Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE) PDF Download

Digital Signatures and Certificates

Encryption – Process of converting electronic data into another form, called cipher text, which cannot be easily understood by anyone except the authorized parties.This assures data security.

Decryption Process of translating code to data.

  • Message is encrypted at the sender's side using various encryption algorithms and decrypted at the receiver's end with the help of the decryption algorithms.
  • When some message is to be kept secure like username, password, etc., encryption and decryption techniques are used to assure data security.

Types of Encryption

  1. Symmetric Encryption– Data is encrypted using a key and the decryption is also done using the same key.
     
  2. Asymmetric Encryption-Asymmetric Cryptography is also known as public key cryptography. It uses public and private keys to encrypt and decrypt data. One key in the pair which can be shared with everyone is called the public key. The other key in the pair which is kept secret and is only known by the owner is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.

Public key– Key which is known to everyone. Ex-public key of A is 7, this information is known to everyone.

Private key– Key which is only known to the person who's private key it is.

Authentication-Authentication is any process by which a system verifies the identity of a user who wishes to access it.

Non- repudiation– Non-repudiation means to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.

Integrity– to ensure that the message was not altered during the transmission.

Message digest -The representation of text in the form of a single string of digits, created using a formula called a one way hash function. Encrypting a message digest with a private key creates a digital signature which is an electronic means of authentication..

Digital Signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

  1. Key Generation Algorithms : Digital signature are electronic signatures, which assures that the message was sent by a particular sender. While performing digital transactions authenticity and integrity should be assured, otherwise the data can be altered or someone can also act as if he was the sender and expect a reply.
     
  2. Signing Algorithms: To create a digital signature, signing algorithms like email programs create a one-way hash of the electronic data which is to be signed. The signing algorithm then encrypts the hash value using the private key (signature key). This encrypted hash along with other information like the hashing algorithm is the digital signature. This digital signature is appended with the data and sent to the verifier. The reason for encrypting the hash instead of the entire message or document is that a hash function converts any arbitrary input into a much shorter fixed length value. This saves time as now instead of signing a long message a shorter hash value has to be signed and moreover hashing is much faster than signing.
     
  3. Signature Verification Algorithms : Verifier receives Digital Signature along with the data. It then uses Verification algorithm to process on the digital signature and the public key (verification key) and generates some value. It also applies the same hash function on the received data and generates a hash value. Then the hash value and the output of the verification algorithm are compared. If they both are equal, then the digital signature is valid else it is invalid.

The steps followed in creating digital signature are :

  1. Message digest is computed by applying hash function on the message and then message digest is encrypted using private key of sender to form the digital signature. (digital signature = encryption (private key of sender, message digest) and message digest = message digest algorithm(message)).
  2. Digital signature is then transmitted with the message.(message + digital signature is transmitted)
  3. Receiver decrypts the digital signature using the public key of sender.(This assures authenticity,as only sender has his private key so only sender can encrypt using his private key which can thus be decrypted by sender’s public key).
  4. The receiver now has the message digest.
  5. The receiver can compute the message digest from the message (actual message is sent with the digital signature).
  6. The message digest computed by receiver and the message digest (got by decryption on digital signature) need to be same for ensuring integrity.

Message digest is computed using one-way hash function, i.e. a hash fucntion in which computation of hash value of a is easy but computation of a from hash value of a is very difficult.

Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE)

Digital Certificate

Digital certificate is issued by a trusted third party which proves sender's identity to the receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity of the certificate holder. The CA issues an encrypted digital certificate containing the applicant’s public key and a variety of other identification information. Digital signature is used to attach public key with a particular individual or an entity.

Digital certificate contains:-

  1. Name of certificate holder.
  2. Serial number which is used to uniquely identify a certificate, the individual or the entity identified by the certificate
  3. Expiration dates.
  4. Copy of certificate holder's public key.(used for encrypting messages and digital signatures)
  5. Digital Signature of the certificate issuing authority.

Digital ceritifcate is also sent with the digital signature and the message.

Digital certificate vs digital signature :

Digital signature is used to verify authenticity, integrity, non-repudiation ,i.e. it is assuring that the message is sent by the known user and not modified, while digital certificate is used to verify the identity of the user, maybe sender or receiver. Thus, digital signature and certificate are different kind of things but both are used for security. Most websites use digital certificate to enhance trust of their users.

The document Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE) is a part of the Computer Science Engineering (CSE) Course Computer Networks.
All you need of Computer Science Engineering (CSE) at this link: Computer Science Engineering (CSE)
21 videos|113 docs|66 tests

Top Courses for Computer Science Engineering (CSE)

FAQs on Digital Signatures & Certificates - Computer Networks - Computer Science Engineering (CSE)

1. What is a digital signature?
Ans. A digital signature is a cryptographic technique used to verify the authenticity and integrity of a digital message or document. It is created by using a private key to encrypt a hash value of the message or document, and this encrypted hash, along with the corresponding public key, serves as a unique identifier for the sender.
2. How does a digital signature work?
Ans. A digital signature works by using a combination of encryption and hashing techniques. The sender uses their private key to encrypt a hash value of the message or document, creating a unique digital signature. The recipient can then use the sender's public key to decrypt the digital signature and verify the integrity and authenticity of the message or document.
3. What is a digital certificate?
Ans. A digital certificate, also known as an SSL/TLS certificate, is a digital document issued by a trusted third-party certificate authority (CA). It contains information about the identity of the certificate holder (e.g., website owner) and their corresponding public key. Digital certificates are used to establish secure connections and enable the verification of digital signatures.
4. How does a digital certificate validate a digital signature?
Ans. A digital certificate validates a digital signature by verifying the authenticity of the certificate holder's public key. The recipient of a digitally signed message or document can use the digital certificate's public key to decrypt the digital signature. If the decryption is successful and the decrypted hash matches the calculated hash of the message or document, the digital signature is considered valid.
5. What are the benefits of using digital signatures and certificates?
Ans. Using digital signatures and certificates offers several benefits. They provide a secure and tamper-proof way to verify the authenticity and integrity of digital messages or documents. They also enable secure communication and transactions over the internet, ensuring that the information exchanged between parties remains confidential. Additionally, digital signatures and certificates help establish trust between parties by providing a mechanism to verify the identity and legitimacy of the sender.
21 videos|113 docs|66 tests
Download as PDF
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE)

,

Objective type Questions

,

mock tests for examination

,

MCQs

,

Viva Questions

,

Semester Notes

,

ppt

,

Previous Year Questions with Solutions

,

Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE)

,

past year papers

,

Sample Paper

,

practice quizzes

,

Digital Signatures & Certificates | Computer Networks - Computer Science Engineering (CSE)

,

Important questions

,

Free

,

Extra Questions

,

pdf

,

shortcuts and tricks

,

study material

,

video lectures

,

Summary

,

Exam

;