Basic HTML version of Foils prepared April 7 1998

Foil 39 Use of Digital Signatures with public key Cryptography

From Basic Principles of Java and Internet Security CPS616 Web Technologies -- Spring 98. by Geoffrey C. Fox


1 Here B starts with a document that it is required to prove only could come from B
2 This could be a piece of software that we wish to know comes from a reputable source
3 We combine software with a "certificate" (a statement that B is Bob) and either encrypt this with dB or more normally encrypt a message digest (that depends on both message and signature) with dB
4 This use of a message digest is done for performance as it is time consuming to use public key encryption on full message
5 Note this signature cannot be forged either by A or any other person pretending to be B.
  • In secret key version A shares B's secret key and can forge messages that purport to be from B

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Nov 29 1998