Monday, October 22, 2012

Digital Signature


A digital signature is created with asymmetric or public-key cryptography. In the same way as signing your name to a document legally binds the document to you, a digital signature proves that a document belongs to a user. In addition, a digital signature provides other benefits beyond simply proving that a particular person sent a message.
A digital signature is able to prove that a message has not been changed, which means that it ensures the integrity of a message. It is also provides for non-repudiation, meaning it’s able to prevent a sender from claiming they did not send the message.
For example, if you want to send a digitally signed message to your bank; first you would create a hash of the message using a hashing algorithm like Message Digest 5 (MD5) or Secure Hash Algorithm (SHA). This hashed message is called a message digest. You would then encrypt the digest using your private key and this encrypted hash would be the digital signature of your message.
Both the message and the digital signature are sent to your bank.
In order for the bank to make sure that your message is authentic, they would retrieve your public key and decrypt your digital signature, which reveals the hash. The bank would then hash your message and compare it to the newly uncovered hash.
If the hashes do not match then the message was not sent by you or was changed in transit.
Keep in mind that the original message that you sent to the bank with the digital signature could still be read by others. In order to encrypt the message you would need to retrieve the bank’s public key from their certificate authority (CA) and encode your message. After that, the bank will be able to decode your message with their private key.

9 comments:

  1. I wanted to learn about the encryption process. How a person can verify if the message is not altered or digital signature attached to it is trustworthy ?
    e signatures

    ReplyDelete
    Replies
    1. @jenice thnks for reading post.
      yes we verify it, then let me explain you with an example .
      suppose i send you a message "hello jenice ". now as u asked how we verify it.
      well this is also an example of injection .
      before sending message it calculates its hash, whch encrypts it(let ex-hello jenice , 12 char(including space). you recieve hash 12 . means correct mesage

      in case someone altered message in between, its abvious for this he have to either add or delete portion of messgae then automatically its hash value(12), will also going to be changed and when u recieved this hash its not what i send you(12). its get notified.
      thats how this works.
      And it is achieved using Self Signature(public key) and CA(Certification Authority).
      hope this clears your doubt..

      Delete
  2. Thanks for the nice blog. It was very useful for me. Keep sharing such ideas in the future as well. This was actually what I was looking for and I am glad to come here! Thanks for sharing such a valuable information with us Digital Signature For E Tender in Delhi

    ReplyDelete
  3. Finally I found something useful to me. I have been looking for information on this particular topic for a lot of time now. I can't believe it is this difficult to find something on the Internet like this. I must be looking for the wrong thing or I don't know how to use Google. Anyway, thanks a lot for making this post available to us.Digital Signature Certificates

    ReplyDelete
  4. Ohayo,

    Brilliant article, glad I slogged through the AWS it seems that a whole lot of the details really come back to from my past project.

    Currently retrieving account attributes
    We are currently in the process of retrieving your account attributes. Please try again in a few minutes.

    I am getting this error message for the last couple of days. According to it is about my account not having been activated . But according to am email from Amazon, my account is fully activated.

    Anyways great write up, your efforts are much appreciated.
    Obrigado,
    Radhey

    ReplyDelete
  5. Hey Brother,


    Brilliant article, glad I slogged through the Digital Signature it seems that a whole lot of the details really come back to from my past project. AWS Tutorial


    I'm using CloudFormation and really enjoy it, but there are a couple of things which are lacking here.

    Maybe there are some reasons why they weren't implemented here, but.

    So, the first thing is variables which can be populated during stack creation.
    Here is an example of similar service from another cloud provider:

    Thanks a lot. This was a perfect step-by-step guide. Don’t think it could have been done better.

    Shukran,
    Radhey

    ReplyDelete
  6. Hi There,

    This is indeed great! But I think perhaps you are generally referring Digital Signature which is getting unsustainable.

    As far as all my research has led me to conclude, AWS only has one service that supports websocket protocol for pushing data straight to browsers. SNS solely supports mobile. IoT supports websocket over MQTT, albeit awkwardly, requiring you to treat ephemeral browser sessions like devices. AWS Training USA . Some libraries to abstract this awkward fit have popped up.

    Very useful post !everyone should learn and use it during their learning path.

    MuchasGracias,
    Preethi.

    ReplyDelete