In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
I believe that many developers will be confused when they encounter the concept of signature verification for the first time when they develop a project. How is the signature implemented? How to check the visa?
To understand these two processes, you need to clarify the following basic concepts:
1. Key pair: in asymmetric encryption, there are two kinds of keys, namely, public key and private key.
2. Public key: the public key is used to encrypt data, and the data encrypted with the public key can only be decrypted with the private key.
3. Private key: use the private key to decrypt data encrypted by the public key.
4. Summary: do the HASH operation for the text that needs to be transmitted.
5. Signature: use the private key to encrypt the text summary that needs to be transmitted, and the resulting ciphertext is called the signature of the transmission process.
6. Signature verification: the data receiver gets the transmission text, but needs to confirm whether the text is the content sent by the sender and whether it has been tampered with. Therefore, the receiver decrypts the signature with its own public key and gets the abstract of the text, and then uses the same method as the sender to calculate the summary value of the text. Compared with the decrypted summary, it is found that the two are completely consistent, which means that the text has not been tampered with.
The process of signature verification is summarized as follows:
Xiao Ming sends a message to Xiao Li. Xiao Ming first calculates the message digest, and then uses his own private key to encrypt the message digest, which is the signature.
After receiving the message, Xiao Li will extract the message digest using the same method as Xiao Ming, then decrypt the signature with Xiao Ming's public key and compare it with the message digest calculated by herself (this process is called "signature verification"). If the same, it means that the message was sent to Xiao Li by Xiao Ming. At the same time, Xiao Ming cannot deny the fact that he sent a message to Xiao Li.
In this process, we can find three remarkable features of the signature verification process:
(1) Authentication. The public key encryption system allows anyone to use the public key to encrypt when sending a message, and the signature allows the message receiver to confirm the identity of the sender.
(2) Integrity. The sender makes a summary of the data to be transmitted, and after receiving the data, the receiver makes a summary and compares whether it is consistent with the result of the sender to determine whether the data has been tampered with on the line.
(3) non-repudiation. The receiver can prevent all subsequent repudiation by digital signature, because the receiver can show the signature to a third party to prove the source of the information.
The realization method of digital signature technology:
The digital signature algorithm is realized by public key encryption technology. In public key encryption, each user has a pair of keys: a public key and a private key. The public key can be released freely, but the private key is kept secret; another requirement is to make it impossible to calculate the private key from the public key.
LKT series encryption chips support symmetric and asymmetric algorithms and digital signatures commonly used in the world, as well as customer transplant algorithms and programs. It is a good choice for developers who need data encryption and embedded copyright protection digital signatures.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.