原文链接:http://www.youdzone.com/signature.html
译文: http://news.cnblogs.com/n/111348/
Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key.
Bob's Public key is available to anyone who needs it, but he keeps his Private Key to himself. Keys are used to encrypt information. Encrypting information means "scrambling it up", so that only a person with the appropriate key can make it readable again. Either one of Bob's two keys can encrypt data, and the other key can decrypt that data.
Susan (shown below) can encrypt a message using Bob's Public Key. Bob uses his Private Key to decrypt the message. Any of Bob's coworkers might have access to the message Susan encrypted, but without Bob's Private Key, the data is worthless.
|
|
"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!" |
|
HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A |
|
|
HNFmsEm6Un BejhhyCGKOK JUxhiygSBCEiC 0QYIh/Hn3xgiK BcyLK1UcYiY lxx2lCFHDC/A |
|
"Hey Bob, how about lunch at Taco Bell. I hear they have free refills!" |
With his private key and the right software, Bob can put digital signatures on documents and other data. A digital signature is a "stamp" Bob places on the data which is unique to Bob, and is very difficult to forge. In addition, the signature assures that any changes made to the data that has been signed can not go undetected.
|
To sign a document, Bob's software will crunch down the data into just a few lines by a process called "hashing". These few lines are called a message digest. (It is not possible to change a message digest back into the original data from which it was created.)
|
Bob's software then encrypts the message digest with his private key. The result is the digital signature.
Finally, Bob's software appends the digital signature to document. All of the data that was hashed has been signed.
Bob now passes the document on to Pat.
|
First, Pat's software decrypts the signature (using Bob's public key) changing it back into a message digest. If this worked, then it proves that Bob signed the document, because only Bob has his private key. Pat's software then hashes the document data into a message digest. If the message digest is the same as the message digest created when the signature was decrypted, then Pat knows that the signed data has not been changed.
|
Plot complication...
|
Doug (our disgruntled employee) wishes to deceive Pat. Doug makes sure that Pat receives a signed message and a public key that appears to belong to Bob. Unbeknownst to Pat, Doug deceitfully sent a key pair he created using Bob's name. Short of receiving Bob's public key from him in person, how can Pat be sure that Bob's public key is authentic? |
It just so happens that Susan works at the company's certificate authority center. Susan can create a digital certificate for Bob simply by signing Bob's public key as well as some information about Bob.
Now Bob's co-workers can check Bob's trusted certificate to make sure that his public key truly belongs to him. In fact, no one at Bob's company accepts a signature for which there does not exist a certificate generated by Susan. This gives Susan the power to revoke signatures if private keys are compromised, or no longer needed. There are even more widely accepted certificate authorities that certify Susan.
Let's say that Bob sends a signed document to Pat. To verify the signature on the document, Pat's software first uses Susan's (the certificate authority's) public key to check the signature on Bob's certificate. Successful de-encryption of the certificate proves that Susan created it. After the certificate is de-encrypted, Pat's software can check if Bob is in good standing with the certificate authority and that all of the certificate information concerning Bob's identity has not been altered.
Pat's software then takes Bob's public key from the certificate and uses it to check Bob's signature. If Bob's public key de-encrypts the signature successfully, then Pat is assured that the signature was created using Bob's private key, for Susan has certified the matching public key. And of course, if the signature is valid, then we know that Doug didn't try to change the signed content.
Although these steps may sound complicated, they are all handled behind the scenes by Pat's user-friendly software. To verify a signature, Pat need only click on it.
分享到:
相关推荐
How to use digital signature for QM in SAP?
The term business analyst is still synonymous with a career in the IT industry, but the most successful and valuable analysts are those who understand the “business” rather than those who understand...
什么是神经网络进化__What_is_Neuro-Evolution_
WHAT IS A MATROID? JAMES OXLEY Abstract. Matroids were introduced by Whitney in 1935 to try to capture abstractly the essence of dependence. Whitney’s definition embraces a surprising diversity of ...
格式PDF Written by Hal R. Varian University of California at Berkeley August, 1989 Keywords. methodology, economic theory, neoclassical economics
【接力版三年级下册小学英语 Lesson 6 "What colour is it?" 教案】主要围绕小学英语中的颜色和物品名称的教学展开,旨在帮助学生掌握基本的英语词汇和句型,提高他们的听说能力和语言运用能力。 一、教材内容分析 ...
本书详细介绍了数学的各个分支。对于有需要了解数学方法的程序员有很大的帮助。
--Is it a …? --No, it isn’t.”这些句型和对话将帮助学生理解和应用昆虫的相关概念。 教学的关键和难点在于新词的发音。教师将通过展示昆虫图片引导学生识别和发音,如ladybug(瓢虫)、butterfly(蝴蝶)、...
1. 问题 "What is the tiger doing?" 要求学生回答老虎正在做什么。答案是 "The tiger is running.",这表明老虎正在奔跑。 2. 同样的结构用于其他动物,例如 "What is the elephant doing?" 回答是 "It’s ...
36 What is deflation?
9. "The man is a farmer." 可以用"What is the man?" 或 "What does the man do?" 提问职业。 10. "He is looking for his pen." 用"What is he looking for?" 提问。 11. "It’s a Chinese car." 用"What is it?" ...
What? It’s a chair. It’s a chair. It’s a chair. Chair. Chair." 通过以上步骤,孩子们不仅学会了英语对话,还通过各种互动活动体验了英语学习的乐趣,为他们的英语基础打下了坚实的基础。此外,教师应时刻...
What Knowledge Is Important to a Software Professional?——by Timothy C.Lethbridge 作者来自University of Ottawa,这篇文章影响很大,非常值得软件工程专业人士研读。
- **When**:询问时间,例如 "What time is it?" 或 "When is your birthday?" - **Who**:询问人物,例如 "Who is that man?" 或 "Who did you meet?" - **Whose**:询问所有者,例如 "Whose book is this?" 或 ...
Chapter 3 What Is a Scientific Paper? Chapter 4 How to Prepare the Title Chapter 5 How to List the Authors and Addresses Chapter 6 How to Prepare the Abstract Chapter 7 How to Write the Introduction ...
接力版四年级下册小学英语 Lesson 6 What is it doing?说课稿.doc
Lesson 3 What time is it?教案(教学设计) 本教案旨在帮助四年级下册小学英语学生学习询问和回答时间的句型“What time is it? It’s …o’clock. It’s half past …”,并教学单词time、half、hour、late等。...
What Is Computer Science