previous | start | next

Digital Signatures

These extend the basic Public Key authentication protocols to documents or messages. The three key objectives are:
 
  1. The receiver can verify the claimed identity of the sender, because only the sender's public key will decrypt it.
     
  2. The sender cannot later repudiate the contents of the message, because only the possessor of the specific private key could have generated it.
     
  3. The receiver cannot possibly have concocted the message himself.

 
The recipient's public key can (optionally) be used to encrypt the message, so that only the recipient can read it. This step is only necessary if both authentication and secrecy are needed. We can take a plaintext message P, and encode it thus:
Digital signature operation


previous | start | next