Operating System《操作系统》ch15-Security-43.pptVIP

  • 1
  • 0
  • 约1.44万字
  • 约 43页
  • 2017-06-09 发布于浙江
  • 举报

Operating System《操作系统》ch15-Security-43.ppt

Authentication – Digital Signature Based on asymmetric keys and digital signature algorithm Authenticators produced are digital signatures In a digital-signature algorithm, computationally infeasible to derive S(ks ) from V(kv) V is a one-way function Thus, kv is the public key and ks is the private key Consider the RSA digital-signature algorithm Similar to the RSA encryption algorithm, but the key use is reversed Digital signature of message S(ks )(m) = H(m)ks mod N The key ks again is a pair d, N, where N is the product of two large, randomly chosen prime numbers p and q Verification algori

文档评论(0)

1亿VIP精品文档

相关文档