Digital Signatures
Appendix
J
Introduction to Public-Key Cryptography
803
Digital Signatures
Encryption and decryption address the problem of eavesdropping, one of the three
Internet security issues mentioned at the beginning of this document. But
encryption and decryption, by themselves, do not address the other two problems
mentioned in “Internet Security Issues” (beginning on page 797): tampering and
impersonation.
This section describes how public-key cryptography addresses the problem of
tampering. The sections that follow describe how it addresses the problem of
impersonation.
Tamper detection and related authentication techniques rely on a mathematical
function called a one-way hash (also called a message digest). A one-way hash is a
number of fixed length with the following characteristics:
•
The value of the hash is unique for the hashed data. Any change in the data,
even deleting or altering a single character, results in a different value.
•
The content of the hashed data cannot, for all practical purposes, be deduced
from the hash—which is why it is called “one-way.”
As mentioned in “Public-Key Encryption,” which begins on page 801, it’s possible
to use your private key for encryption and your public key for decryption.
Although this is not desirable when you are encrypting sensitive information, it is a
crucial part of digitally signing any data. Instead of encrypting the data itself, the
signing software creates a one-way hash of the data, then uses your private key to
encrypt the hash. The encrypted hash, along with other information, such as the
hashing algorithm, is known as a digital signature.
Figure J-3 shows a simplified view of the way a digital signature can be used to
validate the integrity of signed data.
Figure J-3
Using a Digital Signature to Validate Data Integrity
Содержание Certificate Management System 6.2
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 2 June 2003...
Страница 22: ...22 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 30: ...Documentation 30 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 70: ...Support for Open Standards 70 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 84: ...Uninstalling CMS 84 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 164: ...How a Registration Manager Works 164 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 322: ...Configuring the Server s Security Preferences 322 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 380: ...ACL Reference 380 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 564: ...Managing Policy Plug in Modules 564 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 744: ...1 3 Organization Security Policies 744 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 750: ...Object Identifiers 750 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 796: ...DNs in Certificate Management System 796 Netscape Certificate Management System Administrator s Guide June 2003...
Страница 828: ...Managing Certificates 828 Netscape Certificate Manager System Administrator s Guide June 2003...
Страница 844: ...The SSL Handshake 844 Netscape Certificate Manager System Administrator s Guide June 2003...
Страница 862: ...862 Netscape Certificate Management System Administrator s Guide June 2003...