NETWORK SECURITY
DIGITAL SIGNATURE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]


Sender’s Private key


Sender’s Public key


Receiver’s Private key


Receiver’s Public key

Detailed explanation1: Digital signatures work through public key cryptography’s two mutually authenticating cryptographic keys. For encryption and decryption, the person who creates the digital signature uses a private key to encrypt signaturerelated data. The only way to decrypt that data is with the signer’s public key.
Detailed explanation2: A digital certificate is an electronic document issued by a Certificate Authority (CA). It contains the public key for a digital signature and specifies the identity associated with the key, such as the name of an organization. The certificate is used to confirm that the public key belongs to the specific organization.
Detailed explanation3: Decrypts the signature (2) with the public key to obtain a message, supposedly the same message as (1) but we don’t know yet. Encrypt the original message (1) with the public key to obtain a hash. Encrypt the decrypted message (3) to get a second hash and compare to (4) to verify that they are identical. 15Aug2013