Basic Principles and differences between digital signature and Encryption

Source: Internet
Author: User

Comments: What are the basic principles of Digital Signature and encryption? The digital signature mainly goes through the following processes: information senders use a one-way HASH function to generate information summaries; information senders use their own private key signature information summaries; the information sender sends the information together with the signed information digest. What are the basic principles and differences between the information signature and encryption?

The digital signature mainly goes through the following processes:

Information senders use a one-way HASH function to generate information summaries;

Information senders use their own private key signature information abstract;

The information sender sends the information together with the signed summary;

The information recipient generates a new information digest for the received information by using the same one-way HASH function as the information sender, then, use the public key of the Information sender to verify the information digest to check whether the identity and information of the Information sender have been modified.

Digital Encryption mainly goes through the following processes:

When a message sender needs to send information, a symmetric key is generated to encrypt the message to be sent;

The information sender encrypts the above symmetric key with the public key of the information receiver;

The information sender combines the result of step 1 and Step 2 to the information recipient, which is called a digital envelope;

The information recipient uses its own private key to decrypt the encrypted symmetric key, and uses this symmetric key to decrypt the ciphertext encrypted by the sender to obtain the real original text.

Although both digital signatures and digital encryption use public key systems, the implementation process is the opposite, and the key pairs used are different. The digital signature uses the sender's key pair. The sender encrypts the key with its own private key, and the receiver decrypts the key with the public key of the sender. This is a one-to-many relationship, anyone with the sender's public key can verify the correctness of the digital signature. Digital encryption uses the accesskey pair of the receiver, which is a many-to-one relationship. Anyone who knows the accesskey of the receiver can send encrypted information to the receiver, only one person with the private key of the recipient can decrypt the information. In addition, the digital signature only uses asymmetric key encryption algorithms, which can ensure the integrity, identity authentication and non-repudiation of the sent information, digital encryption uses a combination of symmetric key encryption algorithms and asymmetric key encryption algorithms to ensure the confidentiality of sent information.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.