All Questions
Tagged with signature certificates
58 questions
0
votes
0
answers
116
views
Self-signed certificate for S/MIME signature
I'm trying to programatically send an email with an S/MIME signature using a self-signed certificate, but Thunderbird keeps showing an error on the signature.
Digital signature is not valid
This ...
2
votes
1
answer
258
views
Correct my understanding of Digital Signature Algorithm for TLS certificates?
I just read the Wikipedia page on the Digital Signature Algorithm here:
https://en.wikipedia.org/wiki/Digital_Signature_Algorithm
Is the signing algorithm explained on the page the one that is used by ...
1
vote
1
answer
63
views
How to authenticate multiple IOT devices having unique certificates (ECDSA)?
I'm relatively new to the field of security.
I'm working on an IoT system with WiFi-connected nodes (Bio-sensing devices) communicating with a server for centralized monitoring.
I need to authenticate ...
2
votes
1
answer
99
views
Self-contained digital certification device
Does it work if we try to construct a device (e.g., for counting purpose in several remote branches of a company) using a self-containing digital signature key enclosed in a tamper-proof hardware to ...
0
votes
1
answer
268
views
What is a website's private signing key used to sign?
I am trying to understand digital signatures and digital certificates. I know that digital certificates verify a server's public verification key but what does the website's (client) private ...
1
vote
2
answers
390
views
How do certificates help?
I am reading a networking book by Mike Meyers, and it says that a certificate is a file that contains
A public key, and
A signature (cryptographic hash of the public key, encrypted with the private ...
1
vote
0
answers
69
views
Comparison Hash, MAC, Signatures, Certificates
I saw a table comparing Hash/Mac/Signatures in this post.
I was wondering if I can integrate digital certificates into it like this:
Hash
MAC
Signature
Certificate + Signature
Integrity
Yes
Yes
Yes
...
2
votes
0
answers
298
views
Software signing with openSSL
The company I work for wants me to implement some C functions to automatically sign their software. After doing some research I've found that openSSL is great for doing so.
Before starting the ...
1
vote
2
answers
113
views
IKEv1 Phase 1, authentication with signature, sending certificates "optionally"
At RFC2409, section 5.1, authentication header is like:
HDR*, IDii, [ CERT, ] SIG_I
HDR is an ISAKMP header whose exchange type is the mode. When
writen as HDR* it indicates payload encryption.
IDii ...
0
votes
1
answer
80
views
Authentication of certificates
In order to provide authenticity of a sent message, we use certificates as fingerprints. But how do I know that the certificate is not stolen by someone? If the certificates are made public, why cant ...
0
votes
0
answers
91
views
Is it possible to extract a signature from a HTTPS webpage?
Let's say I want to prove to someone that a webpage claims X. I could take a screenshot, but it could easily be doctored. However, the webpage's contents are encrypted by the domain using its private ...
1
vote
1
answer
344
views
How to determine curve's field size in a ECDSA Signature
There is a bug in some firmware I'm working that states the following:
If individual coordinates are shorter or longer than the curve’s field size they are processed incorrectly.
So I can get the ...
1
vote
1
answer
1k
views
Required certificate key usage for signing document
What's the required key usage/extended key usage for signing documents, eg.PDF, Word, PowerPoint, Excel, etc...
I am going to create a self-signed certificate that is needed to sign those documents. I ...
0
votes
0
answers
45
views
Any (proposed) internet standard (RFC) for trusted hosting of signed documents?
There's a problem with digitally signed documents - in particular that any print-out of them will be only a copy, not an original (by print-out I mean the print-out of the human readable form of the ...
2
votes
0
answers
56
views
How to prove document ownership at a specific time [duplicate]
Problem
Given any piece of data, I could sign it with public key and made available online. This proves I am in possession of given data, but it doesn't tell I am the creator. The only possibility (I'...