Page 248 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 248

Wireless Networks




                    Notes          the sender's e-mail system has been configured, the digital signature is appended either to the
                                   bottom of the message, creating a "clear signed" message, or the result is combined with the
                                   original message into a binary attachment, creating an "opaque signed" message.
                                   Because the digital signature is added to the original message as an attachment, clear signed
                                   messages can be read by e-mail clients that do not support S/MIME. The signature is discarded
                                   and the original message is displayed by non-S/MIME clients. However, there is no way the
                                   message can be verified; it is essentially the same as an unsigned message. The disadvantage of
                                   clear signed messages is that there is an increased chance for intervening mail gateways to alter
                                   the message, and thus invalidate the signature.
                                   Conversely, because the message and the digital signature are treated as a single binary attachment
                                   in opaque signed messages, they are much less likely to be altered in transit. However, only
                                   an S/MIME client can read the attachment. If a non-S/MIME client receives an opaque signed
                                   message, the message is unreadable.
                                   Opaque-signed  messages  were,  in  part,  created  to  solve  the  problem  of  e-mail  systems  that
                                   altered message bodies while e-mail was in transit. It should be noted here that current e-mail
                                   solutions that comply with S/MIME standards do not alter the message body. However, there
                                   are  many  clients  that  cannot  read  opaque-signed  e-mail  messages.  Therefore,  sending  clear-
                                   signed messages is recommended.
                                   When the message is received, the digital signature can be retrieved and the sender's public
                                   key applied in a decryption operation, which yields the original hash value of the message. A
                                   comparison of this hash value with the hash value of the received message can then be performed.
                                   Because only one private key can correspond to a public key, and only the owner of the public
                                   key could use it to encrypt the hash value successfully, decrypting the hash with the public
                                   key shows that the private key owner encrypted the hash value. Because the hash value is a
                                   numerical representation of the message text, if the encrypted hash value matches the hash value
                                   of the message received, it indicates that the message text that was sent matches the text that
                                   was received. When coupled with the fact that only the private key owner could have sent the
                                   message, the result is that the recipient is assured that only the key owner sent the message, which
                                   provides authentication and, consequently, nonrepudiation. It also shows that the message has
                                   not been changed, which provides data integrity. If the hash values did not match, the recipient
                                   would know that the message had either been altered in transit or that the public key used does
                                   not match the private key used. In both cases, the recipient knows that the message is not valid
                                   and should not be trusted.
                                   Thus, the way that public key cryptography provides the security services that make up digital
                                   signatures can be seen.
                                   The following figure 14.12 shows the sequence of signing with the addition of the supporting
                                   elements of public key cryptography.

                                                   Figure 14.12: Sequence of signing Public Key Cryptography









                                   Source: http://technet.microsoft.com/en-us/library/aa998077(v=exchg.65).aspx
                                   z z  Message is captured.
                                   z z  Hash value of the message is calculated.
                                   z z  Sender's private key is retrieved.




          242                              LOVELY PROFESSIONAL UNIVERSITY
   243   244   245   246   247   248   249   250   251   252   253