Digital Signatures and PKI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

flashcard set

Earn XP

Description and Tags

Digital Signatures and Public Key Infrastructure

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

digital signature process 1

sender computes a cryptographic hash of the message

2
New cards

digital signature process 2

sender encrypts the cryptographic hash with their private key to produce a digital signature

3
New cards

digital signature process 3

the receiver can use the sender’s public key to decrypt the hash, recompute it and check that it matches

4
New cards

how does this provide authenticity?

assuming the sender’s private key is secret, the signature can only have been computed by them

5
New cards

cryptographic hash examples

SHA256, MD5

6
New cards

PKI process 1

a certificate authority (CA) verifies the identity of the receiver

7
New cards

PKI process 2

CA digitally signs the receiver’s public key

8
New cards

PKI process 3

the receiver’s public key and CA’s digital signature are sent to the sender

9
New cards

how does this provide identity?

the digital signature is verified and if the sender trusts the CA then they by default trust that the receiver’s public key belongs to the receiver