Académique Documents
Professionnel Documents
Culture Documents
Fortezza
Digital Signatures and Certificates
Digital signatures are a technique used to
guarantee that a message has not been
tampered with.
Digital certificates are a technique used to
validate one’s identity.
Digital signatures are used with non-encrypted
and encrypted messages.
A hash key, a mathematical value, is used to
describe the message’s content.
Digital certificates can be obtained from a
certificate authority (CA).
Public Key Infrastructure (PKI)
A public key infrastructure is a uniform
set of encryption standards that
specify how public key encryption,
digital signatures, and digital
certificates should be implemented.
Public Security Issues of Strong
Encryption
Encryption can be used for illegal means as well
as legitimate means.
Encryption will devastate law enforcement’s ability
to fight crime.
Public key encryption can also be used in
telephone conversations.
Law enforcement agencies are asking for laws
enabling them to eavesdrop on encrypted
messages.
Clipper Chip
Key recovery
The Academic Angle
U.S cryptographic researchers lead the
world in cryptography.
Companies are pressuring the researchers
to not publish their research.
Copyright management infrastructures
(CMIs) enable vendors of digital media to
track and control the use and copying of
their products.
The Digital Millennium Copyright Act
(DMCA) imposes stiff penalties for anyone
divulging information about how CMI works.