Professional Documents
Culture Documents
Presentation
Public-Key Cryptography
Use separate keys to encrypt and decrypt
– First proposed by Diffie and Hellman
– Independently proposed by Merkle (1976)
Main Applications:
– Encryption
– Authentication (Digital Signature)
Digital Signatures
It is a type of asymmetric cryptography used to simulate
the security properties of a signature rather than signature
form.
It has two algorithms-one for signing it involves the user’s
secret or private key ,and one for verifying signature
involves the user’s public key.
Digital Signature Certificate can be presented
electronically to prove your identity, to access information
or services on the Internet or to sign certain documents
digitally.
Public-Key Digital Signature
Same as authentication
– The sender encrypts a message with his own private key
– The receiver, by decrypting, verifies key possession
Uses
Digital signatures are a standard element of
most cryptographic protocol suites, and are
commonly used for software distribution, financial
transactions, contract management software, and
in other cases where it is important to detect
forgery or tampering.
Digital signature
How digital signature works?