22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 6-15 Digital Signatures as used in Lotus Notes<br />

The numbered steps in the diagram are described as follows:<br />

1. Alice decides to send a Notes e-mail to Bob. The Notes client, seeing that the<br />

“Sign” checkbox is set, generates a hash (using MD5) of Alice’s message<br />

(resulting in message digest d).<br />

2. The hash is then encrypted by Notes using Alice’s RSA private key (using<br />

RC2), which means that only her RSA public key will be able to decrypt it.<br />

3. The encrypted hash along with the message is sent to Bob.<br />

4. Bob’s Notes client uses Alice’s RSA Public key to decrypt the hash (again,<br />

using RC2) and gets a decrypted hash (resulting in message digest d).<br />

5. Bob’s Notes client computes a new hash based on the text sent by Alice<br />

(using MD5, resulting in message digest d’).<br />

6. Bob’s Notes client then compares the decrypted hash (message digest d) and<br />

the newly computed hash (message digest d’) and lets Bob know whether the<br />

digital signature is valid or not. If the two hashes are the same, the message<br />

comes from Alice and has not been tampered with in transit. If they are<br />

different, the message is either not from Alice or it has been tampered with in<br />

transit.<br />

So, the result for the user is that Notes will indicate who signed the message if<br />

the validation of the signature is successful. Otherwise, Notes will indicate that it<br />

cannot validate the signature.<br />

Two things are guaranteed by this digital signature process:<br />

Chapter 6. Public key infrastructures 223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!