The Digital Signature and The X 509 Open
The Digital Signature and The X 509 Open
1 Abstract
This article explains what is a Digital Signature, why it is an important part of the
Digital Identity, and how it works. Then it describes the authenticity and social
problems related to the usage of the Digital Signature. It explains as well the two
authentication models, X.509 and OpenPGP, that can be used to solve these
authenticity problems. Finally it makes a comparison between these two authentication
models and their features and tries to explain why the OpenPGP model is better.
2 Introduction
4 Authenticity Verification
The figure shows a web of trust rooted at Alice. The graph illustrates who has signed
who's certificate.
Alice is sure that the certificates of Blake and Dharma are valid, since she has verified
and signed them herself.
If Alice has full trust on Dharma, then she would consider valid the certificates of Chloe
and Fransis as well. She has not verified them herself, but Dharma has verified and
signed them and Alice has full trust on the ability of Dharma to correctly verify and sign
digital certificates.
In case that Alice has only marginal trust on Blake and Dharma, then she cannot be
really sure about the validity of the Francis' certificate, although Dharma has signed it.
However, she can be almost sure about the validity of the Chloe's certificate. Both
Blake and Dharma have verified and signed it, so the possibility of both of them being
deceived (or corrupted, mistaken) is small.
8 Conclusion
It is quite easy to understand the concept of Digital Signatures and the basics of how it
works. The Digital Signature is so important that it will become an inevitable part of our
future digital societies.
A very important aspect of the digital signature is verification of its authenticity. It
happens that this is more a social problem than a technical one, so it can be solved
correctly only by the right combination of social and technical means.
Currently, there are two models (or infrastructures) for solving the authentication
problem. One of them is the Hierarchical model (X.509 standard), and the other one is
the Web-Of-Trust model (OpenPGP standard). The Web-Of-Trust model is more
flexible and advanced than the Hierarchical model, but it requires that everybody that
participates in it takes responsibility and makes decisions for himself.
However I think that the Web-Of-Trust is the right approach, because the personal
privacy and security are, by definition, personal responsibilities, and they cannot be
outsourced.
9 Bibliography
• http://en.wikipedia.org/wiki/Digital_signature
• http://en.wikipedia.org/wiki/Public_key
• http://en.wikipedia.org/wiki/Digital_certificate
• http://en.wikipedia.org/wiki/X.509
• http://en.wikipedia.org/wiki/Web_of_trust
• http://www.youdzone.com/signature.html
• http://www.gnupg.org/gph/en/manual.html
• http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
• http://www.openpgp.org/technical/whybetter.shtml
• http://enigmail.mozdev.org/
• http://www.gpg4win.org/