Digital Signatures and Digital Certificates

Computer Science
8 Apr 201911:22

Summary

TLDRThis script explains digital signatures using the concept of asymmetric key cryptography. It illustrates the process of creating a hash value using SHA-256, encrypting it with the sender's private key, and embedding it in the document. The recipient uses the sender's public key to decrypt and verify the hash, ensuring document integrity. The script also introduces digital certificates, issued by certification authorities, to authenticate the sender's identity, making digital signatures legally binding and crucial for secure online transactions.

Takeaways

  • 🔐 Digital signatures use asymmetric key cryptography, where a pair of mathematically related keys is used for encryption and decryption.
  • 🔑 Asymmetric keys consist of a public key for encryption and a private key for decryption, ensuring that only the intended recipient can decrypt the message.
  • 💼 The public key can be shared openly without compromising security, while the private key must remain confidential.
  • 📜 Digital signatures are essential for verifying the authenticity and integrity of documents, ensuring they have not been tampered with.
  • 🖋️ A digital signature involves creating a hash of the document using an algorithm like SHA-256, which is then encrypted with the sender's private key.
  • 🗂️ The encrypted hash (digital signature) is embedded in the document, which can then be sent to the recipient.
  • 🔄 Upon receipt, the recipient uses the sender's public key to decrypt the hash and recalculates the hash from the document's content to verify its integrity.
  • 🛡️ Digital certificates, issued by trusted certification authorities, vouch for the sender's identity and contain a public key, adding a layer of trust to digital signatures.
  • 🏦 The Electronic Communications Act of 2000 in the UK made digital signatures legally binding, facilitating secure online transactions and the rise of cryptocurrencies.
  • 🌐 Cryptocurrencies like Bitcoin rely on digital signatures for secure transactions, where the list of transactions is updated and verified through cryptographic means.

Q & A

  • What is the fundamental concept behind symmetric key cryptography?

    -Symmetric key cryptography uses a single key for both encryption and decryption. The same key must be kept secret and shared between the communicating parties.

  • How does asymmetric key cryptography differ from symmetric key cryptography?

    -Asymmetric key cryptography uses a pair of mathematically related keys: a public key for encryption and a private key for decryption. The public key can be shared openly, while the private key must be kept secret.

  • Why is it crucial that the private key in asymmetric cryptography is kept secret?

    -The private key must be kept secret because if it falls into the wrong hands, anyone could decrypt messages intended for the key owner, compromising the security of the communication.

  • What role does the public key play in the process of digital signatures?

    -In digital signatures, the public key is used to verify the authenticity of the signature. It can decrypt the hash value that was encrypted with the sender's private key, ensuring that the document was indeed sent by the claimed sender.

  • Why are digital signatures necessary in digital communication?

    -Digital signatures are necessary to ensure the authenticity and integrity of a document. They provide proof that the document was sent by the claimed sender and has not been altered since it was signed.

  • How does the hashing process using SHA-256 contribute to the security of digital signatures?

    -SHA-256 contributes to the security of digital signatures by creating a unique hash value from the document's content. Any change in the document would result in a different hash value, thus detecting tampering.

  • What is a digital certificate and what is its purpose in the context of digital signatures?

    -A digital certificate is a file issued by a certification authority that contains the public key of the certificate holder along with other identifying information. Its purpose is to guarantee the identity of the public key owner, thus enhancing the trust in digital signatures.

  • How does a certification authority verify the identity of an individual applying for a digital certificate?

    -A certification authority verifies the identity of an individual by requiring them to provide various details about themselves during the application process. The authority then checks these details to confirm the applicant's identity.

  • What is the Electronic Communications Act, and how does it relate to digital signatures?

    -The Electronic Communications Act is a UK law passed in 2000 that made digital signatures legally binding. This legislation has allowed businesses to conduct transactions and sign agreements digitally with the same legal force as handwritten signatures.

  • How do digital signatures contribute to the security of cryptocurrencies?

    -Digital signatures are fundamental to the security of cryptocurrencies as they ensure the authenticity of transactions. They verify that transactions come from the rightful owner of the cryptocurrency and have not been tampered with.

Outlines

00:00

🔐 Asymmetric Key Cryptography and Digital Signatures

This paragraph introduces the concept of digital signatures and their reliance on asymmetric key cryptography. It explains the process of encryption and decryption using a pair of mathematically related keys, where one key encrypts the message and the other decrypts it. The example of Albert and Sheila illustrates how one person can send a secret message to another using public and private keys. The paragraph also discusses the importance of asymmetric keys in digital signatures, where the choice of which key is public or private is flexible, enabling the creation of a digital signature. It sets the stage for understanding why digital signatures are necessary by presenting a scenario where Carol and Bob have a dispute over a contract, highlighting the need for a secure and verifiable way to prove the authenticity of documents.

05:04

📜 The Process of Digital Signatures

This paragraph delves into the technical process of creating a digital signature. It explains how a document's content is hashed using an algorithm like SHA-256 to create a unique digest or hash value. This hash value is then encrypted with the sender's private key to form the digital signature, which is embedded in the document. The recipient can decrypt this signature using the sender's public key to verify its origin. The paragraph also emphasizes the importance of digital certificates, which are issued by trusted certification authorities to guarantee the sender's identity and the authenticity of the public key. It discusses how the recipient can use the digital certificate to ensure they are communicating with the correct person, and how the Electronic Communications Act in the UK made digital signatures legally binding, facilitating business transactions online.

10:07

🔏 Summary of Digital Signatures and Certificates

The final paragraph summarizes the key points about digital signatures and certificates. It reiterates that digital signatures use asymmetric key cryptography to ensure the integrity and authenticity of documents. The process involves hashing the document's content to create a digest, encrypting this digest with the sender's private key, and embedding it into the document. The recipient then decrypts the digest using the sender's public key and recalculates the hash to verify the document's integrity. The paragraph also explains the role of digital certificates, which are issued by certification authorities to guarantee the sender's identity and the validity of the public key. It concludes by emphasizing the importance of digital signatures in secure communication and the legal recognition of their binding nature.

Mindmap

Keywords

💡Digital Signatures

Digital signatures are a form of cryptographic technology that ensures the authenticity and integrity of electronic documents. In the video, digital signatures are discussed as a method to verify that a document was sent by a specific person and has not been altered. They are crucial for secure communication and transactions over the internet, as exemplified by the scenario where Jack sends a digitally signed document to Jill, ensuring she can trust its origin and content.

💡Symmetric Key Cryptography

Symmetric key cryptography is a method of secure communication that uses a single key for both encryption and decryption of information. The video script briefly contrasts this with asymmetric key cryptography, highlighting that digital signatures actually rely on the latter. Symmetric key cryptography is not directly used for digital signatures but serves as a foundational concept in understanding the broader field of cryptography.

💡Asymmetric Key Cryptography

Asymmetric key cryptography, also known as public key cryptography, uses a pair of keys: one public and one private. In the video, it is explained that if a message is encrypted with one key, only the other can decrypt it. This property is fundamental to digital signatures, as it allows for the creation of a signature that can be verified by anyone with the public key but can only be created by the holder of the private key.

💡Public Key

The public key in asymmetric cryptography is a key that can be freely distributed and is used to encrypt data or verify a digital signature. In the context of the video, it is mentioned that Sheila could send Albert her public key, which he would use to encrypt a message that only she, with her private key, could decrypt. Similarly, in digital signatures, the public key is used to verify the authenticity of a signed document.

💡Private Key

The private key in asymmetric cryptography is a key that must be kept secret by its owner and is used to decrypt data or create a digital signature. The video script emphasizes the importance of the private key by illustrating a scenario where Bob's actions could be verified by his signed documents. In digital signatures, the private key is used to sign a document, ensuring that only the owner of the corresponding public key can verify it.

💡Hash Function

A hash function, such as SHA-256 mentioned in the video, is an algorithm that takes an input (or 'message') and returns a fixed-size string of bytes, typically a digest that uniquely represents the original input. The video explains that even a minor change in the input results in a completely different hash value, which is crucial for ensuring the integrity of a document in digital signatures.

💡Digital Certificate

A digital certificate is an electronic document used to prove the ownership of a public key. Issued by a trusted third party, it binds the identity of an individual or organization to their public key. In the video, it is explained that Jack can apply for a digital certificate, which includes his public key and is signed by a certification authority, providing a trusted means for Jill to verify that the public key indeed belongs to Jack.

💡Certification Authority (CA)

A certification authority is a trusted entity that issues digital certificates, thereby attesting to the ownership of a public key. The video mentions companies like Verisign, GlobalSign, and Symantec as examples of CAs. They play a critical role in the digital signature process by vouching for the identity of the certificate holder, adding a layer of trust to digital transactions.

💡Cryptographic Hash

A cryptographic hash, created using a hash function, is a unique fixed-size representation of data. The video script uses the term in the context of creating a 'digest' of a document that is then encrypted with the sender's private key to form a digital signature. The hash ensures that any change in the document would result in a different hash, thus detecting tampering.

💡SHA-256

SHA-256, or Secure Hash Algorithm 256, is a cryptographic hash function from the SHA-2 family. The video script describes it as the algorithm most commonly used to create a hash of a document for digital signatures. It is designed to be a one-way process, making it computationally infeasible to reverse-engineer the original document from its hash, ensuring the security of the digital signature.

Highlights

Digital signatures utilize asymmetric key cryptography, which involves a pair of mathematically related keys.

In asymmetric cryptography, one key encrypts data that can only be decrypted by the other key.

A public key can be shared openly, while the private key must be kept secret by its owner.

The choice of which key is public and which is private is flexible in asymmetric cryptography.

Digital signatures are essential for verifying the authenticity and integrity of digital documents.

A hash function like SHA-256 is used to create a unique digest of the document's content.

The hash value changes significantly with even the slightest alteration in the document.

The sender encrypts the hash using their private key to create a digital signature.

The digital signature is embedded in the document, which can then be sent to the recipient.

The recipient uses the sender's public key to decrypt the digital signature.

The recipient also calculates the hash of the received document to verify its integrity.

If the calculated hash matches the decrypted hash, the document is confirmed to be unaltered.

Digital certificates, issued by a trusted certification authority, guarantee the sender's identity.

A digital certificate contains the sender's public key, ensuring the recipient can trust the signature.

The Electronic Communications Act of 2000 in the UK made digital signatures legally binding.

Digital signatures are foundational for secure communication and transactions on the internet.

Cryptocurrencies like Bitcoin rely on digital signatures for secure transactions.

Transcripts

play00:00

digital signatures rely on a symmetric

play00:03

key cryptography so before we talk about

play00:05

digital signatures let's quickly remind

play00:08

ourselves how a symmetric key

play00:09

cryptography

play00:10

works with asymmetric key cryptography

play00:14

there's a pair of mathematically related

play00:17

keys if you encrypt a message with one

play00:20

of the keys than the other key and only

play00:22

the other key can be used to decrypt it

play00:25

this is Albert and this is Sheila if

play00:29

Sheila wants Albert to send her a secret

play00:32

message

play00:32

she needs an asymmetric a pair of keys a

play00:35

computer program can generate these for

play00:38

her she sends Albert a copy of one of

play00:41

the keys and she keeps the other key to

play00:43

herself instead of sending Albert a key

play00:47

she could put a key in a public place

play00:49

for him to go and fetch himself it

play00:51

doesn't matter if someone else gets a

play00:53

copy of the public key Albert uses the

play00:57

public key to encrypt his message when

play01:00

Albert has encrypted the message he

play01:02

sends a Sheila the ciphertext only

play01:05

Sheila can decrypt the ciphertext

play01:08

because only Sheila has the matching key

play01:11

the private key truth be told most

play01:15

people don't need to worry about what's

play01:17

really going on because the whole

play01:19

process is taken care of

play01:20

behind the scenes my programs built into

play01:23

web browsers or email applications but

play01:27

what do asymmetric keys have to do with

play01:30

digital signatures well it so happens

play01:34

that it doesn't matter which one of the

play01:36

pair of keys is made public and which

play01:39

one is kept private if you encrypt a

play01:42

message with either one than the other

play01:44

and only the other can be used to

play01:46

decrypt it as long as she doesn't change

play01:49

her mind later

play01:51

Sheila can decide which one of the keys

play01:53

will be private and which one will be

play01:55

public this is the crucial feature of

play01:59

asymmetric key cryptography that makes

play02:02

digital signatures possible now let's

play02:05

think about why we even need digital

play02:08

signatures

play02:10

this is Carol and this is Bob Bob's

play02:13

builder carol has a leaky roof and she

play02:17

asks Bob to fix it

play02:18

Carol agrees to pay Bob a thousand

play02:21

pounds to fix her roof Bob agrees to

play02:24

start work on Monday and have it

play02:26

finished by Wednesday

play02:27

Carol writes details of the agreement on

play02:30

a piece of paper and she signs it and

play02:32

she sends it to Bob in the post no

play02:35

computers here Bob signs the piece of

play02:38

paper and sends a copy back to Carol in

play02:41

the post Carol sends Bob the money bob

play02:46

writes a note to carol to say he's got

play02:48

the money he signs this receipt and he

play02:51

sends it to Carol in the post on Monday

play02:54

Bob doesn't turn up he's gone on holiday

play02:57

for a week to spend the money on

play03:00

Thursday it rains all day and all of

play03:03

Carol's furniture is destroyed poor

play03:05

Carol Carol says it's Bob's fault but

play03:09

Bob denies ever having agreed to do the

play03:11

work Carol takes Bob to court the judge

play03:15

looks at the contract and the receipt

play03:17

which Bob signed Bob is ordered to pay

play03:20

the money back to Carol and to give her

play03:22

some more money for new furniture and

play03:24

Bob is sent to jail where he belongs

play03:29

once upon a time not so long ago if you

play03:33

wanted proof that a document was sent to

play03:35

you by a particular person

play03:37

it needed a handwritten signature on it

play03:39

only written signatures were legally

play03:43

binding but these days it's possible to

play03:47

put a digital signature on a document

play03:49

this is Jack and this is Jill Jack wants

play03:54

to send a document to Jill by email no

play03:58

paper this time now let's be clear

play04:01

there's nothing secret about the

play04:03

document neither of them care if

play04:05

somebody else reads it Jill just wants

play04:08

to be sure that it definitely came from

play04:10

Jack and that nobody else has made any

play04:12

changes to it on the way before his

play04:16

document is sent some software on Jack's

play04:19

computer prepares the digital signature

play04:22

the purpose of this software is to

play04:25

create something called a hash of the

play04:27

document these days most computers do

play04:31

this using an algorithm called sha-256

play04:34

which was invented by the USA's National

play04:36

Security Agency sha-256 takes a copy of

play04:41

the document text and subjects it to a

play04:44

sequence of complex mathematical

play04:46

calculations and other transformations

play04:49

remember as far as the computer is

play04:51

concerned the document consists of

play04:53

binary ones and zeros the result is

play04:57

called a hash value it's also referred

play04:59

to as a digest of the document the

play05:04

hashing process has been designed so

play05:06

that even the tiniest difference in the

play05:08

original document would result in a

play05:10

completely different hash value this

play05:14

part of the signing process is not

play05:17

encryption because the transformations

play05:19

done by sha-256

play05:21

are practically impossible to reverse

play05:24

you can't take a hash value and use it

play05:27

to work out what was in the original

play05:28

document like baking a cake hashing is a

play05:33

one-way process but if you were to apply

play05:37

the same process to the same document

play05:39

you would get exactly the same hash some

play05:44

software on Jack's computer now encrypts

play05:47

the hash using Jack's private key and

play05:50

the encrypted hash is embedded in the

play05:54

original document the document now has a

play05:57

digital signature Jack sends Jill a copy

play06:02

of the signed document he also sends her

play06:05

a copy of the public key alternatively

play06:08

he can put the public key on a website

play06:10

for Jill to go and fetch Jill's computer

play06:13

decrypt the digital signature using

play06:16

Jack's public key if she can decrypt it

play06:19

she knows it came from jack Jill's

play06:24

computer then uses sha-256 to calculate

play06:28

the hash value again using the text of

play06:30

the document if the hash value that

play06:33

Jill's computer calculates

play06:36

the same as the hash value that was sent

play06:37

by Jack she can be pretty sure that it

play06:40

hasn't been tampered with since it was

play06:42

created remember Jack and Jill really

play06:46

don't care if someone else has seen the

play06:48

signed document it's not a secret and it

play06:52

doesn't matter if someone else gets a

play06:54

hold of Jack's public key Jill simply

play06:57

wants to be sure that the document was

play06:59

sent by Jack of course anyone else could

play07:06

have been pretending to be jack from the

play07:08

start a criminal could create a fake

play07:11

document hash it with sha-256 and

play07:14

generate an asymmetric pair of keys

play07:16

using their computer so how can Jill be

play07:20

really sure that she's communicating

play07:23

with jack well that's where digital

play07:27

certificates come in for a fee Jack can

play07:31

apply for a digital certificate to a

play07:34

well known and well trusted organization

play07:37

called a certification Authority

play07:41

certification authorities include

play07:43

companies like Verisign global sign and

play07:46

Symantec to name but a few as part of

play07:50

the application process

play07:52

Jack's computer generates an asymmetric

play07:54

pair of keys and he sends the public key

play07:57

to the certification Authority along

play08:00

with various details about himself

play08:02

the certification Authority carefully

play08:05

checks that Jack is who he says he is

play08:08

then they send them a special type of

play08:11

file called a digital certificate this

play08:15

contains details about Jack along with

play08:18

information about the certification

play08:19

Authority and an expiry date bound to

play08:24

this digital certificate is jack's

play08:26

public key jack still has the

play08:30

corresponding private key which never

play08:32

left his computer Jack must of course

play08:34

keep his private key safe so now when

play08:38

Jack sends a signed document to Jill he

play08:42

can also send her a copy of the whole

play08:44

certificate or put it in a public place

play08:46

for her to go and get

play08:49

this means that when Jill wants to

play08:51

decrypt something that Jack is encrypted

play08:53

she can inspect this certificate first

play08:56

and if she's happy to trust it she can

play08:59

use the public key within the public key

play09:02

that has been guaranteed by the

play09:04

certification authority to belong to

play09:06

Jack

play09:08

essentially the certification authority

play09:10

is vouching for Jack

play09:15

needless to say applying to a

play09:17

certification Authority for a digital

play09:19

certificate is itself a very secure

play09:22

process anything the certification

play09:25

authority sent to Jack was digitally

play09:28

signed by them using their own digital

play09:31

certificate and this was provided by an

play09:34

even higher certification authority in

play09:38

the year 2000 a law was passed in the UK

play09:42

called the Electronic Communications Act

play09:45

this law made digital signatures legally

play09:48

binding and this has allowed businesses

play09:51

to thrive on the web since then we've

play09:54

seen the rise of crypto currencies like

play09:57

a Bitcoin a cryptocurrency is

play09:59

fundamentally a secure list of who paid

play10:02

who how much updating this list depends

play10:06

on digital signatures to summarize

play10:13

digital signatures rely on a symmetric

play10:17

key cryptography a documents contents

play10:20

are hashed to create a digest for

play10:23

example using sha-256 the digest is

play10:28

encrypted by the sender using their

play10:30

private key the digest is then embedded

play10:35

in the document which can be sent the

play10:40

recipient decrypt the digest using the

play10:43

sender's public key the recipient also

play10:48

calculates a hash from the documents

play10:50

contents using the same hash algorithm

play10:52

if the recalculated digest matches the

play10:56

decrypted digest it can be assumed that

play10:59

the document hasn't been tampered with

play11:01

since it was sent a digital certificate

play11:05

is issued by a certification Authority

play11:08

which guarantees the sender's identity

play11:11

the digital certificate contains a

play11:14

public key along with other information

play11:16

about the sender and an expiry date

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
Digital SignaturesCryptographyAsymmetric KeysSecure MessagingHash AlgorithmsSHA-256Certification AuthorityLegal BindingCybersecurityData Integrity
¿Necesitas un resumen en inglés?