Abstract
- The purpose is to prove that something from Signer is really from that entity
- Private Key is used to generate the signature
- Public Key is distributed for verification of the signature
- Consists of a Digest of the X.509 Certificate encrypted with the Signer’s Private Key. The extra Hash process is to deal with Con
Benefits
- Preventing Man-in-the-middle Attack
Con
- Doesn’t work well on document that is too short or too long. This is can helped with Hash the document first before signing. We can also add a bit padding to the Digest to make it longer, thus more secure
Terminologies
Signer
- Can be Certificate Authority (CA)
Verifier
- The Client