In practice, we need a more practical identification technology, similar to signature. Once the information we checked out is published, anyone can recognize that it was signed by us. Digital signature technology is the technology to solve this kind of problem. The information generated by digital signature technology is undeniable.
Digital signature technology is a common authentication technology in modern networks. It is an information summarization algorithm with a key, and its main purpose is to resist denial. Digital signature technology package uses private key to encrypt information abstract, and anyone who obtains public key can decrypt and verify the information. Therefore, data signature technology can be regarded as the combination of asymmetric encryption technology and information summarization technology.
Digital signature algorithm is the foundation of public key infrastructure (PKI). The algorithm requires that the integrity of data can be verified and the source of data can be authenticated, which plays a role in resisting denial.
Digital signature technology is essentially an information summarization algorithm, which only calculates the unique character string of information, that is, abstracts the same data, and the plaintext data must be the same. Information summarization can only realize the integrity of information, but it can't guarantee the undeniable nature of information. Difficulties in information summary:
Data signature technology only encrypts abstract data in abstraction to ensure that only the information generator can generate this signature string. The specific method is as follows:
American NIST published DSS (Digital Signal).
In 199 1, National Bureau of Standards and Technology (NIST) proposed DSS (Digital Signature Standard) as FIPS (Federal Information Processing Standard). Among them, DSS is just a standard, which specifies DSA as the signature algorithm.
As mentioned above, the core of digital signature is information digest algorithm, assisted by asymmetric encryption algorithm, so generally we need to indicate which algorithms are used when referring to digital signature, such as MD5WithRSA, SHA 1withDSA, etc.
In digital signature, its security depends on asymmetric encryption algorithm. So usually, we don't pay much attention to the summary algorithm used, so there are the following categories:
None of RSA, DSA or ECDSA has the decisive advantage to beat other competitors: