encryption and digital signature

encryption and digital signature - Public Key Encryption...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Public Key Encryption and digital signature How do they work? Prepared by : Marcel Aumont, Senior Technology Consultant, CGI Table of contents Table of contents ..............................................................................................................................................................2 List of figures.....................................................................................................................................................................2 1 Introduction....................................................................................................................................................................3 2 Public-key, what it is ......................................................................................................................................................4 2.1 A definition..............................................................................................................................................................4 2.2 Encryption and Decryption...................................................................................................................................4 2.3 Digital Signature and Verification.........................................................................................................................5 2.4 Beyond the principles ............................................................................................................................................6 2.4.1 Steps for signing and encrypting a message..............................................................................................7 2.4.2 Steps for Decrypting and verifying the signature of a message..............................................................9 2.5 Identity and keys..................................................................................................................................................10 3 What is a Certificate.....................................................................................................................................................10 3.1 Certificate validation added to the process......................................................................................................10 3.2 Beyond the mechanics.........................................................................................................................................12 4 What is a PKI................................................................................................................................................................12 4.1 Key and certificate management.........................................................................................................................12 4.2 Support for non repudiation of digital signature .............................................................................................13 5 In conclusion................................................................................................................................................................13 5 In conclusion....
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Page1 / 14

encryption and digital signature - Public Key Encryption...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online