Digital Signatures Flashcards
What 2 problems does Public Key Encryption solve?
Key Management issue.
Authentication (Proving origin of data).
What is the formula to calculate the number of keys needed for N parties via symmetric encryption?
(n(n-1))/2
What problem does digital signatures solve?
Proving the origin of data.
What concepts are needed for the signature process?
Message, public / private key pair, hash function, signature function, signature, verification function.
Which 2 procedures are contained within the digital signature process?
Signing
Verification
Give the notation for a reversible encryption scheme.
Ee(Dd(M)) = Dd(Ee(M)) = M
Give the steps of how a digital signature is created and verified…
1 - Jason runs a message through a hash function to create a digest.
2 - Jason feeds the digest and his private key into a signature algorithm to create a signature.
3 - Jason appends the signature to the original message and sends too B.
4 - B runs the message through the hash function to create a digest.
5 - B runs the digest and Jason’s public key through a signature verification function to verify the signature.