18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internet Security 297<br />

communication <strong>to</strong> the person who signed it. It also guarantees that the<br />

message was not modified since it left the sender. Digital signatures<br />

rely on public key systems.<br />

Creating a digital signature<br />

A digital signature is typically created using what is known as a hash<br />

function. A hash function is an algorithm that maps values from a large<br />

domain in<strong>to</strong> a much smaller range. In other words, if we have a typical<br />

message, which consists of many thousands of bits, the hash algorithm<br />

can produce a 'digest' of it, which would be about a hundred bits in<br />

length. Also, it would ensure that even if one bit is changed in the<br />

message, the digest produced would be different. This 'message digest'<br />

is encrypted using the sender's private key (usually RSA encryption)<br />

and the result is called the digital signature (see Figure 10.5).<br />

The digital signature is attached <strong>to</strong> the message file and the combined<br />

message is encrypted with the receiver's public key (see Figure 10.6).<br />

Receiver's<br />

Public Key<br />

Message<br />

Hash<br />

Function<br />

Message<br />

PMWMS?<br />

Sender's Private<br />

Key<br />

Message<br />

Digest<br />

Digital<br />

Signature<br />

Figure 10.5. — Creating a digital signature<br />

Digital<br />

Signature<br />

Signed and<br />

Encrypted<br />

Secured Message<br />

Figure 10.6.<br />

signature<br />

Encryption using digital

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!