needs it, but he keeps his Private Key to himself . Keys are used to encrypt inf ormation. Encrypting inf ormation means "scrambling it up", so that only a person with the appropriate key can make it readable again. Either one of Bob's two keys can encrypt data, and the other key can decrypt that data. Susan (shown below) can encrypt a message using Bob's Public Key. Bob uses his Private Key to decrypt the message. Any of Bob's coworkers might have access to the message Susan encrypted, but without Bob's Private Key, the data is worthless.

"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!" HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A "Hey Bob, how about lunch at Taco Bell. I hear they have free refills!"

With his private key and the right sof tware, Bob can put digital signatures on documents and other data. A digital signature is a "stamp" Bob places on the data which is unique to Bob, and is very dif f icult to f orge. In addition, the signature assures that any changes made to the data that has been signed can not go undetected.

To sign a document, Bob's sof tware will crunch down the data into just a f ew lines by a process called "hashing". These f ew lines are called a message digest. (It is not possible to change a message digest back into the original data f rom which it was created.)

Bob's sof tware then encrypts the message digest with his private key. The result is the digital signature.

Finally, Bob's sof tware appends the digital signature to document. All of the data that was hashed has been signed.

Bob now passes the document on to Pat. First, Pat's sof tware decrypts the signature (using Bob's public key) changing it back into a message digest. If this worked, then it proves that Bob signed the document, because only Bob has his private key. Pat's sof tware then hashes the document data into a message digest. If the message digest is the same as the message digest created when the signature was decrypted, then Pat knows that the signed data has not been changed.

Plot complication...

Doug (our disgruntled employee) wishes to deceive Pat. Doug makes sure that Pat receives a signed message and a public key that appears to belong to Bob. Unbeknownst to Pat, Doug deceitf ully sent a key pair he created using Bob's name. Short of receiving Bob's public key f rom him in person, how can Pat be sure that Bob's public key is authentic? It just so happens that Susan works at the company's certif icate authority center. Susan can create a digital certif icate f or Bob simply by signing Bob's public key as well as some inf ormation about Bob. Bob Inf o:

Name Department Cubical Number

Expiration Date Serial Number

Now Bob's co-workers can check Bob's trusted certif icate to make sure that his public key truly belongs to him. In f act, no one at Bob's company accepts a signature f or which there does not exist a certif icate generated by Susan. This gives Susan the power to revoke signatures if private keys are compromised, or no longer needed. There are even more widely accepted certif icate authorities that certif y Susan. Let's say that Bob sends a signed document to Pat. To verif y the signature on the document, Pat's sof tware f irst uses Susan's (the certif icate authority's) public key to check the signature on Bob's certif icate. Successf ul de-encryption of the certif icate proves that Susan created it. Af ter the certif icate is de-encrypted, Pat's sof tware can check if Bob is in good standing with the certif icate authority and that all of the certif icate inf ormation concerning Bob's identity has not been altered. Pat's sof tware then takes Bob's public key f rom the certif icate and uses it to check Bob's signature. If Bob's public key de-encrypts the signature successf ully, then Pat is assured that the signature was created using Bob's private key, f or Susan has certif ied the matching public key. And of course, if the signature is valid, then we know that Doug didn't try to change the signed content.

Although these steps may sound complicated, they are all handled behind the scenes by Pat's user-f riendly sof tware. To verif y a signature, Pat need only click on it.

(c) 1996, David Youd Permission to change or distribute is at the discretion of the author Warning: You may be missing a few lines of text if you print this document. This seems to occur on pages following pages that have blank space near the bottom due to moving tables with large graphics in them to the next page so that the images are not split across pages. If this happens to you, simply print out document in sections. (Ex: I have the problem on page 4, so I print pages 1- 3, then pages 4- 5.)

- Digital SignatureUploaded byVipin Kumar
- Digital Signature Project ReportUploaded bySurabhi Agrawal
- Digital Signature & Digital CertificateUploaded byNirmalya Roy
- DesignImplementationAndDeploymentOfiKPSecureElectronicPaymentSystem_Mihir.pdfUploaded byPuneet Bakshi
- neco.pdfUploaded bysdffd
- Digital Signature Act 1997Uploaded bySabirin Anuar
- seminar-151029231027-lva1-app6892Uploaded bygambov
- Identity Based CryptosystemUploaded byJagjit Kaur
- RSA Algorithm.pptUploaded byEswin Angel
- Multi-Tenant Data ArchitectureUploaded byFirdaus
- Lecture 1 - CryptographyUploaded byAya Puertollano
- Porting Java Public Key PDFUploaded bysocknow
- FAQ IT Act 2000 and Amendments 2008Uploaded byMelroy
- DesignImplementationAndDeploymentOfiKPSecureElectronicPaymentSystem_Mihir.pdfUploaded byPuneet Bakshi
- Sys-Log Database Manipulation Security Protocol by Message splittingUploaded byIJEC_Editor
- B.Tech-4-1Syllabus-1.rtf.pdfUploaded byGm Lakshman
- An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve CryptographyUploaded byIDES
- Faculty of Mathematics and Computer Science Institute of Computer ScienceUploaded byh47rushabh
- Merged DocumentUploaded byOvidiu Craiu
- CyberUploaded byArnab Roy Chowdhury
- Public Key CryptographyUploaded byneekburm
- 1997 Apple Backdoor 3Uploaded byindyradio
- Black Hats, White Hats, And Hard HatsUploaded bySteve Asher
- Advanced Client Repudiation Diverge Auditor in Public CloudUploaded byInternational Organization of Scientific Research (IOSR)
- wireguard.pdfUploaded bygsbabil
- 22Uploaded byapi-3814854
- Chapter 29Uploaded bySiraj Ud-Doulla
- rfc3157Uploaded byNickyNET
- Lecture 13Uploaded bySushant Sharma
- 27-04-06Uploaded byHifza Abid

- Java AbstractionUploaded byZsolt Bokor
- 076 Installing SoftwareUploaded byajhired
- 054 Getting Help.pdfUploaded byajhired
- Multithreading and Concurrency QuestionsUploaded byZsolt Bokor
- AdmissionNotice Counselling 5July14Uploaded byajhired
- 031 Switching Users and Running Commands as OthersUploaded byFakee Zimbo
- Durga Software Solutions Spring MaterialUploaded bypvkchakravarthi
- 1 Background and IntroductionUploaded byAmmar khan
- Sec 2_Lec 32_Viewing-Files-And-The-Nano-Editor.pdfUploaded bydenyuuu
- 071 Switching Users and SudoUploaded byajhired
- Worksheet 4Uploaded byajhired
- 056 Listing FilesUploaded byajhired
- 073 Installing SoftwareUploaded bynykaz
- Advanced JavaUploaded byGustavo Luis Condoy Pogo
- Sec 2 Lec 34 1 Editing-Files-With-ViUploaded bydenyuuu
- Indian HistoryUploaded byPraveenkumar Aepuri
- karaf_commands.txtUploaded byajhired
- New Text DocumergegdfgdfgentUploaded byajhired
- CSIR_Advt_CO032013_200613Uploaded bybookhunter01
- SignatureryhtrhtrdhUploaded byajhired
- apachechemistrywebinar-110713114739-phpapp01Uploaded byajhired
- Web Scripts Student GuideUploaded byajhired
- List_Portlet.txtUploaded byajhired
- karaf_commands2.txtUploaded byajhired
- Alfrescoinanhour Dmwcmshare 090316232143 Phpapp01Uploaded byajhired
- disk_space.txtUploaded byajhired
- AntggUploaded byajhired
- Karaf CommandsUploaded byajhired
- OOPS ConceptUploaded byajhired

- Matrix Methods in Data Mining and Pattern Recognition_Lars Elden (SIAM 2007 234s).pdfUploaded bydougmart8
- Matlab Robust Control ToolboxUploaded bydunerto
- 4. Brute ForceUploaded byMohamed Said Daw
- Color and Texture Descriptors PDFUploaded byMike
- Ee453 Hw2 SolUploaded byÜlber Onur Akın
- HW TemplateUploaded byDamien Raid Salah
- Lecture 7 - Packet_Classification_1Uploaded byDr-Firoz Shaikh
- bhgyuiUploaded byRup Joshi
- DC-OPF_USMUploaded byIsrael Rom Olguín Guzman
- 3.Highest Product of 3 (Practice Interview Question) | Interview CakeUploaded byAnurag GV
- Principal componentUploaded bygvaf
- EEE-228-Lec2.pdf.2012_02_21_Ogretim_2Uploaded byselamicelik65
- unit 3 polynomials test version 1 2014Uploaded byapi-274909201
- Robust Iris Recognition Using Basis Pursuit(3)Uploaded byGabriel Thomas
- Assignment Or2Uploaded byMadhu M Nair
- A KALMAN FILTERING TUTORIAL FOR UNDERGRADUATE STUDENTSUploaded byijcses
- Meshfree MethodsUploaded byYokesh Samannan
- Block Reduction DiagramUploaded bymubashir
- Data Structures TREEUploaded bymajutakgentar
- Network Security NotesUploaded byVinodh Jemini
- Fourier Series Beku 2431 Laboratory ReportUploaded byAzrul Nizar
- What Predicts Stock Returns? – The Role of Expected versus Unexpected PredictorsUploaded bymirando93
- Trend-or-No-Trend-MIT-Certificate-Error.pdfUploaded bytranthichaudinh
- Appendix AUploaded byAdnan Toor
- On Traffic-Aware Partition and Aggregation in Map Reduce for Big Data ApplicationsUploaded bydbpublications
- Freq FilterUploaded byAnitha Joseph
- Problem Definitions and Evaluation Criteria for the CEC 2005 Special Session on Real-parameter OptimizationUploaded bymaroone5
- Temporal Data Clustering using weighted aggregate functionUploaded byijsret
- Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application.pdfUploaded byRisky Rionaldy
- Asymptotic Notations 1Uploaded byRajendranbehappy