L09. How Does A Pki Ensure Data Confidentiality; L10. What Is A Digital Signature; L11. How Does A Digital Signature Work - ZyXEL Communications ZyWall 35 Support Notes

Zyxel zywall 35: user guide
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 Support Notes

L09. How does a PKI ensure data confidentiality?

Users' public keys are published in an accessible directory. A person wishing to send an encrypted
message uses the recipient's public key to scramble the information in the message. Only the
recipient's private key can decrypt the message.
So, if Bob wants to send a confidential message to Alice, his PKI software finds Alice's public key in
the directory where it is published, and he uses it to encrypt his message. When Alice receives the
encrypted message, she uses her private key to decrypt it. Because Alice keeps her private key secret,
Bob can be assured that, even if his message were to be intercepted, only Alice can read it.

L10. What is a digital signature?

Not to be confused with a digitized signature (a scan of a hand-written signature), a digital signature
can be used with either encrypted or unencrypted messages to confirm the sender's identity and ensure
the recipient that the message content has not been changed in transmission. Digital signatures
incorporate the characteristics of hand-written signatures in that they can only be generated by the
signer, are verifiable, and cannot easily be imitated or repudiated.

L11. How does a digital signature work?

Suppose that the famous Bob and Alice wish to correspond electronically. Bob wants to assure Alice
that he originated the electronic message, and that its contents have not been tampered with. He does
so by signing the message with a digital signature.
When Bob clicks on the digital signature option on his e-mail application, special software applies a
mathematical formula known as a hash function to the message, converting it to a fixed-length string
of characters called a message digest. The digest acts as a "digital fingerprint" of the original message.
330
All contents copyright (c) 2006 ZyXEL Communications Corporation.

Advertisement

Table of Contents
loading

Table of Contents