Thursday, October 2, 2014

Digital Signatures

Digital signatures

Digital signatures are based on asymmetric cryptography which means – a message encrypted with one key is decrypted by a different key. Both keys in the scenario are mathematically related. So in other words – a message encrypted with public key can only be decrypted by its corresponding private key and a message encrypted with private key can only be decrypted by its corresponding public key.

In a general case a message is encrypted with public key (by the sender) and the receiver decrypts it with the private key (owned and held by him ONLY). This way all the intermediaries, even after getting hold of the message cannot decrypt as it can only be decrypted by the PRIVATE KEY (only held by the intended receiver).

In case of digital signature, the scenario is opposite. Here the intent is not encryption but rather AUTHENTICITY and INTEGRITY.  Explanation – I have a document. I make a hash out of it (called message digest). I encrypt the hash with my PRIVATE key. I send the original un-encrypted document along with the encrypted message digest. Explained with diagram below.





After receiving the pack (A and C). The receiver decrypts C (encypted hash) with his PUBLIC key. (Remember anything encrypted with PRIVATE key can be decrypted by its corresponding PUBLIC key and vice-versa).
If the decryption is successful then the authenticity of the sender is established as ONLY the SENDER had the private key.
Then the receiver hashes the original message and compares it with the decrypted hash (above step). If they are same it means the message is not tampered. Hence integrity is also established.


In the above process C (Hash encypted with PVK) is called the DIGITAL SIGNATURE.

No comments:

Post a Comment