extra unit 2

8
Encryption and Encryption and digital signature digital signature

Upload: sheetal-verma

Post on 23-Dec-2014

56 views

Category:

Technology


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Extra unit 2

Encryption and digital Encryption and digital signaturesignature

Page 2: Extra unit 2

Encrypting a DocumentEncrypting a Document To use a digital signature or encryption you To use a digital signature or encryption you

must have a digital id also known as a digital must have a digital id also known as a digital certificate.  A digital id/digital certificate used to certificate.  A digital id/digital certificate used to do two things.  First, it can be used to do email do two things.  First, it can be used to do email encryption or encrypt files so that they can only encryption or encrypt files so that they can only be read by the person they are intended for. be read by the person they are intended for.  Second, it can be used to “sign” or place a  Second, it can be used to “sign” or place a digital signature on a document to guarantee digital signature on a document to guarantee that it arrives in the same state it was originally that it arrives in the same state it was originally sent and no one has added or changed things.sent and no one has added or changed things.

Page 3: Extra unit 2

A digital id or digital certificate consists of A digital id or digital certificate consists of a a publicpublic and  and privateprivate key.  Your public key is shared  key.  Your public key is shared with everyone.  Your private key is kept private. with everyone.  Your private key is kept private.  These keys are text documents full of what appears  These keys are text documents full of what appears to be random numbers and letters, but with the proper to be random numbers and letters, but with the proper algorithm, these numbers and letters have a very algorithm, these numbers and letters have a very unique property. unique property.

If you take a document and run it through an algorithm If you take a document and run it through an algorithm with your public key, you get back an encrypted with your public key, you get back an encrypted document or an encrypted email. document or an encrypted email.

Page 4: Extra unit 2

Once it is encrypted, the public key can’t be used to Once it is encrypted, the public key can’t be used to decrypt the document. The process is one way so it decrypt the document. The process is one way so it doesn’t matter if other people have the public key, doesn’t matter if other people have the public key, they can’t read the document. they can’t read the document.

To decrypt the document you must have the private To decrypt the document you must have the private key.  If you give the encrypted document to an key.  If you give the encrypted document to an algorithm with the private key, you will get back the algorithm with the private key, you will get back the original document. original document.

Page 5: Extra unit 2

An encrypted document does three things.An encrypted document does three things. It guarantees that the document was actually sent It guarantees that the document was actually sent

by the sender.by the sender. It guarantees that the document wasn’t modified It guarantees that the document wasn’t modified

in route.in route. It guarantees that no one else can read the It guarantees that no one else can read the

document.document.

Digital signature on it guarantees who sent it and Digital signature on it guarantees who sent it and that it wasn’t modified. that it wasn’t modified.

Page 6: Extra unit 2

Basic Concepts Related to Digital SignaturesBasic Concepts Related to Digital Signatures

When transferring important documents When transferring important documents electronically, it is often necessary to certify in electronically, it is often necessary to certify in a reliable way who is actually the sender a reliable way who is actually the sender (author) of a given document. One approach for (author) of a given document. One approach for certifying the origin of documents and files is certifying the origin of documents and files is by using the so-called digital signature by using the so-called digital signature (electronic signature).(electronic signature).

The digital signing of documents uses public The digital signing of documents uses public key cryptography as a mathematical base.key cryptography as a mathematical base.

Page 7: Extra unit 2

Creating a digital signatureCreating a digital signature

Page 8: Extra unit 2