Solved

Digital signature

Posted on 2014-04-02
11
410 Views
Last Modified: 2014-04-03
What is a digital signature, does it involve a hash.

(Assuming SSL)
0
Comment
Question by:Anthony Lucia
11 Comments
 
LVL 19

Expert Comment

by:Patricksr1972
Comment Utility
Hi

It means your mail / files are signed by an SSL certificate.
It involves encryption.
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
Hi Dave,
The Wikipedia article about it is helpful:
http://en.wikipedia.org/wiki/Digital_signature

And here's a short article with a brief definition:
http://searchsecurity.techtarget.com/definition/digital-signature

This is different from a bitmap graphic that is used to put an image of your "real" signature on a document, as discussed in this article:
http://www.experts-exchange.com/Software/Photos_Graphics/Images_and_Photos/A_12380-Signature-Image-with-Transparent-Background.html

Regards, Joe
0
 
LVL 6

Expert Comment

by:Biniek
Comment Utility
You can look into some Microsoft documents online, in my opinion it is presented in an accessible way:

Understanding Digital Certificates
http://technet.microsoft.com/en-us/library/bb123848(v=exchg.65).aspx

Understanding S/MIME
http://technet.microsoft.com/en-us/library/aa995740(v=exchg.65).aspx

Understanding Public Key Cryptography
http://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx

I'd like to recommend to You very good tool - Cryptool - Educational Tool for Cryptography and Cryptanalysis, this is very simple tool, and help You to understand digital signature.
www.cryptool.org - but now the webpage is closed, because they are moving to new serwer
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
Comment Utility
Most cryptographic signatures are in fact the hash of the message encrypted with the signer's private asymmetric key. By decrypting the key using the matching public key, the verifier can obtain the original hash, and hence, match that to a locally calculated value of the message's hash.

However, in the legal form, there is no requirement for this to be the case - a LEGAL digital signature is anything that represents the act of signing a message - hence, a cryptographic signature attached by hand is a legal digital signature; however, simply typing your name at the bottom of an email is *also* a legal digital signature.
Conversely, having a machine attach your name (or a Cryptographic signature) to a message is NOT a legal digital signature - the key is the physical act of will/choice signing the document, not the technology :)
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
Dave,
One other thing. If your interest is primarily in digital signatures for PDF documents, take a look at this comprehensive white paper (152 pages!) by Bruno Lowagie, the CEO of iText Software:
http://itextpdf.com/book/digitalsignatures20130304.pdf

Regards, Joe
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
@Joe: That's an excellent document :)
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
@DaveH,
I think so, too. Reading it cover-to-cover is on my bucket list. :)
0
 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
Well, its quite short compared to this little lot:

http://www.adobe.com/devnet/pdf/pdf_reference.html

I am glad to note that, despite pdf now being a (pay to play) ISO standard, adobe still have it on their website for free download :)
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
Yeah, I downloaded the 1.6 ref a while ago — 1,236 pages! That one is post-bucket list. :)

Btw, NJD posted a new question that you might want to play in:
http://www.experts-exchange.com/Security/Operating_Systems_Security/Q_28404166.html

Cheers, Joe
0
 
LVL 33

Expert Comment

by:Dave Howe
Comment Utility
1.7 is even bigger, plus the 1.8/1.9 "extensions" that are still numbered 1.7 now ISO owns the standard :)

As for the other question - I saw it, but it seemed to me you and Giovanni had it covered, so I didn't think my input would help any :)
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
Comment Utility
Thanks for the heads-up on 1.7/1.8/1.9 — haven't even looked at 'em yet!
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now