Skip to content

Digital Signing

Posted on:August 19, 2023 at 10:24 PM

Asymmetric encryption

Private Key - Public Key

Vice versa

Digital Signature

Untitled.png

Purpose: Help Bob to identify that if this message is from Amy.

Untitled.png

  1. Amy shares her public key in person to Bob
    1. Bob can trust that this public key must belong to Amy
  2. Amy wants to send message to Bob, so she encrypts this message(so called Digital Signature), combines this message with digital sign together, and sents it to Bob
  3. Bob receives message, use Amy’s public key to de-encrypt digital sign, and compare it with plaintext part of message. If match, Bob can be sure that this message is from Amy

Certificate

From 1.a, asking for trusted public key is tedious and really frustrating. Is this trusted relationship transitive?

If

Think again about the effects of Digital Signature

  1. you can trust the sender
  2. you can trust the content

Untitled.png

If Amy wants to send message to Cella and let her trust it.

  1. Amy ask Bob to sign her identical information and public key(so called Certificate).
    1. “I am Amy, this is my public key: xxxxx”
  2. Amy send certificate from Bob to Cella
  3. Cella receive message, de-encrypted Certificate with Bob’s public key
    1. This Certificate is from Bob
    2. Bob give me the public key of Amy(certificate content)
  4. Amy send Hello message plaintext, Hello message encrypted by Amy’s private key(Digital Signature) to Cella
  5. Cella de-encrypted Amy’s Hello message with Amy’s public key, and compare it with plaintext part of Hello message. If match, then this message is from Amy.

From now on, Cella build a trust relationship with Amy

Certificate Authority

Untitled.png

In reality, every PC has originally trusted Root CA since it installed the operation system. Hence it trust every other subject that Root CA trusts.

This relationship can be transmitive to others…