Skip Ribbon Commands
Skip to main content

Hỏi đáp

:

DanhSachCauHoi: The Working Principle of A Digital Signature Certificate

Title

The Working Principle of A Digital Signature Certificate

HDNguoiHoi

 

HDEmail

 

HDDienThoai

 

HDDiaChi

 

HDNgayHoi

11/5/2020 3:00 PM

HDNoiDung

There are dependable software functions and merchandise obtainable that generate chữ ký số merging both digital technologies with electronic graphical signatures of their handwritten signatures. This is both safe and is definitely deployed. The process is predicated on the 'Public Key Infrastructure' trade normal - or putting it technically asymmetric cryptography. In a PKI system, user is assigned a key pair that includes a non-public and a public key. These keys are used for encrypting/decrypting document data primarily for digitally signing an digital doc and for verification of the owner's signature. This personal secret is kept exclusively with the document proprietor and stored in full confidentially, therefore sustaining safety of the data.

This digital technology makes use of a cryptographic function, "hashing" which is used for producing and authenticating the signature. The 'hash' perform uses an algorithm to provide a digital 'fingerprint', or encoded message. This encrypted message is technically distinctive to the signing parties in addition to the document. This gives the assure that the person signing it's indeed the originator of the document. This way, the doc can't be reused, re-printed or assigned to someone else, as soon as signed by the originator. It's just like 'locking' the doc with a protecting seal. Any modifications, if made to the doc after signing it utilizing this digital process, are considered unlawful or 'forged', hence invalidating the signatures hereafter.

How digital signatures work

Digital signatures are created and verified by using public key cryptography, also called asymmetric cryptography. By using a public key algorithm, corresponding to RSA, one can generate two keys that are mathematically linked- one is a personal key, and another is a public key.

The person who's creating the digital signature makes use of their own private key to encrypt the signature-related doc. There is just one approach to decrypt that document is with using signer's public key.

This know-how requires all the parties to belief that the individual who creates the signature has been able to keep their non-public key secret. If somebody has access the signer's private key, there is a chance that they might create fraudulent signatures within the name of the personal key holder.

The steps that are adopted in creating a digital signature are:

    Select a file to be digitally signed.
    The hash worth of the message or file content is calculated. This message or file content is encrypted by using a private key of a sender to form the digital signature.
    Now, the original message or file content material together with the digital signature is transmitted.
    The receiver decrypts the digital signature by utilizing a public key of a sender.
    The receiver now has the message or file content material and may compute it.
    Comparing these computed message or file content material with the unique computed message. The comparison needs to be the identical for ensuring integrity.

Digital Signature Authentication Service of viettel-ca is highly safe and provide easy resolution for companies. Trusted Vietnam chữ ký số viettel certificates allows many businesses to be secure and shield data while buying and selling over internet.



HDHienThi

Yes

HDCauHoiChuY

No

HDCoQuan

 

HDCoQuanTiepNhan

 

HDDanhMuc

 
Approval Status Pending
 

Attachments

Content Type: Câu hỏi
Created at 11/5/2020 2:26 PM by  
Last modified at 11/5/2020 2:26 PM by