In the real world, usually to solve this problem use "signature" as proof of authentication (authenticity) identification of a person. In the virtual world, offered a concept that is named as "Digital Signature" or a digital signature (Kosiur, 1997). The principle of implementing a digital signature system is as described below.
In contrast to the method "public-key encryption" which technically requires a relatively long time to do the encryption (random coding) of a document, the digital signature system, a document that is sent is not encrypted using the public key (public key).Source: David Kosiur, 1997.The document is encoded using a mathematical function called "Hash Function". Using Hash Function type 16 bytes, then the long text that will be expressed in 16 fruit characters, such as: CBBV235ndsAG3D67 named as a "message digest". The sender then by using his personal code (private key) to encrypt a message digest, and the result is a digital signature (digital signature) from the sender. Digital signature is then combined with the existing text (original document) to then be sent over the Internet.
On the receiving party will be held a series of authentication processes. The first process is to separate the original documents with digital signatures attached to them. The second process is to re-enact the Hash Function against the original document to obtain the 16 character message digest. The third process is to perform the decryption process of the digital signature using public key (public key) from the sender. The next process is to compare or mengkomparasikan 16 character message digest results Hash Function and decryption activity. If the two message digests are identical, then the document and digital signature received is authentic, comes from the person in question and no unauthorized intervention in the course of transmission. Conversely, if it turns out the second message digest is not the same, meaning there are three possibilities occur:• Documents submitted has undergone changes in terms of content;• Digital Signature that was sent has been modified, or• Both have been amended so it is not the same as the original.
Of course these changes can occur due to intentional or not. Intentional in the sense of the word that someone or other parties who attempt to change or falsify documents digital signature; accident within the meaning of the word is possible "damage" Technically, both hardware and software, along the transmission medium so that there is a change of data sent. The only problem of this authentication method is sending the original documents without having to do the encryption (as it is considered slow, especially if the document contains a very long text). But the concept of "pareto" can be used, within the meaning of applying the assumption that 80% of communication is "safe." If what happened with "intervention" in the transmission line, the second alternative is the use of "symmetric encryption" or "public-key encryption" can be used as an alternative.
1 comments:
Thanks a lot for explaining the cryptography mechanism that is used in the creation of digital signatures. You have explained the overall concept so nicely that a pro can easily understand it after reading the article.
electronic signatures
Post a Comment