Question

In: Computer Science

3. When signing and verifying a plaintext document electronically using digital signatures, describe the function of...

3. When signing and verifying a plaintext document electronically using digital signatures, describe the function of the message digest or hash function in this process. Describe also how the X.509 Digital Certificate and the chain of trust concept could be related to digital signatures.

Solutions

Expert Solution

Digital signatures are used for message authentication in digital world like handwritten sign in physical world.

A) Message digest function

Hash function is the key element in cryptographic procedures. It take some input and produce a small number shorter than the input. A message digest is also a hsh function. If we are giving same input, it always produce the same output. The key features of message digest is

1) message digest algorithm cannot be reversd

2) small change in input result variation of the output

How to use message digest

* publish your document with message digest

* if we want to check the integrity of our document, download it from Internet and recalculate the message digest.

*compare it with original message digest

*if both are. Matching you got the same document as original

B) x509 certificate

It is a digital certificate accepted by international X509 public key infrastructure. It possess information about the identity which a certificate is issues it. It include the following fields

Version

Serial number

Algorithm information

Issuer name

Validity period

Name of the identity the certificate is issued to

Public key

Extension

C) Chain of trust concept

The chain of trust concept is used to verify the receivers that sender and all intermediate are genuine. It prove that a particular certificate originate from a trusted source. It consist of

1)root certificate

2)intermediate certificate

3)server certificate


Related Solutions

In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public...
In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption.mathematics behind the technology, what are the major recognized authorities, and the likely future for this technology/business practice. Include digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption. Please type A. Describe how its use in large companies B Compare the laws USA and other countries
in original words, please. In 800 words describe the digital signatures and certifying authorities including their...
in original words, please. In 800 words describe the digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption.mathematics behind the technology, what are the major recognized authorities, and the likely future for this technology/business practice. Include digital signatures and certifying authorities including their relation to RSA Public and Private Key encryption. Please type A. Describe how its use in large companies B Compare the laws USA and other countries
Using the table function in a Microsoft Word Document, create a table which compares and contrasts...
Using the table function in a Microsoft Word Document, create a table which compares and contrasts the following payments systems: 1. RBRVS 2. RUG’S 3. APC’s Include in your comparison include at least the following elements Classification system(s) used (ICD-10-CM, ICD-10-PCS, CPT, etc.) Health care setting (Inpatient, outpatient, physician office, etc.). Examples of who uses the payment system (Medicare, Medicaid, commercial payers, etc.) Examples of data that is required for the payment system (principle diagnosis, principle procedure, discharge disposition, etc.)
Using the AIDAR model, discuss the value of consumer purchasing behaviour when using digital technology such...
Using the AIDAR model, discuss the value of consumer purchasing behaviour when using digital technology such as social media marketing and further examine how the variants of buying behaviour is likely to impact on the marketing strategies of businesses
In 250 words, describe 3 (three) benefits of using the PMT Function prior to taking out...
In 250 words, describe 3 (three) benefits of using the PMT Function prior to taking out a Loan or Line or Credit
In a 2- to 3-page document, describe an area of cognitive psychology and provide an outline...
In a 2- to 3-page document, describe an area of cognitive psychology and provide an outline of the final paper. Include a bibliography with at least 5 references that can be use.
Design an IIR digital filter based on the bilinear transformation method using the following transfer function...
Design an IIR digital filter based on the bilinear transformation method using the following transfer function as a reference (use three decimal places of precision for your response): H (s) = 5 / (s ^ 2 + 1.1s +5) The digital filter must have a resonant frequency at wr = pi / 3 a) Calculate H (z) b) Find the correctly simplified difference equation of the designed system. c) Implement the discrete system obtained using block diagram.. Show every step
Describe the main components of WSDL document of web service by using the example CardValidator WSDL...
Describe the main components of WSDL document of web service by using the example CardValidator WSDL document
Using examples, explain the three (3) main ways to applying styles to an HTML document.
Using examples, explain the three (3) main ways to applying styles to an HTML document.
describe the 3 structures of a neuron and the function of each part
describe the 3 structures of a neuron and the function of each part
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT