Security in Computer Networks

8.4.1 Generating Digital Signatures

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

Suppose that you want to digitally sign a document, m.  We can think of the document as a file or a message that you are going to sign and send.  to sign this document, you simply use your private key, k-B, to compute K-B(m).  It might seem odd that you are using your provate key to sign a document.  Recall that encryption and decryption are nothing more than a mathematical operation and recall that your goal is not to scramble or obscure the contents of the document, but rather to sign the document in a manner that is verifiable, nonforgeable, and nonrepudible.  You have the document, m, and your digital signature of the document is K-B(m).

kurose_320719_c08f14.gif