Digital Signatures

Problem:
Bob wants to verify the integrity of the message received from Alice
Solution:
Alice "signs" the message and sends the digital signature to Bob:
  1. Alice computes the SHA digest of the message and encrypts the digest with hers private key. The encrypted digest is called the digital signature of the message.
  2. Alice sends the message and the digital signature to Bob.
  3. Bob receives the message and the digital signature. He decrypts the digital signature using Alice's public key. After that he computes the digest and compares it with the value decrypted. If the two digest are equal, Bob is sure that the message is not altered during transmission and Alice is the person who signed the message.

Public Key Certificates

Problem:
How does Alice know Bob's public key?
Solutions:

A certificates contains:

  1. subject's distinguished name (DN). Example: C=US, O=VeriSign, CN=John Smith; this is the X.500 naming system for persons;
  2. subject's RSA public key;
  3. issuer's distinguished name: C=US, O=VeriSign, CN=VeriSign Class 1
  4. validity period;
  5. serial number;
  6. issuer's signature;

How does Alice verify the certificate?

How does Alice know the public key of the issuer?

Prev Up Next