Digital
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Digital Signatures:
An overview of the topic: A
digital signature is an electronic signature that can be used to authenticate
the identity of the sender of a message or the signer of a document, and
possibly to ensure that the original content of the message or document that
has been sent is unchanged. Digital Signature use
double encrypts methods to achieve the security.
You will need to get your personal signing certificate. Creating
your certificate involves creating a public-private digital key pair and a
Certificate Authority. The private key is something you keep only to yourself.
You sign a document with your private key. Then, you give your public key to anyone who wants to verify your signature.
An explanation of how this relates to computer security goals Digital
signatures are especially important for electronic commerce
and are a key component of most authentication
schemes. To be effective, digital signatures must enforceable. There are a number of d ifferent encryption techniques to guarantee this level of security.
An explanation of the computer security benefits and problems associated with the topic. BENEFITS: there are 3 main benefits that encourage the use of Digital Signature:
1. Authentication:
Digital signatures are used to authenticate the source of the message.
When a proprietor of a secret key for a digital signature is linked to a specific user, a valid signature shows that the message was sent by the specific user. The importance of high confidence regarding authenticity of the message sender is reinforced specially in a financial context.
2. Integrity
if a message is digitally signed any alteration thereafter would turn the signature invalid. Even more, there aren’t any efficient ways of modifying a message and its signature to produce a new one with a valid signature, since this is considered computationally impossible by many cryptographic functions, known as Hash.
3. Non-repudiation
By this property an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature.
PROBLEMS:
1. Cost: You must have the necessary software to encode the signatures, and if you're using hardware so that customers can sign physically, then the cost goes up even further. Digital signatures are an additional cost that should be weighed against their potential security benefits.
2. Training and Troubleshooting。