Montgomery Township, New Jersey

Digital certificates and signatures

Digital certificates and signatures Padlocks 128Recently the topic of spam came up in one of the meeting of the PMUG. Someone suggested that digital signatures was one solution to the problem of spam but there was no clear understanding of digital signatures and how they help with the spam problem. I intend to write a concise but easily understood series of article on digital signatures, email encryption, and how to use it on Mac OS X ( with ).

What is a digital signature?

According to Wikipedia:

A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper.

Digital signatures are one component of what is called a public key infrastructure ( PKI ). PKI provides mechanisms and process for ensuring the confidentiality and integrity of digital information. It allows someone to prove his/her online identity and that documents and communications ( e.g. email and banking transaction ) haven’t been tampered with.

How does it work?

The science behind PKI involves some very complicated math. It involves finding the factors of very long prime numbers. These factors are used to create two keys, one private and one public. The private key is kept strictly confidential and is not shared with anyone, while the public key is distributed widely. Messages encoded with the private key can only be decoded with the corresponding public key and message encoded with the public key can only be decoded by private key.

How is this useful for digital signing?

The idea is to take piece of digital data and using a mathematical algorithm compute a large number called a hash – a small digital “fingerprint” made from any kind of data. The hashing function should create a unique hash for any particular piece of data. If the data changes then the hash will also change and we will know that the data has been tampered with.

To digitally sign a document, we compute the hash of the document and then encode the hash using the a private key. Since the data was encoded with the private key, it can only be decoded with the corresponding public key. To verify that the document ( e.g. email message ) came from that user, simply decode the hash using the widely known public key, compute a new hash from received document, and compare against the hash that was sent. If the hashes do not match we know that the document was tampered with. We know who sent the message because only that user has the private key used to encode the message.

How do I know the person sending the message is the person sending the message?

How do I know that the doctors is really a doctor? That the lawyer really knows the law? In the end, everything in security boils down to trust … but verify. In the real world we have authorities that certify that the doctors and lawyers ( teacher etc ) know what they are doing. The doctor or lawyers has been issued a license (certificate) to practice their craft. In a similar way PKI has the concept of a Certificate Authority (CA).

The user securely creates a private key and the CA signs the users public key with their private. This places their stamp of approval on the user digital certificates. The system is very heavily dependent on the trust placed in the CA. If the private key of the CA is compromised the entire PKI system is at risk since anyone could use that private key to create digital certificates. Similarly if the user loses his/her private key then anyone could digitally impersonate that user.

How does it all work together?

  • A and B want to exchange confidential message. – A creates a message and encodes the message ( and the message hash ) using B’s public key. B receives the message and decodes the message using his/her confidential private key. B is the only one who can decode the message because B has the private key.
  • A wants to send B an ( non-confidential ) message but B wants assurances the message did come from A. -A creates a message and encodes the hash of the message using her private key. B received the message and decodes the hash using As public key. B knows the message came from A because only A has the private key to encode the hash.

What’s Next?

In my next article I plan to show how to use digital certificate and digital signature to make your email more secure.


Cross posted from the Princeton Macintosh User’s Group

Digital certificates and signatures %name

Husband, father, Information security professional and avid photographer living at the junction of Princeton Township, Montgomery Township and Rocky Hill.

Liked this post? Follow this blog to get more. 

6 Comments on “Digital certificates and signatures

  1. This is exactly the kind of explanation I was looking for. Thank you!

  2. Great article. Simple and straight to the point.

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: