mirror of
https://codeberg.org/openpgp/notes.git
synced 2024-11-22 23:52:05 +01:00
edit ch7 inline signatures
This commit is contained in:
parent
17d43e0e91
commit
e6b9c11a3d
1 changed files with 15 additions and 10 deletions
|
@ -54,15 +54,18 @@ This method is commonly used for signing or encrypting emails. Most email softwa
|
|||
|
||||
An inline-signed OpenPGP message consists of three segments:
|
||||
|
||||
- One or more [One-Pass Signature packets](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#one-pass-sig),
|
||||
- the original data, wrapped in a [Literal Data packet](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#lit),
|
||||
- the corresponding Data Signature packets.
|
||||
1. **One-pass signature packets**: These one or more packets precede the signed data and enable signature computation in one pass. See[One-Pass Signature Packet (Type ID 4)](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#one-pass-sig) of the RFC.
|
||||
|
||||
2. **Literal data**: This is the original data (e.g., the body of a message) that the user wishes to encrypt or sign, without additional interpretation or conversion. [Literal Data Packet (Type ID 11)](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#lit).
|
||||
|
||||
3. **Data signature packets**: These contain the cryptographic signature corresponding to the original data.
|
||||
|
||||
|
||||
#### Creation
|
||||
|
||||
To produce an inline signature, the signer processes the entirety of the data by reading from an input file and writing into am output OpenPGP message file. The signer calculates a cryptographic signature over the course of this process. Therefore, an efficient signer can only emit the resulting data signature packet at the end of this process, and thus store it at the end of the data stream.
|
||||
To produce an inline signature, the signer processes the entirety of the data by reading from an input file and writing into am output OpenPGP message file. As the data is processed, the signer simultaneously calculates a cryptographic signature. This procedure results in a data signature packet being appended to the output OpenPGP message file, an essential step for efficient signing.
|
||||
|
||||
On the other hand, an efficient verifying application needs to know how to process the literal data before reading it. This is the purpose of the so-called One-Pass Signature packets in the first segment of inline-signed messages. One-Pass Signature packets contain the fingerprint of the signing key, as well as the hash algorithm used to calculate the hash digest for the signature.
|
||||
For efficient verification, an application must understand how to handle the literal data prior to its reading. This requirement is addressed by the One-Pass Signature packets located at the beginning of inline-signed messages. These packets include essential information such as the fingerprint of the signing key and the hash algorithm used for computing the signature's hash digest. This setup enables the verifier to process the data correctly and efficiently.
|
||||
|
||||
```{admonition} TODO
|
||||
:class: warning
|
||||
|
@ -72,13 +75,15 @@ Is the signer keyid/fingerprint in the OPS important for the verifier to be able
|
|||
|
||||
#### Verification
|
||||
|
||||
This structure allows verifying applications to verify inline-signed messages in *one pass*:
|
||||
Inline-signed messages enable efficient verification in *one pass*, structured as follows:
|
||||
|
||||
- The One-Pass Signature packets initiate the verification process,
|
||||
- the literal data can then be processed (which means: it gets hashed),
|
||||
- the signature packets at the end of the message can be verified against the hash digest that the previous step calculated.
|
||||
1. **Initiation with One-Pass Signature packets**: These packets begin the verification process. They include the signer's key ID/fingerprint, essential for identifying the appropriate public key for signature validation.
|
||||
|
||||
2. **Processing the literal data**: This step involves hashing the literal data, preparing it for signature verification.
|
||||
|
||||
Note that the final step of verifying the cryptographic signature requires access to the signer's public key material. This public key material is not included in the signed message. The verifier must obtain the signer's public key data out-of-band (e.g. by obtaining the signer's certificate from a key server).
|
||||
3. **Verifying signature packets**: Located at the end of the message, these packets are checked against the previously calculated hash digest.
|
||||
|
||||
Important to note, the signer's public key, critical for the final verification step, is not embedded in the message. Verifiers must acquire this key externally (e.g., from a key server) to authenticate the signature successfully.
|
||||
|
||||
### Cleartext signatures
|
||||
|
||||
|
|
Loading…
Reference in a new issue