HP CM8000 Practical IPsec Deployment for Printing and Imaging Devices - Page 104
Digital Signature, Digital Signature Verification
View all HP CM8000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 104 highlights
Figure 48 - Digital Signature In Figure 48, Jack has sent John a message with a digital signature. Let's see how John would validate this message to make sure it came from Jack and was not altered. Refer to Figure 49. Figure 49 - Digital Signature Verification Here we see how John uses Jack's public key to verify the message. Jack's public key is the only key that can decrypt the digital signature and obtain the hash value of the message that Jack calculated before sending the message. Because the hash was encrypted with Jack's private key, which no one should know but Jack, John can be sure that Jack was the one that sent it. We still have a problem - How does John know that Jack's public key really belongs to the person that he knows as "Jack"? There are many people in the world named "Jack" - how does John know it isn't one of them? We still need a trusted third party to provide Jack's public key in a format John can trust and we probably need Jack to provide a little more identity information too. Here is where the Certificate Authority comes into play. Refer to Figure 50 - Certificate Authority. 104