Encryption in digital signatures, Other Subject

Assignment Help:

Encryption in Digital Signatures

Digital Certificates Work

In physical transactions, the challenges of authentication, identification and privacy are solved with physical symbols, such as signatures or seals. In electronic transactions, the corresponding of a seal must be coded into the information itself. By inspection that the electronic "seal" is present and has not been broken down, the receiver can verify the uniqueness of the message sender and make sure that the message content was not changed in transit. To create an electronic equal of physical security, a number of vendors use sophisticated cryptography.

All through history, most private messages were reserved secret with single key cryptography. Single key cryptography is the method that most secret messages have been sent over the centuries. In single key cryptography, there is an exclusive code (or key) for both encrypting and decrypting messages. Single key cryptography workings as follows:

Assume John has one secret key. If Alisa wishes to send John a secret message:

1.   John sends Alisa a copy of his secret key.

2.   Alisa encrypts a message with John's secret key.

3.   John decrypts the message with his secret key.

sorry to say, this technique has several problems. First, John must find a secure method of getting his secret key toAlisa. If the secret key is intercepted, all of John's communications are compromised. Second, John needs to trust Alisa. If Alisa is a double agent, she may give John's secret key to his enemies. Or, she may understand John's other private messages or even copy John. Lastly, if you have an association with people who need to swap secret messages, you will either need to have thousands (if not millions) of secret keys, or you will require to rely on a smaller number of keys, which opens the door to compromise.

SSL certificate skill employs the more sophisticated public key cryptography, which does not involve the sharing of secret keys. Rather than using the same key to both encrypt and decrypt data, an SSL certificate uses a corresponding pair of keys that uniquely balance each other. When a message is encrypted by one key, only the further key can decrypt it.

When a key pair is generated for your business, your "private key" is installed on your server; no one else has access to it. Your matching "public key," in difference, is freely spread as part of your SSL certificate. You can distribute it with anyone, and even make public it in directories. Customers or correspondents who feel like to communicate with you privately can use the public key in your SSL certificate to encrypt information previous to sending it to you. Only you can decrypt the information, because only you have your private key.

Your SSL certificate contains your name and your public key, identifying information, and the CA's own digital signature as certification. It tells customers and correspondents that your public key belongs to you.


Related Discussions:- Encryption in digital signatures

Describe the health effects of ionising radiation, Question 1: (a) What...

Question 1: (a) What are the physical and biological differences between ionising and non ionising radiations? (b) (i) Describe the health effects of ionising radiation.

Off-line anonymous electronic money, OFF-LINE ANONYMOUS ELECTRONIC MONEY ...

OFF-LINE ANONYMOUS ELECTRONIC MONEY In off-line electronic money the merchant does not require to cooperate with the bank before accepting a coin from the user. In its place he

The equilibrium quantity and price for each producer, QUESTION a) Brief...

QUESTION a) Briefly distinguish between the Cournot duopoly model and that of Stackelberg b) Suppose the inverse market demand curve for a telecommunications equipment is P

To crack windows administrator password, this summer i have got project to...

this summer i have got project to crack the password of windows 7 password using any means except any software available on internet

Nutrionist, Defining and understanding the elements of a group culture is e...

Defining and understanding the elements of a group culture is essential to forging a professional identity either online or in person. These elements are important because they ref

Key flows in supply chain management, There are three key flows in SCM, nam...

There are three key flows in SCM, namely: The product flow, which consist the movement of goods from a provider to a customer, as well as any customer returns or service de

Unix, 1. Write a script called “myls” that will perform similarly to how th...

1. Write a script called “myls” that will perform similarly to how the ls command does. Start by making myls print out all files in the present directory. 2. Next, make the script

Describe the effects of mass media on public opinion, Question 1: Descr...

Question 1: Describe the effects of mass media on public opinion according to: (a) The agenda setting theory (b)The spiral of silence theory Question 2:

Explain the problem of bullying, Problem: (a) What are the most serious...

Problem: (a) What are the most serious problems faced by children across the world? (b) Explain the problem of bullying in situations or contexts where human beings interact

Please check this small paragraph, To: The General hospitals From: Salma ...

To: The General hospitals From: Salma Umme, 7717 hough ave, Cleveland, oh-44103 Date: March 7, 2012 Subject: Some issues that I feel is important in my Nursing Area Throughout

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd