Digital signature, Computer Network Security

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective.

STEP 1: To sign a document seems hashing software  will break the data into just a few lines by the process called 'hashing'. These few lines are named message digest. It is not possible to modify the message digest back to its original data.   Same as what we used above in cryptography hashes.  This establishes whether the message has been changed between the time it was digitally signed and sent and time it was gets by the recipient.

STEP 2: Computing the digest can identify the integrity of the message but does not stop from someone intercepting it or verifying the identity of the user. This is where encryption comes into picture. Signing the code with the private key will be useful for giving that the message must have come from the user who claims to have signed it. The second step in making a digital signature includes encrypting the digest code prepared in STEP 1 with the sender's private key

 

Posted Date: 7/27/2012 6:06:21 AM | Location : United States







Related Discussions:- Digital signature, Assignment Help, Ask Question on Digital signature, Get Answer, Expert's Help, Digital signature Discussions

Write discussion on Digital signature
Your posts are moderated
Related Questions
Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1


Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi