Basic HTML version of Foils prepared May 30 99

Foil 15 Use of Digital Signatures with public key Cryptography

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


1 Here B starts with a document that it is required to prove only could come from B
2 This could be a piece of software that we wish to know comes from a reputable source
3 We combine software with a "certificate" (a statement that B is Bob) and either encrypt this with dB or more normally encrypt a message digest (or hash that depends on both message and signature) with dB
4 This use of a message digest is done for performance as it is time consuming to use public key encryption on full message
5 Note this signature cannot be forged either by A or any other person pretending to be B.
  • In secret key version A shares B's secret key and can forge messages that purport to be from B

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999