What is Sender authentication ? (Public Key Authentication based, Certificate-based in Cryptography)

Public Key Crypto Pair Key Creation

About

Sender Authentication is based on the digital signature. If you can decrypt the signature successfully, it proves that the message come from:

  • a particular sender
  • or group

Type

There is three type of authentication:

See also:

Concept

Key

  • the private key remains (only) with the user (The possession of this key is proof of the user's identity. Only a user in possession of a private key that corresponds to the public key located at the server will be able to authenticate successfully.
  • the public keys are stored on the server in a file known as the What are the SSH Authorized Keys file? (on Server)

For the procedure. see Digital signature procedure

Key Manager

The KeyManager is a program (or function) that decides which authentication credentials should be sent to the remote host for authentication during SSL handshake.

Type

Mutual

See the dedicated page: What is a certification base authentication (also known as Client certification / Mutual TLS authentication) ?

Documentation / Reference





Discover More
Card Puncher Data Processing
Ansible - Ad-hoc command

Adhoc command are command executed as in the shell via ansible. You can therefore execute command on a whole cluster of server. This is because the default module of the ansible command line is command...
Jwt Auth Flow
Authentication - Jwt (Json web token)

json web token is a access token. It's also known as jot. When a JWT is signed, it becomes a JWS and can be used for sender authentication and authorization. The main purpose of JWTs is to transfer...
Authentication - Method / Protocol / Scheme

The authentication methods / construct / protocol validates the identity of a user (ie validates who you are). The method is implemented by a (identify|authentication) provider. In the traditional...
Authenticity

is a functionality of cryptography that verifies that the sender of the message is who he claimed to be. This functionality is implemented with the digital signature functionality. And as a side effect,...
Certificate Validity Period Not Before Not After Portecle
Certificat and chain verification

A certificate check is equivalent to an authentication. The signature of the certificate is verified with the public key to check if it was signed (issued) by a trusted party (usually a trusted...
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines: the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Portecle New Keystore
Cryptography - Keystore (KS)

A keystore is a database of key material. ie: key LDAP identity You only need it: if you are a server that want to implements SSL, or if the server requires client authentication. A keystore...
Cryptography - SSH

in the context of cryptography. For authentication: Public Key on the server: Add it to the ~/.ssh/authorized_keys file Private Key on the client: Configure PuTTY to use your private key file...
Certificate Validity Period Not Before Not After Portecle
Identification Material - Certificate (or Public Key Certificate)

A certificate is a document which permits to define with certainty the owner of the private key (ensures that the party you are communicating with is whom you think.) because it's digitally signed A certificate...
Card Puncher Data Processing
MySQL - SSL connection

and with MySql The client is below the mysql cli but it can be another implementation. For the authentication: You have the private key private of the client The MySQL Server has the public key...



Share this page:
Follow us:
Task Runner