What Is Transaction Authentication?

CA certification, that is, electronic certification services [1] , refers to activities that provide authenticity and reliability verification for parties involved in electronic signatures.

CA certification

CA certification, ie
CA center for each use
After receiving the message, the recipient uses the following steps to verify your signature:
  1. Use your own private key to turn the information into clear text;
  2. Get the original digest from the digital signature using the sender's public key;
  3. The receiver performs a hash operation on the source information you send, and also generates a summary;
  4. The recipient compares the two digests, and if they are the same, they can prove the identity of the signer of the message.
If the contents of the two abstracts do not match, what would explain the reason?
It is possible that the private key used to sign the digest is not the signer's private key, which indicates that the signer of the information is not trusted; the information received may not be the information sent by the signer at all, and the information has been damaged during transmission Or tampering.
effect:
  • Confidentiality-Only the recipient can read the information.
  • Authentication-confirms the identity of the sender of the message.
  • Integrity-Information cannot be tampered with during transmission.
  • Non-repudiation-The sender cannot deny the sent message.
Digital certificates provide electronic authentication for secure communication between the two parties. In the Internet, company intranet or extranet, digital certificates are used for identity identification and electronic information encryption. The digital certificate contains identification information of the owner of the public key, and the identity of the certificate holder is verified by verifying the authenticity of the identification information.
What can I do with a digital certificate?
The digital certificate is appended with the user information and the CA's signature after the user's public key. The public key is part of the key pair and the other part is the private key. The public key is made public and can be used by anyone. The private key is only known to you. Information encrypted by the public key can only be decrypted by the corresponding private key. To ensure that only one person can read their own letter, the sender encrypts the letter with the recipient's public key; the recipient can decrypt the letter with his private key. Similarly, to verify the sender's identity, the sender signs the letter with his private key; the recipient can verify the signature with the sender's public key to confirm the sender's identity.
In online transactions, you can use digital certificates to verify the identity of the other party. Encrypting information with digital certificates can ensure that only the receiver can decrypt and read the original text, and the confidentiality and integrity of the information during transmission. With digital certificates online security can be achieved, the security of email, online transactions and credit card purchases can be guaranteed.
Type of digital certificate
  1. A personal digital certificate is mainly used to identify the identity of the natural person owner of the digital certificate. It contains personal identity information and its public key, such as user name, certificate number, and identity type. It can be used by individuals to perform contract signing, ordering, Enter activities such as review, operation authority, and payment information.
  2. Institutional digital certificates are used for the agency's external activities in e-government and e-commerce, such as contract signing. The certificate contains the institution's information and the institution's public key, as well as the institution's private key signature, which is used to identify the true identity of the certificate holder. This certificate is equivalent to the official seal of an institution in the real world, and is unique, that is, each institution has only one.
  3. Device digital certificate, which is used to identify the identity of a network device in a network application. It mainly contains device related information and its public key, such as domain name, website address, etc., and can be used for various network devices such as VPN servers and web servers to communicate on the network To identify and verify device identity.
  4. A code signing digital certificate is a digital certificate issued to a software provider. It contains the identity information of the software provider and its public key. It is mainly used to prove that the software code issued by the software publisher originates from a real software publisher and can be valid. Prevent software code from being tampered with.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?