Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is the sort of signing you want to do for code signing related to the sort of signing you want to do as part of an encryption scheme?

This vaguely sounds similar to how RSA decryption/encryption and signing/verification are the same sets of operations, at the primitive level, making it easy to turn a tool that does one in to a tool that also does the other. But the actual high-level signing and encryption systems (e.g. RSA-PSS and RSA-OAEP) are not the same operations at all, and being good at one is no guarantee of being good at another.




> Is the sort of signing you want to do for code signing related to the sort of signing you want to do as part of an encryption scheme?

Same basic concept. Take a blob (compiled code or cyphertext) and a private key and sign it, so can be verified with the public key later.

https://en.wikipedia.org/wiki/Authenticated_encryption

This kind of PGP signing is also critical to the security of Linux software repos. Debian repos sign the contents of the manifest (which includes hashes of packages), and Apt repos sign individual files.


These aren't related at all! Authenticated encryption uses a symmetric MAC. Code signing is asymmetric.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: