
Digital signature
using Public Key Crypto-System
Suppose Peter wants to send his signed
message to Thomas via Internet, he can use the Public Key Crypto-System to provide
digital signatures. Peter uses his own private key to produce a digital
signature. Thomas will use Peter's public key to verify this digital signature.
A digital signature is different from a hand-written signature. Usually,
a digital signature is an encrypted item.
The
digital signature generation process is as follows:
Peter uses his private
key to generate the digital signature. Technically it is the same as
"encrypting" the messages with Peter' private key, and the result after encryption
is the signed message.
Peter sends signed message
to Thomas via the Internet.
Note that the digital signature
can only be generated by Peter's private key. Technically, if the message
is modified, the digital signature will be different.
The digital
signature verification process is as follows:
Thomas receives the message,
together with the digital signature from the Internet.
Thomas gets a copy of
Peter's public key from Miss C.A.
Thomas will verify the
signature by Peter's public key. Technically, Thomas "decrypts" the
message with Peter's public key. If the result after decryption is the
same as the transmitted message, Thomas can believe that the message is really
come from Peter. This is because only Peter holds his private key, which
is needed to generate the digital signature.
Therefore, Peter cannot
deny that he sends this message to Thomas.
Note that if the message or
the digital signature is modified during the transmission, Thomas will not find
the "decrypted" digital signature matches the message, then Thomas can conclude
that either the message transmission is tampered, or the message is not generated
by Peter.
The key management
issues are similar to sending secret message:
User needs to protect
his/her private key really secret.
User's public key has
to be known correctly by all other people. If Thomas gets a wrong copy
of Peter's public key, he will wrongly accept a message signed by somebody
else as being signed by Peter.
Chinese Version
Copyright
© 1999 Department of Computer Science and Information Systems, The University
of Hong Kong. All rights reserved.