数据加密:什么是数据签名(What is a Digital Signature?)
来源:互联网 发布:如何评价黄海冰 知乎 编辑:程序博客网 时间:2024/06/01 16:29
From article:http://www.youdzone.com/signature.html
有个家伙已经将此文章翻译,如果要看可以点here
Bob
(Bob's public key)
(Bob's private key)
Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key.
Anyone can get Bob's Public Key, but Bob keeps his Private Key to himselfPatDougSusan
Bob's Public key is available to anyone who needs it, but he keeps his Private Keyto himself. Keys are used to encrypt information. Encrypting information means"scrambling it up", so that only a person with the appropriate key can make itreadable again. Either one of Bob's two keys can encrypt data, and the other key can decrypt that data.
Susan (shown below) can encrypt a message using Bob's Public Key. Bob uses hisPrivate Key to decrypt the message. Any of Bob's coworkers might have accessto the message Susan encrypted, but without Bob's Private Key, the data isworthless.
With his private key and the right software, Bob can put digital signatures ondocuments and other data. A digital signature is a "stamp" Bob places on thedata which is unique to Bob, and is very difficult to forge. In addition, thesignature assures that any changes made to the data that has been signed cannot go undetected.
Bob's software then encrypts the message digest with his private key. The result is the digital signature.
Finally, Bob's software appends the digital signature to document. All of thedata that was hashed has been signed.
Bob now passes the document on to Pat.
First, Pat's software decrypts the signature (using Bob's public key) changing it backinto a message digest. If this worked, then it proves that Bob signed thedocument, because only Bob has his private key. Pat's software then hashesthe document data into a message digest. If the message digest is the sameas the message digest created when the signature was decrypted, then Patknows that the signed data has not been changed.It just so happens that Susan works at the company's certificateauthority center. Susan can create a digital certificate for Bob simplyby signing Bob's public key as well as some information about Bob.
Name
Department
Cubical Number
Certificate Info:
Expiration Date
Serial Number
Bob's Public Key:
Now Bob's co-workers can check Bob's trusted certificate to make surethat his public key truly belongs to him. In fact, no one at Bob'scompany accepts a signature for which there does not exist a certificategenerated by Susan. This gives Susan the power to revoke signatures ifprivate keys are compromised, or no longer needed. There are even morewidely accepted certificate authorities that certify Susan.
Let's say that Bob sends a signed document to Pat. To verify the signatureon the document, Pat's software first uses Susan's (the certificateauthority's) public key to check the signature on Bob's certificate.Successful de-encryption of the certificate proves that Susan created it.After the certificate is de-encrypted, Pat's software can check ifBob is in good standingwith the certificate authority and that all of the certificate informationconcerning Bob's identity has not been altered.
Pat's software then takes Bob's public key from the certificate and uses itto check Bob's signature. If Bob's public key de-encrypts the signaturesuccessfully, then Pat is assured that the signature was created using Bob'sprivate key, for Susan has certified the matching public key. And of course,if the signature is valid, then we know that Doug didn't try to change thesigned content.
(c) 1996, David Youd
Permission to change or distribute is at the discretion of the author
Warning: You may be missing a few lines of text if you print this document.This seems to occur on pages following pages that have blank space nearthe bottom due to moving tables with large graphics in them to the nextpage so that the images are not split across pages. If this happensto you, simply print out document in sections. (Ex: I have the problem onpage 4, so I print pages 1-3, then pages 4-5.)
- 数据加密:什么是数据签名(What is a Digital Signature?)
- What is a Digital Signature?
- What is a Digital Signature?
- What is a Digital Signature?
- What is a Digital Signature? 数字签名
- What is a Digital Signature? (数字签名是什么?)
- 【网络安全】What is a Digital Signature?
- hat is a Digital Signature
- JAVA中 什么是方法签名?what is method signature in java
- 什么是数字图书馆——What is Digital Library?
- JAVA加密解密之DSA(Digital Signature Algorithm)算法
- What is a First Chance Exception(什么是第一轮异常)
- 数字证书(Digital Signature)
- 什么是证券(What is a security)
- What is a DesignPattern? 什么是设计模式
- 什么是透明数据加密(TDE)?
- hdu 1084 What Is Your Grade?(标记数据)
- Digital Signature
- 开始刷leetcode day13:Jump Game
- struts2+json+ajax 二级联动和json数据的页面展示
- zoj1203_Swordfish(最小生成树)
- 让ubuntu像windows那样显示网速,内存使用率
- hadoop
- 数据加密:什么是数据签名(What is a Digital Signature?)
- Prototype chain in JavaScript
- 海南分校第一期1班:张耀如奖学金文章更新连载1第一篇:
- Maven - Overview
- xml简单学习教程
- C/C++面试题大汇总1【转】
- Swing 自定义布局管理器
- POJ3273 Monthly Expense(二分答案)
- Android APK反编译详解(附图)