Module 17 Flashcards
Public Key Cryptography
Digital signatures
A mathematical technique used to provide authenticity, integrity, and nonrepudiation
How do digital signatures serve as legal proof?
They provide nonrepudiation of transactions therefore proving that the data exchange did take place
What type of cryptography do digital signatures use?
Asymmetric cryptography
Authentic signatures
The signature cannot be forged and provides proof that the signer, and no one else signed the document
Unalterable signatures
After a document is signed, it cannot be altered
Not Reusable
The document signature cannot be transferred to another document
Non-repudiated
The signed document is considered to be the same as a physical document. The signature is proof that the document has been signed by the actual person
Code signing
Used for data integrity and authentication purposes
How is code signing used?
To verify the integrity of executable files downloaded from a vendor website
What does code signing use?
Digital certificates to authenticate and verify the identity of the site that is the source of the files
Digital certificates
These are similar to a virtual ID card and used to authenticate the identity of system with a vendor website and establish an encrypted connection to exchange data
What are the three Digital Signature Standard (DSS)
Digital Signature Algorithm (DSA)
Rivest-Sharmir Adelman Algorithm (RSA)
Elliptic Curve Digital Signature Algorithm (ECDSA)
Digital Signature Algorithm (DSA)
DSA is the original standard for generating public and private key pairs, and for generating and verifying digital signatures
Rivest-Shamir Adelman Algorithm (RSA)
RSA is an asymmetric algorithm that is commonly used for generating and verifying digital signatures
Elliptic Curve Digital Signature Algorithm (ECDSA)
ECDSA is a newer variant of DSA and provides digital signature authentication and non-repudiation with the added benefits for computational efficiency, small signature sizes, and minimal bandwidth