Joke Collection Website - Blessing messages - What are the core technical principles of third-party electronic official seals?
What are the core technical principles of third-party electronic official seals?
Electronic official seal is the application of electronic signature technology, and its core technology is digital signature technology.
As one of the important methods to maintain the security of data information, digital signatures can solve problems such as forgery, denial, impersonation and tampering. Its main functions are reflected in the following aspects:
( 1) Prevent replay attacks. Replay Attacks are a common attack method used by hackers in the computer world. They refer to the attacker sending a packet that has been received by the destination host to achieve the purpose of deceiving the system. It is mainly used in the identity authentication process to destroy the correctness of the authentication. . This attack maliciously or fraudulently repeats a valid data transmission. Attackers use network monitoring or other methods to steal authentication credentials and then resend them to the authentication server. In digital signatures, if techniques such as stamping signed messages or adding serial numbers are used, replay attacks can be effectively prevented.
(2) Anti-counterfeiting. Others cannot forge a signature on the message because the private key is known only to the signer himself, so others cannot construct correct signature result data.
(3) Anti-tampering. The digital signature is sent to the recipient together with the original file or digest. Once the information is tampered with, the recipient can determine that the file is invalid by calculating the digest and verifying the signature, thus ensuring the integrity of the file.
(4) Anti-repudiation. Digital signatures can be used as the basis for identity authentication and as evidence of the signer's signature operation. To prevent the recipient from denying it, the digital signature system can require the recipient to return a self-signed message indicating receipt to the sender or a trusted third party. If the recipient does not return any message, the communication can be terminated or restarted without any loss to the signer, making it non-repudiation by both parties.
(5) Confidentiality. Once a handwritten signed document is lost, the document information is very likely to be leaked, but digital signatures can encrypt the message to be signed. During network transmission, the message can be encrypted with the recipient's public key to ensure the confidentiality of the information.
(6) Identity authentication. In a digital signature, the client's public key is a sign of his identity. When signing with a private key, if the recipient or verifier uses his public key to verify and pass, then it can be certain that the signer is the one who owns the private key. person, because the private key is known only to the signer.
Today, electronic signature technology has been used in various fields and has become an inevitable trend for the development of enterprises in the digital era.
- Related articles
- The classic dialogue on how to protect your dreams in ally mcbeal ~ ~ You'd better add a classic sentence ~ ~ Wow ~ Wow ~ How many planes are so handsome ~ ~
- Love Between Light and Night What's chesley's birthday?
- Nucleic acid testing notice for all employees in Tianning Street, Changzhou on April 29
- How to cancel the industrial and commercial bank card on the mobile phone is as follows
- What is the message sent by WeChat official account?
- How can I pass the power micro-classroom exam?
- What will happen if Zhejiang Jiefen Code fails to mediate?
- Happy birthday, Mr Li.
- How long does it take for the labor arbitration to receive the acceptance notice?
- I want to register with the tax bureau by mobile phone, but I can't get the verification code. What happened? thank you