• Add To Cart Try Demo Learn More
  • CertGear Product Features
  • Sign Up Today

 


Free CISA Certification Practice Questions:


Alice wants to send a digitally signed message to her friend Bob. All of the following statements are true EXCEPT:


A) Alice must apply a hash function to the message to create a message digest

B)Alice must encrypt the entire message with her private key

C) Bob must apply the same hash function as Alice to the message

D) Bob must decrypt the encrypted message digest using Alice's public key

E) If Bob is unable to verify the digital signature, either someone is trying to impersonate Alice or the message has been altered since Alice signed it

  • [Ans: B]



  • To create a digital signature for a message, the data to be signed is encrypted by an algorithm that takes as input the private key of the sender. (Alice). Largely due to performance reasons, the entire message data is not typically encrypted, but rather a digital thumbprint of the message (hash / digest) is created and then encrypted.

    The hash of the message, which was encrypted with the sender's (Alice) private key, acts as a digital signature for that message. The receiver (Bob) verifies the signature by applying the same hash function as the sender (Alice) to the message that was sent, and decrypting the encrypted message digest using the sender's (Alice) public key. If the two values match, the receiver has successfully authenticated the signature.


    The digital signature is created as follows:

    1) The sender (Alice) of the message uses a message digest function, such as SHA-1, MD5 to create a message hash / digest of the message contents.

    2) The digest is then encrypted using the private key of the sender.

    3) This encrypted digest is then attached to the message as the digital signature.



    The digital signature is verified as follows:


    1) The receiver of the message uses the sender's public key to decrypt the digital signature. If it decrypted successfully, the receiver knows that the message came from the holder of the private key.

    If decryption of the digital signature using the sender's public key fails, someone may be attempting to impersonate the sender.


    2) The receiver then uses the message digest function to calculate the hash associated with the message contents. If the hash is the same value as the one decrypted from the digital signature, the receiver can be confident that the message was not altered or modified in transit.


    If the hash values are different, the message may have been altered after signing, or corrupted in transit. In addition, if the sender and receiver are using different hash functions (MD5 versus SHA-1), the hash comparison will also fail.







BACK    |    NEXT