Skip to main content

Everything has a Signature

Every data has a signature which can be derived mathematically. All data of any size can be digested into fixed-size signatures. The signatures can be used to identify the data. Unique data has unique signature.

Cryptographic hashing is a mathematical technique to hash or digest a data to reveal its signature. Digesting the same data always produce the same signature. Any minor change on the data will produce significantly different signature. A changed data is a different data.

Data signature, hashing or digesting makes it possible for the data to be represented by its signature into a subsequent signing by combining it with one or more data signatures to produce a new signature representing a larger data set. Eventually, all data can be digested in chunks to produce a single signature.

A signature can be verified by hashing the same data again which will produce the same signature. This introduces data signing-verification concept. In a communication between two parties, the first party starts by hashing a data set to produce the signature. Then he packs both the data set and the signature and send them to the second party. On arrival, the second party will hash the data set and compare the signature with the one given by the first party. If the signatures match then the data set will be treated as complete and original.

The data signing-verification approach as mentioned above will work when there is no harm on the communication channel. A man-in-the-middle may simply change the data set and the signature. Hence, the public-key cryptography was introduced where the data set will be securely signed by the first party using a private key, and to be verified by the second party using a public key. Only the first party can sign the data set since he keeps the private key secret, and anybody with the public key can verify it. The first party will always keep his private key secret, and distribute the public key only to relevant parties.

This particular public-key cryptographic technique encrypts a data signature using a private key to produce encrypted signature. The encrypted signature can only be decrypted using a public key to reveal the original signature. Note that secure data signing has nothing to do with data encryption. It is up to the parties to encrypt the data during communication.

Data signing goes deeper. Proof-of-work (PoW) signing or digesting is a kind of hashing algorithm which requires very high computing power so that a signature becomes very expensive to produce, yet very fast to verify. The idea is to make rehashing unfeasible, and in turn to prevent the data set from being altered at all. A chain of PoW signing will make the data sets even more highly unfeasible from being altered. This leads to eternal data which is a new asset class of information technology.

Data signature is a property that every system must not ignore.

Comments

Popular posts from this blog

Setting Up PyScripter for Quantum GIS

PyScripter is a general purpose Python Integrated Development Environment (IDE). Quantum GIS (QGIS) is a desktop GIS application that can be extended with Python plugins. Both are open source softwares. We intend to use PyScripter as an IDE to build QGIS Python plugin. We are using PyScripter 2.4.1.0 and QGIS 1.6.0 in Windows. PyScripter does not come with Python. On the other hand, QGIS is built in with Python. Thus, we will setup up PyScripter to use the build in Python in QGIS. We assume both PyScripter and QGIS are already installed. Preparing PyScripter batch file We assume that QGIS is installed in C:\OSGeo4W\ folder and PyScripter is installed in C:\Program Files\PyScripter\ . 1. Copy qgis.bat in C:\OSGeo4W\ bin to pyscripter.bat 2. Edit pyscripter.bat to remove the last line that read something like this start "Quantum GIS" /B "%OSGEO4W_ROOT%"\apps\qgis\bin\qgis.exe %* and replace it with this in one line Start "PyScripter" /B "C:\Progr...

Access Control

Access control is about controlling user flow within your application. Do not mistaken access control with security which is a bigger subject in itself. Access control begins by authenticating user and limit his or her activity in your application. An activity is something like creating, updating or deleting a content. There are always finite number of activities that can be done in a given application. Each user can be assigned to a set of activities that he or she is allowed to do. Access control is usually tied to session management. However, you do not need session management to have access control. When a user log in, a session is created so that the user is remembered for the subsequent access. Otherwise the user has to keep on providing his or her credential for each access. We can also keep a list of activities that the user is allowed to do in the session record. Some applications let the session alive indefinitely and some applications time out user after a duration of inacti...

Separation of Front-end and Back-end Concerns

Separation of concerns is the cornerstone of MVC framework. Model, view and controller are three broad concerns of web-based software development. On its early days MVC was implemented on server side. The server renders views for clients. Nowadays, most clients render views themselves. Even the terminology of client-server has already morphed into front-end and back-end . The need for back-end to handle views is diminishing. View concerns have became increasingly complex with two big sub-concerns of aesthetic and dynamics. Front-end evolves into bigger MVC concerns of itself. While back-end evolves into larger modeling concerns. Now, front-end and back-end are two separate concerns. Front-end and back-end are handled by two different teams of software developers with different specialties. Back-end evolves into something like "dinner can be served even without plates, forks and spoons, without table and chairs, and without a dinning room." Front-end is serving the withouts....