Digital signature, Computer Network Security

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective.

STEP 1: To sign a document seems hashing software  will break the data into just a few lines by the process called 'hashing'. These few lines are named message digest. It is not possible to modify the message digest back to its original data.   Same as what we used above in cryptography hashes.  This establishes whether the message has been changed between the time it was digitally signed and sent and time it was gets by the recipient.

STEP 2: Computing the digest can identify the integrity of the message but does not stop from someone intercepting it or verifying the identity of the user. This is where encryption comes into picture. Signing the code with the private key will be useful for giving that the message must have come from the user who claims to have signed it. The second step in making a digital signature includes encrypting the digest code prepared in STEP 1 with the sender's private key

 

Posted Date: 7/27/2012 6:06:21 AM | Location : United States







Related Discussions:- Digital signature, Assignment Help, Ask Question on Digital signature, Get Answer, Expert's Help, Digital signature Discussions

Write discussion on Digital signature
Your posts are moderated
Related Questions
Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

IPV6 DATAGRAM FORMAT It is given in the figure below:

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

what is hacking

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Discuss the risks of having a single root user

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Need Assignemnt help in Information security assignemnt

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal