69 lines
4.5 KiB
HTML
69 lines
4.5 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="Generate and verify a digital signature" />
|
||
|
<meta name="abstract" content="You can protect data from undetected changes by including a proof of identity value called a digital signature." />
|
||
|
<meta name="description" content="You can protect data from undetected changes by including a proof of identity value called a digital signature." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajcworking.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajcsignfiletxt.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajcverfilesigtxt.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzajccreatekeys.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="signfile" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>Generate and verify a digital signature</title>
|
||
|
</head>
|
||
|
<body id="signfile"><a name="signfile"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">Generate and verify a digital signature</h1>
|
||
|
<div><p>You can protect data from undetected changes by including a proof
|
||
|
of identity value called a digital signature.</p>
|
||
|
<div class="section"><h4 class="sectiontitle">Generating a digital signature</h4><p> A
|
||
|
digital signature relies on hashing and public key cryptography. When you
|
||
|
sign data, you hash the data and encrypt the results with your private key.
|
||
|
The encrypted hash value is called a digital signature. </p>
|
||
|
<p>If you change
|
||
|
the original data, a different digital signature will be generated. </p>
|
||
|
<p>To
|
||
|
use a PKA key to sign a file, write a program. </p>
|
||
|
</div>
|
||
|
<div class="section"><h4 class="sectiontitle">Verifying a digital signature</h4><p>Verifying a digital
|
||
|
signature is the opposite of signing data. Verifying a signature will tell
|
||
|
you if the signed data has changed or not. When a digital signature is verified,
|
||
|
the signature is decrypted using the public key to produce the original hash
|
||
|
value. The data that was signed is hashed. If the two hash values match, then
|
||
|
the signature has been verified. To do this, write a program.</p>
|
||
|
Read the <a href="codedisclaimer.htm#codedisclaimer">Code license and disclaimer information</a> for important legal information.</div>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzajcsignfiletxt.htm">Example: Signing a file with your Cryptographic Coprocessor</a></strong><br />
|
||
|
Change this program example to suit your needs for signing a file with your Cryptographic Coprocessor.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzajcverfilesigtxt.htm">Example: Verifying a digital signature with your Cryptographic Coprocessor</a></strong><br />
|
||
|
Change this program example to suit your needs for verifying a digital signature with your Cryptographic Coprocessor</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzajcworking.htm" title="After you set up your Cryptographic Coprocessor, you can begin writing programs to make use of your Cryptographic Coprocessor's cryptographic functions.">Manage the Cryptographic Coprocessor</a></div>
|
||
|
</div>
|
||
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
||
|
<div><a href="rzajccreatekeys.htm" title="You can create DES and PKA keys and store them in a DES key store.">Create DES and PKA keys</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|