Lecture 8 - Class Notes October 2nd, 2008 Digital...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Class Notes October 2 nd , 2008 Digital Signatures – Helpful to do things like signing a computerized check. Find a protocol that can be used to replace a real (i.e. physical signature). When we sign a check, what do we want? 1. A tangible object that finalizes a transaction 2. Signature confirms the authenticity of this object 3. In case of doubt, a third party can be called in to confirm whether or not the signature is authentic 4. Each signature can only be used once 5. Check is non-alterable A digital signature should have the same properties as a real signature. Mostly want the two primary conditions: the signature should not be forgeable (nobody else should be able to produce this). S(P,M) where S=signature, P=identity, M=message. The signature must be authentic. If bob receives (M, S(P,M)) , Bob must be able to verify that it came from Alice if P=Alice. Two desirable properties: signature is not alterable, signature is not reusable. Public key cryptography is ideally suited for this situation: E-encryption is a privacy/secrecy
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 2

Lecture 8 - Class Notes October 2nd, 2008 Digital...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online