The public key of the certificate is used to verify a
certificate. Depending on the format that the digital signature was
generated in, this operation may require the original file that was signed and
the digital signature in a separate file because the digital signature is used
in the verification. To verify a file using a certificate, take the
following steps:
Select and highlight the certificate to be used to verify.
Right click and scroll to Verify File on the
popup menu.
The following dialog box is displayed:
Fill in the information for the following entries in the dialog
box:
Signed File. Enter the full path name of the file
to verify. Click (..) to browse the file.
This entry is not required for SignedData format since the
signed file is in the digital signature.
Signature File. Enter the full path name of the
file containing the digital signature of the file to verify. Click (..)
to browse the file.
Algorithm. Select the algorithm used to sign the
file. Available algorithms depend on the service provider used to open
the certificate store.
Signature Format. Enter the format of the digital
signature. The following options are currently available:
Signed Hash. This format is based on generating the
hash of the file and then digitally signing the hash.
Signed Data. This format follows the PKCS#7
SignedData format. The signed file is embedded together with the digital
signature.
Signed Data (Detached). This format follows the
PKCS#7 SignedData format. The signed file is detached from the digital
signature.
Verified File. Enter the full file path of the
resulting verified file. Click (..) to browse for the target path.
This entry is required only for the SignedData format.
Since the signed file is in the digital signature, it will be extracted and
saved to the specified target path during verification.
Click OK to accept entries and begin file verification.