Online Business Help

  Homes arrow Online Business Help arrow Page 2 - Digital Signature
 Webmaster Tools
Base64 Encoding 
Browser Settings 
CSS Coder 
CSS Navigation Menu 
Datetime Converter 
DHTML Tooltip 
Dig Utility 
DNS Utility 
Dropdown Menu 
Fetch Content 
Fetch Header 
Floating Layer 
htaccess Generator 
HTML Encoder 
HTML Entities 
IP Convert 
Meta Tags 
Password Encryption
Password Strength
Pattern Extractor 
Ping Utility 
Pop-Up Window 
Regex Extractor 
Regex Match 
Scrollbar Color 
Source Viewer 
Syntax Highlighting 
URL Encoding 
Web Safe Colors 
Forums Sitemap 
Weekly Newsletter
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Digital Signature
By: Wale Wahab
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating:  stars stars stars stars stars / 0

    Table of Contents:
  • Digital Signature
  • The certificate authority...
  • A digital signature...
  • The above scheme...
  • It then compares...

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Digital Signature - The certificate authority...

    (Page 2 of 5 )

    The certificate authority is a trusted entity that issues certificates to end entities and other Certificate Authorities. Another important thing that Certificate Authority does is to issue Certificate Revocation Lists (CRLs) periodically and post certificates and CRLs to a database or repository.

    The overall process is illustrated in the figure below:

    Note: The text editor refused to accept the diagram. To view the diagram, click the website link in the resource box of the author and click on the recent articles.

    System A performs a sign operation that uses As private key to generate the signature. System B performs a verify operation that uses system As public key and that allows system B to be sure that a received message originated from system A and that the contents were not modified since it left system A.

    In some respects, a digital signature is similar to an integrity check value (check digit). However, there is one major difference. A digital signature must be able to support non-repudiation, that is, a recipient of a message must be able to use the digital signature to convince a third party as to the identity of the originator.

    More Online Business Help Articles
    More By Jase Dow



    - Social Media: An Analogy
    - Make a Digital Trail for Site Performance
    - Communication is Key Even in SEO
    - Look Past Your Web Analytics Blinders
    - Everything is Marketing
    - How to Be Transparent Online
    - Respecting Customer Privacy in Social Media
    - Testing Your Site For the Holidays
    - Speak Your Customer`s Language
    - Don`t Ignore Social Media
    - Focus on Business Goals, Not the Internet
    - Solve Problems to Make Money Online
    - Offering Coupons Without Alienating Customers
    - Build Relationships to Build Conversions
    - Online Reviews Matter More Than You Think

    Developer Shed Affiliates


    © 2003-2018 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap