Digital signatu-WPS Office
Digital signatu-WPS Office
Definition: A digital signature is a mathematical scheme used to validate the authenticity and integrity of
a digital message or document. It presents a way for the recipient of the message to verify that the
message was indeed created by using the sender and has now not been altered in transit.
Properties:
- Non-repudiation: The sender cannot deny sending the message once it has been signed with a digital
signature.
- Integrity: Any modifications made to the message after it has been signed will result in the digital
signature becoming invalid.
Requirements:
- This method entails the use of asymmetric cryptography, the place a pair of mathematically related
keys (public and private) are generated.
- The personal key is saved secret by using the signer, whilst the public key is widely distributed.
- The signer uses their non-public key to create a digital signature on the data or message.
- The recipient can verify the signature using the signer's public key.
- Popular algorithms used in PKC for digital signatures include RSA and DSA (Digital Signature Algorithm).
2. Hash Functions
- This strategy includes computing a fixed-size digest or hash price of the information the use of a
cryptographic hash function, such as SHA-256 or SHA-3.
- The hash value is then encrypted or signed using the signer's private key, developing the digital
signature.
- The recipient can verify the signature by means of decrypting it with the signer's public key,
recomputing the hash fee of the data, and comparing it with the decrypted hash value.
- MACs are used to grant information integrity and authentication using symmetric-key cryptography.
- A shared secret key is used by each the signer and the recipient.
- The signer computes a MAC price of the data the usage of a secure algorithm like HMAC (Hash-based
Message Authentication Code) with the shared secret key.
- The recipient can verify the MAC price using the same shared secret key and the obtained data.
- MACs are generally used in scenarios where the parties concerned already share a secret key, such as
in secure verbal exchange protocols or file integrity checks.
4. Digital Certificates
- Digital certificates are digital files that bind a public key to an entity's identity (individual, organization,
or device).
- Certificates are issued and digitally signed via a trusted third party, regarded as a Certificate Authority
(CA).
- When developing a digital signature, the signer's non-public key is used to sign the data, and the
corresponding public key is covered in the signer's digital certificate.
- The recipient can verify the signature using the public key from the signer's certificates and can also
verify the certificate's validity and trust chain.
- Popular requirements for digital certificates include X.509 and PGP (Pretty Good Privacy).
Advantages:
2 Cryptography
Cryptography is a method of defending facts and communications via the use of codes, so that solely
these for whom the information is supposed can examine and system it.
TYPES
Symmetric Cryptography: Uses a single key for encryption and decryption (e.g., AES, DES).
Asymmetric Cryptography: Uses a pair of keys (public and private) for encryption and decryption (e.g.,
RSA, ECC).
NEED OF CRYPTOGRAPHY
Authentication: Ensures that the identity of the sender and receiver is correct
Non-repudiation: Ensures that the sender cannot deny sending the data
Availability: Ensures that humans with the proper permissions can get entry to facts in a well timed
manner
Access control: Ensures that only events with the suited permissions have get admission to to a resource
TECHNIQUES
Encryption->Uses encryption to help users invulnerable data transmission over networks. Encryption
converts binary information from one form to another, accessible only via a specific key.
Hashing->A kind of encryption in which a message is transformed into an unreadable string of textual
content for the motive of confirming its contents.
Digital signatures->Use public-key cryptography to make sure that a transaction was once signed by the
right sender and has no longer been tampered with at some stage in transmission.
Ciphers->A pair of algorithms that create the encryption and the reversing decryption. A key is a quick
string of characters that is needed to decrypt the cipher-text.