Sunteți pe pagina 1din 9

AUTHENTICITY & INTEGRITY OF

CERTIFICATE

PRESENTED BY:
SURAJ CHAKRAWARTI
(SUNPS.BLOGSPOT.IN)
What is authenticity?
 Authentication is one of the five pillars of information assurance
(IA). The other four are integrity, availability, confidentiality and
nonrepudiation.

 Authentication is a process that ensures and confirms a user’s


identity.

 Authenticity is used to make sure that you really communicate


with the partner you want to.
Example of Authentication:

 Authentication begins when a user tries to access


information. First, the user must prove his access rights and
identity. When logging into a computer, users commonly
enter usernames and passwords for authentication purposes.
This login combination, which must be assigned to each
user, authenticates access. However, this type of
authentication can be circumvented by hackers.
Steps for Authentication:

A digital signature is a mathematical technique used to validate the


authenticity and integrity of a message, software or digital document.
How digital signatures work?:

 Digital signatures are based on public key cryptography, also known as asymmetric
cryptography. Using a public key algorithm such as RSA, one can generate two
keys that are mathematically linked: one private and one public.

 The value of the hash is unique to the hashed data. Any change in the data, even
changing or deleting a single character, results in a different value. This attribute
enables others to validate the integrity of the data by using the signer's public key to
decrypt the hash. If the decrypted hash matches a second computed hash of the
same data, it proves that the data hasn't changed since it was signed. If the two
hashes don't match, the data has either been tampered with in some way (integrity)
or the signature was created with a private key that doesn't correspond to the public
key presented by the signer (authentication).
INTEGRITY OF A CERTIFICATE
 Prevent unauthorized users from making modifications to data or
programs
 Prevent authorized users from making improper or unauthorized
modifications
 Maintain internal and external consistency of data and programs

An example of integrity checks is balancing a batch of transactions to


make sure that all the information is present and accurately accounted
for.
DIGITAL CERTIFICATE

 Digital certificate is issued by a trusted third party which proves sender's identity to the
receiver and receiver’s identity to the sender.
 Digital signature is used to attach public key with a particular individual or an entity.

Digital certificate contains:-

• Name of certificate holder.


• Serial number which is used to uniquely identify a certificate, the individual or the entity
identified by the certificate expiration dates.
• Copy of certificate holder's public key.(Used for encrypting messages and digital
signatures) digital signature of the certificate issuing authority.
• Digital certificate is also sent with the digital signature and the message.
Example of Digital Certificate:

S-ar putea să vă placă și