Encryption in digital signatures, Other Subject

Assignment Help:

Encryption in Digital Signatures

Digital Certificates Work

In physical transactions, the challenges of authentication, identification and privacy are solved with physical symbols, such as signatures or seals. In electronic transactions, the corresponding of a seal must be coded into the information itself. By inspection that the electronic "seal" is present and has not been broken down, the receiver can verify the uniqueness of the message sender and make sure that the message content was not changed in transit. To create an electronic equal of physical security, a number of vendors use sophisticated cryptography.

All through history, most private messages were reserved secret with single key cryptography. Single key cryptography is the method that most secret messages have been sent over the centuries. In single key cryptography, there is an exclusive code (or key) for both encrypting and decrypting messages. Single key cryptography workings as follows:

Assume John has one secret key. If Alisa wishes to send John a secret message:

1.   John sends Alisa a copy of his secret key.

2.   Alisa encrypts a message with John's secret key.

3.   John decrypts the message with his secret key.

sorry to say, this technique has several problems. First, John must find a secure method of getting his secret key toAlisa. If the secret key is intercepted, all of John's communications are compromised. Second, John needs to trust Alisa. If Alisa is a double agent, she may give John's secret key to his enemies. Or, she may understand John's other private messages or even copy John. Lastly, if you have an association with people who need to swap secret messages, you will either need to have thousands (if not millions) of secret keys, or you will require to rely on a smaller number of keys, which opens the door to compromise.

SSL certificate skill employs the more sophisticated public key cryptography, which does not involve the sharing of secret keys. Rather than using the same key to both encrypt and decrypt data, an SSL certificate uses a corresponding pair of keys that uniquely balance each other. When a message is encrypted by one key, only the further key can decrypt it.

When a key pair is generated for your business, your "private key" is installed on your server; no one else has access to it. Your matching "public key," in difference, is freely spread as part of your SSL certificate. You can distribute it with anyone, and even make public it in directories. Customers or correspondents who feel like to communicate with you privately can use the public key in your SSL certificate to encrypt information previous to sending it to you. Only you can decrypt the information, because only you have your private key.

Your SSL certificate contains your name and your public key, identifying information, and the CA's own digital signature as certification. It tells customers and correspondents that your public key belongs to you.


Related Discussions:- Encryption in digital signatures

Value laden, Case Study: Judy a seventeen year old girl was hospitalise...

Case Study: Judy a seventeen year old girl was hospitalised following presenting to the Emergency Department (ED) with acute abdominal pain. Judy has just commenced a job in th

Case study MIS, 1. Do you agree with the argument made by Nick Carr to supp...

1. Do you agree with the argument made by Nick Carr to support his position that IT no longer gives companies a competitive advantage? Why or why not?

Elements of epic poetry, I am facing some problems in my assignment of Elem...

I am facing some problems in my assignment of Elements of Epic Poetry. Can anybody suggest me the proper explanation for it? the topics which are related to the assignment are give

Geomorphological drainage system, Geomorphological Drainage system: In geo...

Geomorphological Drainage system: In geomorphology, a drainage system is the pattern formed by the streams, rivers, and lakes in a particular drainage basin. They are governed by

Exam , 3. family day care provider Alicia Magnus always has an interesting ...

3. family day care provider Alicia Magnus always has an interesting activity set up for the children as they arrive in the morning. This gives Alicia a chance to have quick chats w

Art style, I need report on Art styles. Do you provide help in topic Art st...

I need report on Art styles. Do you provide help in topic Art styles? I need expert's assistance to solve my college assignment. Please suggest if it works for me. please describe

Dental nurse, how do you carry health and safety act at your work place

how do you carry health and safety act at your work place

Explain what is media imperialism, Question 1: A "Development Organizat...

Question 1: A "Development Organization" invites you to be its development communication consultant to promote the diffusion of a new idea into your community. Discuss the ste

Pancreas, The pancreas secretes digestive enzymes into the duodenum, the fi...

The pancreas secretes digestive enzymes into the duodenum, the first segment of the small intestine. These enzymes break down protein, fats, and carbohydrates. The pancreas also ma

Credit cards and smart cards-e commerce payment system , CREDIT CARDS AND S...

CREDIT CARDS AND SMART CARDS Over the years, credit cards have roll out to be one of the nearly all common forms of payment for e-commerce transactions. In the before time year

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd