Information Security Practice III Digital Signature and Certification Experiment [Apply for Digital Certificate & Digital Signature and Certification]
Dingdu! Here is the compilation of Xiao Ah Woo's study course materials. A good memory is not as good as a bad pen. Today is also a day to make progress. Let's advance together!
1. Apply for a digital certificate
Apply for your own digital certificate on www.trustauth.cn, https://freessl.cn and other websites, using your own name for the name and your own QQ mailbox for the email address. After the application is successful, 保存自己的pfx格式证书和cer格式证书
(the suffix may vary depending on the company that provides certificate services).
申请数字证书过程小记见博文:
https://blog.csdn.net/qq_43543789/article/details/108580852
Second, digital signature and authentication
Use 程序SFT
for testing, test "encrypted files, signature, signature, encryption", "decrypt files, verify signature, decrypt, verify signature" with your own digital certificate and [email protected] digital certificate (including [email protected] The certificate of the private key is "[email protected]", and the certificate containing the public key of [email protected] is "[email protected]") for testing.
要测试到签名文件被篡改的情况(在签名之后人工修改签名文件,验证签名时会提示有错)!
The screenshot is proof: take a representative picture and put it below:
1. Encrypt files & decrypt files
Don't forget to change the certificate identity to perform the decryption operation~~
安装加密证书-》加密-》删除加密证书--》安装解密证书-》解密
Compare
Encryption and decryption succeeded!
2. File signature & verification file
由于操作步骤与加密解密大致相同,此处只挑选了代表性截图贴出:
The .S
suffix file is generated after signing .
让我们来修改一下.S文件中的部分内容再次尝试验证签名看看结果如何。
验证截图如下:
验证签名出错,系统提示文件可能被篡改。
3. File signature encryption & verification signature decryption
由于操作步骤与加密解密大致相同,此处只挑选了代表性截图贴出:
Generate a .SE
file after file signature encryption :
Open as follows:
此处我们修改一下待处理的签名加密文件,看看会出现什么情况~
此处操作:去掉文件中的0;如下图所示
验证签名解密过程出现异常。如下:
Three, verify signature practice
"Information Security Experiment 3.txt.S" This file is signed with [email protected]
the
private key, and you are required to verify the signature. [email protected]
The public key is required to verify the signature [email protected]
. Copy the contents of the file "Information Security Experiment 3.txt" Come out and put it below:
好好学习、天天向上!
Ending!
More course knowledge learning records will come later!
就酱,嘎啦!
Note:
Life is diligent, nothing is gained.