10
Public Key Encryption 3 Digital Signatures or The Box within a Box

Public Key Encryption 3 Digital Signatures or The Box within a Box

Embed Size (px)

Citation preview

Page 1: Public Key Encryption 3 Digital Signatures or The Box within a Box

Public Key Encryption 3

Digital Signatures

or

The Box within a Box

Page 2: Public Key Encryption 3 Digital Signatures or The Box within a Box

Ken Coder sends Dee a secret message only she can unlock.

Page 3: Public Key Encryption 3 Digital Signatures or The Box within a Box

It could have come from Pre Tender!

Yves Dropper'sevil cousin

Page 4: Public Key Encryption 3 Digital Signatures or The Box within a Box

Ken's idea: Lock with my private key

Page 5: Public Key Encryption 3 Digital Signatures or The Box within a Box

Unlock with my public key: Only I could have sent it!

Page 6: Public Key Encryption 3 Digital Signatures or The Box within a Box

But Pre Tender can still read it.

Page 7: Public Key Encryption 3 Digital Signatures or The Box within a Box

Dee's Idea: Lock your box in a second one using my public key.

Page 8: Public Key Encryption 3 Digital Signatures or The Box within a Box

Only Ken can send it, and only Dee can read it!

Page 9: Public Key Encryption 3 Digital Signatures or The Box within a Box

Digital Signatures

In any public key cryptosystem, one can implement digital signatures.

To send a signed message M from A to B using keys AE, AD, BE, BD:

A sends cyphertext C = BE(AD(M))

B recovers text T = AE(BD(C))

T = AE(BD(BE(AD(M))))

= AE(AD(M))

= MB's

private key

A'sPrivate Key

Page 10: Public Key Encryption 3 Digital Signatures or The Box within a Box

It's the law

Documents with Digital Signatures became legally binding in the United States in the year 2000.