Cryptography Reference
In-Depth Information
users); (2) multipart signed , which is also called clear signing (and this
is viewable by all users).
SignedData MIME : The followingsteps provide the means for con-
structing a SignedData MIME entity. Again, we assume there is only
Alice doing the signing of a given message m .
[i] Select a message digest algorithm, h , such as SHA-1.
[ii] Hash m ,toget h ( m ).
[iii] Encrypt the message digest with Alice's private key to form
d A ( h ( m )).
[iv] Create a message block for Alice, consisting of: an identifier of her
public-key certificate, I e A ; her X.509V3 certificate identifier C ( A ); an
identifier of the hash algorithm being used, I SHA 1 , say; an identifier
of the algorithm used to encipher h ( m ), I RSA ,say; m itself; and the
encrypted message digest. This produces the SignedData MIME,
SDM =( I e A ,C ( A ) ,I SHA 1 ,I RSA ,m,d A ( h ( m ))) .
[v] Then SDM is base-64 encoded to produce the SignedData MIME
value.
Upon reception, Bob, strips off the base-64 encoding, then uses e A to get
h ( m ). Then he independently computes h ( m ) from m and compares this
with the deciphered value of h ( m ) to verify Alice's signature.
Clear Signing : This structure allows Alice to communicate with Bob
if he is not an S/MIME-enabled user. The body of the multipart/signed
MIME is comprised of two parts, the first of which can be of any MIME
type, is left to be broadcast in the clear. The second part is actually a
special case of the SignedData MIME type, called a detached signature ,
wherein the plaintext of the message is omitted.
Here are the basic steps in producinga clear signed S/MIME entity:
[A] The message m is signed with Alice's private key to form d A ( m ).
[B] She forms a data block consistingof
CSM =( I e A ,C ( A ) ,I RSA ,d A ( m )) .
[C] Then CSM is base-64 encoded to form CSM 64 and the two-part
message ( m,CSM 64 ) is sent to Bob.
Bob receives the message, strips the base-64 encoding from the second
part of the message, CSM 64 ,toget CSM , uses Alice's public key e A to
recover m and compares it with the message m sent in the clear in the
first part of the message.
Signed-only data in S/MIME provides authentication without secrecy.
Search WWH ::




Custom Search