当前位置:网站首页>Discussion and generation of digital signature and analysis of its advantages
Discussion and generation of digital signature and analysis of its advantages
2022-06-26 17:50:00 【lmn_】
0x01 Overview of digital signatures
digital signature ( Public key digital signature ) Only the sender of information can produce a digital string that others can't forge , Is a scheme for verifying the authenticity of digital messages or documents , This digital string is also an effective proof of the authenticity of the information sent by the sender .
A valid digital signature that meets the prerequisites assures the recipient that the message was created by a known sender , Provides the authenticity of the information , And the message has not been changed during transmission , Provides information integrity .
Digital signature can also be called electronic signature , But pay attention to : Not all electronic signatures are called digital signatures .
Digital signatures are a standard element of most cryptographic protocol suites , Commonly used for software distribution 、 financial transactions 、 Contract management software , And other situations requiring detection of forgery or tampering .
Digital signature is usually used to implement electronic signature , This includes any electronic data with the intention of signing , But not all electronic signatures use digital signatures . Electronic signature has legal significance in some countries , Including Canada 、 South Africa 、 The United States 、 Algeria 、 Turkey 、 India 、 Brazil 、 Indonesia 、 Mexico 、 Saudi Arabia 、 Uruguay 、 Switzerland 、 Chile and EU countries .
0x02 Digital signature generation
The generation of digital signature is divided into three mechanisms , The first is the key generation algorithm , Generate a private key randomly in a group of private keys ; Signature algorithm , Used to generate a signature when the output private key and the message being signed ; Last , Signature verification algorithm , The algorithm checks the authenticity of the verification message together with the signature and public key .
All digital signatures are electronic , But not all electronic signatures are digital .
Digital signature just encrypts the data of the document to make it more secure , There are also a wider range of file types for colleague digital signatures , for example : video 、 voice 、 Music, etc .
0x03 Security functions and methods used in digital signature
- Personal identification number (PIN)、 Password and code : Used to verify and verify the identity of signers and approve their signatures .
- Asymmetric cryptography : Adopt the public key algorithm including private key and public key encryption and authentication .
- The checksum : A long string of letters and numbers , Represents the sum of correct numbers in a piece of numeric data , They can be compared to detect errors or changes . Checksums act as data fingerprints .
- Cyclic redundancy check (CRC): Error detection codes and verification functions for detecting changes in raw data in digital networks and storage devices .
- Certification authority (CA) verification :CA By accepting 、 authentication 、 Issue and maintain digital certificates to publish digital signatures and act as trusted third parties .
- Trust the service provider (TSP) verification :TSP It is an individual or legal entity that performs digital signature verification on behalf of the company and provides a signature verification report .
0x04 The advantages of digital signature
- Time stamp : By providing digitally signed data and time , Timestamps are very useful when time is critical , For example, stock trading 、 Lottery issuance and legal proceedings .
- Global acceptance and legal compliance : Public key infrastructure (PKI) Standards ensure that vendor generated keys are securely created and stored . Due to international standards , More and more countries accept that digital signatures are legally binding .
- Save time : Digital signatures simplify time-consuming physical document signatures 、 Storage and exchange procedures , Enable organizations to quickly access and sign documents .
- Cost savings : Organizations can be paperless , And save time previously spent on physical resources and on managing and transporting those resources 、 Funds for people and office space .
- traceability : Digital signatures create an audit trail , Make it easier to keep internal records . Because all content is digitally recorded and stored , The chance of manual signers or recorders making mistakes or misplacing is reduced .
References: https://blog.signaturit.com/en/what-is-a-digital-signature https://www.techtarget.com/searchsecurity/definition/digital-signature
边栏推荐
- Vscode usage - Remote SSH configuration description
- Number of solutions for knapsack problem
- 数字签名论述及生成与优点分析
- 【Unity】在Unity中使用C#执行外部文件,如.exe或者.bat
- 【万字总结】以终为始,详细分析高考志愿该怎么填
- 无需人工先验!港大&同济&LunarAI&旷视提出基于语义分组的自监督视觉表征学习,显著提升目标检测、实例分割和语义分割任务!
- 我想知道,我在肇庆,到哪里开户比较好?网上开户是否安全么?
- 股票开账户如何优惠开户?现在在线开户安全么?
- Live broadcast preview | how can programmers improve R & D efficiency? On the evening of June 21, the video number and station B will broadcast live at the same time. See you or leave!
- MySQL add column failed because there was data before, not null by default
猜你喜欢
Microservice architecture practice: business management background and SSO design: SSO design
LeetCode——226. 翻转二叉树(BFS)
丰富专业化产品线, 江铃福特领睿·极境版上市
Viewing the task arrangement ability of monorepo tool from turborepo
MySql 导出数据库中的全部表索引
Concurrent thread safety
#25class的类继承
Romance of the Three Kingdoms: responsibility chain model
Synchronized description of concurrency
transforms.RandomCrop()的输入只能是PIL image 不能是tensor
随机推荐
你好,现在网上股票开户买股票安全吗?
RSA加密解密详解
Halcon's region: features of multiple regions (5)
Prometeus 2.34.0 新特性
[npoi] C copy sheet template across workbooks to export Excel
Play with Linux and easily install and configure MySQL
Use FST JSON to automatically generate faster JSON serialization methods
The difference between round and truncate in SQL (round or truncate)
【NPOI】C#跨工作薄复制Sheet模板导出Excel
Tencent qianzhiming: Exploration and application of pre training methods in information flow business
10 cloud security best practices that enterprises need to know
贝叶斯网络详解
【uniapp】uniapp手机端使用uni.navigateBack失效问题解决
宝藏又小众的CTA动画素材素材网站分享
The latest masterpiece of Alibaba, which took 182 days to produce 1015 pages of distributed full stack manual, is so delicious
KDD 2022 | how to use comparative learning in cross domain recommendation?
Viewing the task arrangement ability of monorepo tool from turborepo
数据加密标准(DES)概念及工作原理
并发之Synchronized说明
Number of solutions for knapsack problem