Module 17 Flashcards
are a mathematical technique used to provide authenticity, integrity, and nonrepudiation.
Digital signatures
The following are characteristics of digital signatures:
- Authentic
- Unalterable
- Not reusable
- Non-repudiated
- The signature cannot be forged and provides proof that the signer, and no one else, signed the document.
- Authentic
- After a document is signed, it cannot be altered.
- Unalterable
- The document signature cannot be transferred to another document.
- Not reusable
- The signed document is considered to be the same as a physical document.
- Non-repudiated
Digital signatures are commonly used in the following two situations:
code signing and
digital certificates.
There are three Digital Signature Standard (DSS) algorithms that are used for generating and
verifying digital signatures:
- Digital Signature Algorithm (DSA)
- Rivest-Shamir Adelman Algorithm (RSA)
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- DSA is the original standard for generating public and private key pairs, and for generating and verifying digital signatures.
- Digital Signature Algorithm (DSA)
- RSA is an asymmetric algorithm that is commonly used for generating and verifying digital signatures.
- Rivest-Shamir Adelman Algorithm (RSA)
- ECDSA is a newer variant of DSA and
provides digital signature authentication and non-repudiation with the added benefits of computational efficiency, small signature sizes, and minimal bandwidth.
- Elliptic Curve Digital Signature Algorithm (ECDSA)
Digitally signing code provides several assurances about the code.
- The code is authentic and is actually sourced by the publisher.
- The code has not been modified since it left the software publisher.
- The publisher undeniably published the code. This provides nonrepudiation of the
act of publishing.
A ____ is used to authenticate and verify
that a user who is sending a message is who they claim to be. ___ can also be used to provide confidentiality for the receiver with the means to encrypt a reply.
digital certificate
When establishing an asymmetric connection between two hosts, the hosts will exchange their
public key information.
True
An __is a digital certificate that confirms the identity of a website domain.
SSL certificate
Some examples of Certificate Authorities (CAs) are
IdenTrust, DigiCert, Sectigo, GlobalSign, and
GoDaddy.
These CAs charge for their services.
Let’s Encrypt is a non-profit CA that offers
certificates free of charge.
is needed to support large-scale distribution and identification of public encryption keys.
Public key infrastructure (PKI)
CAs, especially those that are outsourced, issue certificates based on classes which determine
how trusted a certificate is.
The class number is determined by how rigorous
the procedure was that verified the identity of the holder when the certificate was issued.
The higher the class number, the more trusted the certificate.
0 Used for testing in situations in which no checks have been performed.
1 Used by individuals who require verification of email.
2 Used by organizations for which proof of identity is required.
3 Used for servers and software signing. Independent verification and checking of identity and authority is done by the certificate authority.
4 Used for online business transactions between companies.
5 Used for private organizations or government security.