Encryption is the process of converting electronic data into another form, called cipher text, which cannot be easily understood by anyone except authorised parties. Encryption helps to ensure confidentiality of data in transit and at rest.
Decryption is the process of converting cipher text back into the original readable form (plaintext).
Public key - a key that is distributed to others. Example: if the public key of user A is 7, that information is known to everyone.
Private key - the secret key known only to its owner. The private key must be kept confidential.
Authentication is the process by which a system verifies the identity of a user, device or process that wishes to access it.
Non-repudiation ensures that a party to a communication cannot later deny the authorship of a message they sent, and the recipient cannot deny receiving it. Digital signatures provide non-repudiation when private keys are protected.
Integrity guarantees that the message was not altered during transmission. Integrity is typically provided by hash functions and signatures.
A message digest is a fixed-length numeric representation of a message produced by a one-way hash function. A one-way hash function is easy to compute in the forward direction (message → hash) but computationally infeasible to invert (hash → original message) or to find collisions (two different messages with the same hash).
Common hash algorithms include SHA-256 and (historically) MD5; MD5 and some older hashes are now considered weak because of collision attacks. Hash functions are used to produce a compact summary of a message which can then be signed efficiently.
A digital signature is a mathematical construct used to validate the authenticity and integrity of a message, software or digital document. A valid digital signature gives the recipient confidence that the message was created by a known sender (authentication), was not altered (integrity) and - if the sender cannot deny having signed - provides non-repudiation.
The use of a hash function before signing is critical because it makes signing computationally efficient (the signer signs a short, fixed-length digest rather than a large document) and it ensures that small changes in the message produce a different digest.
A digital certificate is an electronic document issued by a trusted third party, called a Certificate Authority (CA), that binds a public key to the identity of its holder. Certificates enable others to verify that a given public key belongs to a specific person, device or service.
Most widely used certificate format is the X.509 standard; certificates issued under this standard contain structured fields with identifying and cryptographic information.
Typical contents of a digital certificate include:
Certificates are used to establish a chain of trust. A verifier checks the CA's signature on the certificate and, if necessary, that CA's certificate up to a trusted root CA. Certificate revocation mechanisms such as Certificate Revocation Lists (CRL) and Online Certificate Status Protocol (OCSP) allow certificates to be marked invalid before their expiry date.
Digital certificates are commonly used in:
Understanding how digital signatures and certificates work together is essential for designing and evaluating secure communication systems. Digital signatures provide the mechanism to sign data; certificates provide a trusted way to associate public keys with identities so signatures can be verified reliably.
| 1. What is a digital signature? | ![]() |
| 2. How does a digital signature work? | ![]() |
| 3. What is a digital certificate? | ![]() |
| 4. How does a digital certificate validate a digital signature? | ![]() |
| 5. What are the benefits of using digital signatures and certificates? | ![]() |
![]() | Explore Courses for Computer Science Engineering (CSE) exam |
![]() | Get EduRev Notes directly in your Google search |