What is a Digital Signature? 数字签名


原文地址:http://www.youdzone.com/signature.html

中文翻译:http://www.ruanyifeng.com/blog/2011/08/what_is_a_digital_signature.html



Bob

(Bob's public key)


(Bob's private key)

Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key.

Bob's Co-workers:

Anyone can get Bob's Public Key, but Bob keeps his Private Key to himself

PatDougSusan

Bob's Public key is available to anyone who needs it, but he keeps his Private Keyto himself. Keys are used to encrypt information. Encrypting information means"scrambling it up", so that only a person with the appropriate key can make itreadable again. Either one of Bob's two keys can encrypt data, and the other key can decrypt that data.

Susan (shown below) can encrypt a message using Bob's Public Key. Bob uses hisPrivate Key to decrypt the message. Any of Bob's coworkers might have accessto the message Susan encrypted, but without Bob's Private Key, the data isworthless.

"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!"HNFmsEm6UnBejhhyCGKOKJUxhiygSBCEiC0QYIh/Hn3xgiKBcyLK1UcYiYlxx2lCFHDC/A

HNFmsEm6UnBejhhyCGKOKJUxhiygSBCEiC0QYIh/Hn3xgiKBcyLK1UcYiYlxx2lCFHDC/A"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!"

With his private key and the right software, Bob can put digital signatures ondocuments and other data. A digital signature is a "stamp" Bob places on thedata which is unique to Bob, and is very difficult to forge. In addition, thesignature assures that any changes made to the data that has been signed cannot go undetected.

To sign a document, Bob's software will crunch down the data into just a few linesby a process called "hashing". These few lines are called a message digest. (Itis not possible to change a message digest back into the original data from whichit was created.)

Bob's software then encrypts the message digest with his private key. The result is the digital signature.

Finally, Bob's software appends the digital signature to document. All of thedata that was hashed has been signed.

Bob now passes the document on to Pat.

First, Pat's software decrypts the signature (using Bob's public key) changing it backinto a message digest. If this worked, then it proves that Bob signed thedocument, because only Bob has his private key. Pat's software then hashesthe document data into a message digest. If the message digest is the sameas the message digest created when the signature was decrypted, then Patknows that the signed data has not been changed.

Plot complication...

Doug (our disgruntled employee) wishes to deceive Pat. Doug makes surethat Pat receives a signed message and a public key that appears to belongto Bob. Unbeknownst to Pat, Doug deceitfully sent a key pair hecreated using Bob's name. Short of receiving Bob's public key from himin person, how can Pat be sure that Bob's public key is authentic?

It just so happens that Susan works at the company's certificateauthority center. Susan can create a digital certificate for Bob simplyby signing Bob's public key as well as some information about Bob.

Bob Info:
    Name
    Department
    Cubical Number

Certificate Info:
    Expiration Date
    Serial Number

Bob's Public Key:
    


Now Bob's co-workers can check Bob's trusted certificate to make surethat his public key truly belongs to him. In fact, no one at Bob'scompany accepts a signature for which there does not exist a certificategenerated by Susan. This gives Susan the power to revoke signatures ifprivate keys are compromised, or no longer needed. There are even morewidely accepted certificate authorities that certify Susan.

Let's say that Bob sends a signed document to Pat. To verify the signatureon the document, Pat's software first uses Susan's (the certificateauthority's) public key to check the signature on Bob's certificate.Successful de-encryption of the certificate proves that Susan created it.After the certificate is de-encrypted, Pat's software can check ifBob is in good standingwith the certificate authority and that all of the certificate informationconcerning Bob's identity has not been altered.

Pat's software then takes Bob's public key from the certificate and uses itto check Bob's signature. If Bob's public key de-encrypts the signaturesuccessfully, then Pat is assured that the signature was created using Bob'sprivate key, for Susan has certified the matching public key. And of course,if the signature is valid, then we know that Doug didn't try to change thesigned content.


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
提供的源码资源涵盖了Java应用等多个领域,每个领域都包含了丰富的实例和项目。这些源码都是基于各自平台的最新技术和标准编写,确保了在对应环境下能够无缝运行。同时,源码中配备了详细的注释和文档,帮助用户快速理解代码结构和实现逻辑。 适用人群: 适合毕业设计、课程设计作业。这些源码资源特别适合大学生群体。无论你是计算机相关专业的学生,还是对其他领域编程感兴趣的学生,这些资源都能为你提供宝贵的学习和实践机会。通过学习和运行这些源码,你可以掌握各平台开发的基础知识,提升编程能力和项目实战经验。 使用场景及目标: 在学习阶段,你可以利用这些源码资源进行课程实践、课外项目或毕业设计。通过分析和运行源码,你将深入了解各平台开发的技术细节和最佳实践,逐步培养起自己的项目开发和问题解决能力。此外,在求职或创业过程中,具备跨平台开发能力的大学生将更具竞争力。 其他说明: 为了确保源码资源的可运行性和易用性,特别注意了以下几点:首先,每份源码都提供了详细的运行环境和依赖说明,确保用户能够轻松搭建起开发环境;其次,源码中的注释和文档都非常完善,方便用户快速上手和理解代码;最后,我会定期更新这些源码资源,以适应各平台技术的最新发展和市场需求。 所有源码均经过严格测试,可以直接运行,可以放心下载使用。有任何使用问题欢迎随时与博主沟通,第一时间进行解答!

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值