Computer Science – 17.1 Encryption, Encryption Protocols and Digital Certificates | e-Consult
17.1 Encryption, Encryption Protocols and Digital Certificates (1 questions)
Login to see all questions.
Click on a question to view the answer
A digital signature is a cryptographic mechanism used to ensure the authenticity and integrity of digital documents or messages. It provides assurance that the sender is who they claim to be and that the message has not been altered in transit.
Process of Creating a Digital Signature:
- The sender uses their private key to encrypt a hash of the message. This encrypted hash is the digital signature.
- The sender sends the original message and the digital signature to the recipient.
Process of Verifying a Digital Signature:
- The recipient uses the sender's public key to decrypt the digital signature, obtaining the original hash value.
- The recipient independently calculates the hash of the received message.
- The recipient compares the decrypted hash value with the independently calculated hash value. If they match, the signature is valid, confirming authenticity and integrity.
Diagram/Table:**
| Step | Action |
| 1. Hash | Calculate a hash of the message. |
| 2. Sign | Encrypt the hash with the private key. |
| 3. Send | Send the message and the signature. |
| 4. Verify | Decrypt the signature with the public key to get the hash. Calculate the hash of the received message. Compare the hashes. |