Digital signature, Computer Network Security

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective.

STEP 1: To sign a document seems hashing software  will break the data into just a few lines by the process called 'hashing'. These few lines are named message digest. It is not possible to modify the message digest back to its original data.   Same as what we used above in cryptography hashes.  This establishes whether the message has been changed between the time it was digitally signed and sent and time it was gets by the recipient.

STEP 2: Computing the digest can identify the integrity of the message but does not stop from someone intercepting it or verifying the identity of the user. This is where encryption comes into picture. Signing the code with the private key will be useful for giving that the message must have come from the user who claims to have signed it. The second step in making a digital signature includes encrypting the digest code prepared in STEP 1 with the sender's private key

 

Posted Date: 7/27/2012 6:06:21 AM | Location : United States







Related Discussions:- Digital signature, Assignment Help, Ask Question on Digital signature, Get Answer, Expert's Help, Digital signature Discussions

Write discussion on Digital signature
Your posts are moderated
Related Questions
QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Ask question #Minimum 100 words acceptwwwed#

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co