数字签名 那些密码技术

A signature is usually used to bind signatory to the message. The digital signature is thus a technique that binds a person or the entity to the digital data. This binding ensures that the person sending the data is solely responsible for being for it and this binding can be verified by the receiver and the third party. This digital signature is also stored using hash functions so that no one’s signature can be stolen and be misused. The process of binding the data with the digital signature is as follows.

签名通常用于将签名者绑定到消息。 因此, 数字签名是将个人或实体绑定到数字数据的技术。 此绑定确保发送数据的人对此负全责,并且此绑定可以由接收方和第三方验证。 此数字签名也使用哈希函数存储,因此任何人的签名都不会被盗用或滥用。 用数字签名绑定数据的过程如下。

用数字签名绑定数据的过程 (Process of binding the data with a digital Signature)

The user or the person who is sending the data is asked to enter some signature. This can be any unique text or his identity or something else. Hash Function is applied over this signature value and it is attached to the message being sent. The message is then transmitted to the other user with the hash value of the signature. The receiver then checks for the similarity between the signatory values. In this way, a digital signature is applied over the digital data.

用户或发送数据的人被要求输入一些签名。 这可以是任何唯一的文本或他的身份或其他任何东西。 哈希函数应用于此签名值,并且附加到正在发送的消息上。 然后将消息与签名的哈希值一起发送给另一个用户。 接收器然后检查签名值之间的相似性。 以这种方式,数字签名被施加在数字数据上。

数字签名的应用 (Applications of Digital Signature)

  1. Message Authentication:

    消息认证

    When the verifier validates the digital signature using the public key, he is assured that the signature has been created by the valid sender who is having the private key. In this way, the receiver is assured that the message is sent by the one whose signature is attached with the message and this implies the message authentication.

    当验证者使用公钥验证数字签名时,将向他保证签名已由拥有私钥的有效发送者创建。 以这种方式,确保接收者该消息是由其签名附有该消息的那个人发送的,并且这意味着消息认证。

  2. Data Integrity:

    数据完整性

    In case the data has been modified in between the transmission, the signature verification algorithm fails at the receiver’s side. The hash code of the modified data and the output provided by the verification algorithm will no match, so the receiver can safely deny the message assuming that the data integrity has not been reached.

    如果在两次传输之间修改了数据,则签名验证算法在接收方将失败。 修改后的数据的哈希码和验证算法提供的输出将不匹配,因此,如果尚未达到数据完整性,则接收方可以安全地拒绝该消息。

  3. Non- Repudiation:

    不可否认

    The sender cannot deny that he has not sent that data if the data has been attached to the digital signature of the sender. Since, the person who is attaching the signature with the data that is to be transmitted, is the only person who can create that unique signature for his data (unless his signature is stolen by someone else), the receiver can present the data along with the digital signature in case the sender denies that he has not sent that data. Therefore, the signature must be kept private and must not be shared with anyone.

    如果数据已附加到发送方的数字签名,则发送方不能否认自己没有发送该数据。 由于将签名与要传输的数据附加在一起的人是唯一可以为其数据创建该唯一签名的人(除非他的签名被他人窃取了),因此接收者可以将数据与如果发件人否认自己没有发送该数据,则为数字签名。 因此,签名必须保密,不得与任何人共享。

    Example, whenever a mail is received, the email id of the sender is the signatory to the message, and as every email id is unique, in case if any message is sent using his email address, the sender cannot deny from the fact that he has not sent that mail.

    例如,每当收到一封邮件时,发件人的电子邮件ID就是该消息的签名者,并且由于每个电子邮件ID都是唯一的,因此,如果使用他的电子邮件地址发送了任何邮件,则发件人不能否认他尚未发送该邮件。

翻译自: https://www.includehelp.com/cryptography/digital-signatures.aspx

数字签名 那些密码技术

数字签名 那些密码技术_密码学中的数字签名相关推荐

  1. 维吉尼亚密码和一次性密码本_密码学中的一次性密码

    维吉尼亚密码和一次性密码本 The One-time Pad cipher is almost similar to the Vernam cipher, as, like the vernam ci ...

  2. des加密密码补位_密码学中的数据加密标准(DES)

    des加密密码补位 This is a Data Encryption Standard that is the asymmetric key generation for the encryptio ...

  3. des算法密码多长_密码学中的多个DES

    des算法密码多长 This is a DES that was susceptible to attacks due to tremendous advances in computer hardw ...

  4. vue.js 密码加密_密码学初探:隐藏信息的艺术——区块链技术引卷之十一

    通证通研究院 × FENBUSHI DIGITAL 联合出品 文:宋双杰,CFA:孙含儒 特别顾问:沈波:Rin:JX 导读 密码学(Cryptography),是一门将信息进行加密处理与传递,以及分 ...

  5. 密码学电子书_密码学中的电子密码书(ECB)

    密码学电子书 This Electronic Code Book (ECB) is cryptography as a mode of operation for a block cipher, wi ...

  6. dsa数字签名算法_密码学中的数字签名算法(DSA)

    dsa数字签名算法 Digital Signature Algorithm (DSA) is one of the Federal Information Processing Standard fo ...

  7. 密码学加密算法分类_密码学中的国际数据加密算法(IDEA)

    密码学加密算法分类 Introduction 介绍 International Data Encryption Algorithm (IDEA) is a type of cryptography a ...

  8. md5不是对称密码算法_密码学中的消息摘要算法5(MD5)

    md5不是对称密码算法 In cryptography, MD5 (Message-Digest algorithm 5) is a mainly used cryptographic hash fu ...

  9. vue.js 密码加密_密码学初探:隐藏信息的艺术

    通证通研究院 × FENBUSHI DIGITAL 联合出品 文:宋双杰,CFA:孙含儒 特别顾问:沈波:Rin:JX 导读 密码学(Cryptography),是一门将信息进行加密处理与传递,以及分 ...

最新文章

  1. js init : function ()
  2. (转)Ext与.NET超完美整合 .NET开发者的超级优势
  3. 进程死锁的危害、导致原因和解决方法
  4. java B2B2C Springcloud电子商城系统-通过消息队列传输zipkin日志
  5. xp系统怎么弄清微软服务器名称,xp系统电脑怎么远程云服务器
  6. element ui 图片上传_游民晚播报:PS5手柄续航情况测试 UI界面概览放出
  7. 小心陷入MySQL索引的坑
  8. python爬虫深入爬取_Python爬虫初学(一)—— 爬取段子
  9. c++ 返回string_JVM系列之:String.intern和stringTable
  10. 2021年国货彩妆品牌推广营销趋势
  11. SQLSERVER2005 收缩日志
  12. 微软开始测试自己的Google Base
  13. html中加入数据库,HTML中如何连接数据库?
  14. Transformer预训练模型已经变革NLP领域,一文概览当前现状
  15. centos yum mysql-devel 5.5_CentOS 6.5通过yum安装 MySQL-5.5
  16. SQlite数据库的C编程接口(六) 返回值和错误码(Result Codes and Error Codes) ——《Using SQlite》读书笔记
  17. Office 365系列(1)------Office 365邮箱申请及初步配置说明
  18. 圆柱螺旋压缩弹簧计算实例
  19. 海康大华宇视硬件NVR通过GB28181注册接入到LiveGBS国标流媒体服务后通道显示为0如何处理
  20. curl api接口获取当前IP地址

热门文章

  1. docker安装pocbox(漏洞测试验证辅助平台)
  2. fofa自动化爬虫脚本更新+详解
  3. 视差滚动(Parallax Scrolling)技术在网页中应用的精美案例
  4. 发现2017年最好的CSS框架
  5. 上下div高度动态自适应--另类处理方案
  6. css3 flex 布局
  7. JS中的数据类型转换
  8. 凭借K2 SmartObject框架,在SharePoint中集成数据
  9. IDEA插件之 CodeGlance
  10. Java访问权限的范围