0

A digital signature is the following process: - Use message - Hash it (giving digest), encrypt digest with private key. - Append encrypted digest to the message.

  1. Why not just encrypt the message with private key?

I assume that then attacker could just change something, we would be able to decode, but we would get different message than the sent one. We also wouldn't be able to recognize that the message was changed.

  1. Why not just encrypt the message and append the encrypted one to the original message?

I assume the message would be twice the size which is inconvenient for large messages. Also public-private keys have the restriction on message length, which would lead to the need of breaking message into parts.

Are my reasons correct? Something else that I missed?

croraf
  • 163
  • 6
  • 2
  • Encrypting a small amount of data is more convenient than trying to asymmetrically encrypt the entire message. Hashing allows us to generate a unique identifier for the message. 2. Just isn't practical for large messages.
  • – RoraΖ Oct 23 '17 at 18:07
  • Do you agree with the attacking possibility in 1.? – croraf Oct 23 '17 at 18:09
  • Can you please limit your posts to a) one question that is b) within our site scope (which you can check by reading our [about] and [ask] pages) – Rory Alsop Oct 28 '17 at 21:24
  • Why is this too broad. I asked a specific question with two counter examples and my assumptions for why are they not valid. – croraf Oct 28 '17 at 21:41
  • https://security.stackexchange.com/questions/122051/what-is-the-difference-between-a-digital-signature-and-whole-message-encryption?rq=1 what about this – croraf Oct 28 '17 at 21:45