What is the difference between the signature algorithm, signature hash algorithm, and fingerprint algorithm in a digital certificate?

First, let’s take a look at the display form of these three algorithms in the digital certificate.
Insert picture description here
Insert picture description here
Please listen to me one by one.
Signature hash algorithm.
After the data is decrypted with the public key, the hash of the transmitted content is calculated through the signature hash algorithm. Value, and compare the hash value passed along with the content to determine whether the transmitted content has been tampered with

Signature algorithm
The hash fingerprint of the transmitted information is encrypted and passed along with the content. This is to prevent people who are unwilling to modify the content of the information and the hash value in it at the same time to match, so that the signature hash algorithm step loses its true effect. Therefore, the hash value needs to be encrypted before it is sent out, which is a safety lock for more secure data transmission.

The signature algorithm is to decrypt the encrypted hash fingerprint of the transmitted information

Fingerprint Algorithm In
simple terms, it is to verify whether the received digital certificate itself has any problems.
Calculate the certificate hash value (fingerprint) through the fingerprint algorithm, and compare it with the fingerprint given in the certificate to confirm that the certificate is correct.

I still don't understand the relationships and concepts. Please check my two blog posts " Digital Certificate for Https Communication " and "RSA Encrypted Signature for Https Communication" to understand the relationship.

博客书写不易,您的点赞收藏是我前进的动力,觉得不错请点赞、 收藏 ^ _ ^ !

Related Links

Guess you like

Origin blog.csdn.net/luo_boke/article/details/107128529