Digital signature, Computer Network Security

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective.

STEP 1: To sign a document seems hashing software  will break the data into just a few lines by the process called 'hashing'. These few lines are named message digest. It is not possible to modify the message digest back to its original data.   Same as what we used above in cryptography hashes.  This establishes whether the message has been changed between the time it was digitally signed and sent and time it was gets by the recipient.

STEP 2: Computing the digest can identify the integrity of the message but does not stop from someone intercepting it or verifying the identity of the user. This is where encryption comes into picture. Signing the code with the private key will be useful for giving that the message must have come from the user who claims to have signed it. The second step in making a digital signature includes encrypting the digest code prepared in STEP 1 with the sender's private key

 

Posted Date: 7/27/2012 6:06:21 AM | Location : United States







Related Discussions:- Digital signature, Assignment Help, Ask Question on Digital signature, Get Answer, Expert's Help, Digital signature Discussions

Write discussion on Digital signature
Your posts are moderated
Related Questions
USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Ask question #Minimum.. 100 words accepted#

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha