SlideShare a Scribd company logo
1 of 26
Digital Signature
Group 5
Chu Huu Thanh 4C13
Phan The Minh 4C13
Tran Thi Thu 4C13
Nguyen Thi Thuy Ngan 4C13
Definition:
 A digital signature for an electronic message is equivalent to a
personal signature on a written document.
 It is created by using a form of cryptography.
 A unique electronic binding of the identity of the signer to the
origin of the message is provided by the digital signature on a
message.
 It make the proof of the message origin and a method to verify the
integrity of the message.
Model of Digital Signature
- Signer feeds data to the hash function and generates hash of data.
- Signature is appended to the data and then both are sent to the verifier.
- The verification algorithm gives some value as output.
- This hash value and output of verification algorithm are compared. Based on the comparison
result, verifier decides whether the digital signature is valid.
- digital signature is created by ‘private’ key of signer.
RSA is a public-key cryptosystem, it was invented in 1977 by Ronald L. Rivest .Public-
key cryptography, also known as asymmetric cryptography. It uses that key pair for
encryption and decryption.
•Public key:key to encrypt
•Private key:key to decrypt
•Plaintext: original format
•Ciphertext: data encrypted
•Encryption:is the process of converting the original data into data encryption
•Decryption: is the reverse process of coding , data transformation is encoded into the
original format .
II.RS
A
Processsing: The data will be encrypted with the recipient’s public key in order to
just only he/she can read it by hash function, which creates X.Then the recipient
use his/her private key which only he/she know to decrypt X to see the content of
sender’s message.
Advantages
 Security and convenience
 Key distribution much
easier
 Disadvantages
 Low speed
 Easy fake
 No repudiation.
ADVANTAGES AND DISADVANTAGES OF
RSA ALGORITHM
RSA variants:
The objectives behind these variants are either to improve RSA decryption
time, to accelerate RSA encryption time or to rebalance RSA encryption and
decryption time:
 Rebalanced RSA-CRT variant
 Rebalance RSA-CRT scheme A
 Rebalance RSA-CRT scheme B
 Mprime RSA variant
 Rprime RSA
 RAM-RSA
 RBM-RSA
The Elliptic Curve
The Elliptic Curve
An elliptic curve E is the graph of points of the plane curve defined by the
Weierstrass-equation: y^2 = x^3 + ax + b (mod p),(i, j)
A Geometric Approach
 Adding two points on
an ellipse
 Adding two points reflected
across the x-axis
A Geometric Approach
Doubling the point P
Doubling P when y-coordinate is
zero
The Elliptic Curve in a picture
Why Signing with ECC?
 Key pair generation:
Randomly select d [1, n-1].∈
Compute Q=dP, P, Q is a point on the curve
(Public key is Q, private key is d)
The naive algorithm to draw the d from Q is the
computation of a sequence of points P, 2P, 3P, 4P, until
Q=dP.
If we know d and P, finding Q is an easy work. But if we
know Q and GP, finding the PK is hard because it
requires us to solve the discrete logarithm problem.
III.
 The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic
curve analogue of the Digital Signature Algorithm (DSA). A digital
signature scheme should be existentially non-forgeable under chosen
message attack. The ECDSA have a smaller key size, which makes
faster computation time and reduction in processing power, storage
space and bandwidth. This makes the ECDSA ideal for constrained
devices such as pagers and smart cards.
ECDSA in Bitcoin
 Algorithm
In ECDSA, the signature generation and verification is similar to DSA,
but the key generation is based on ECC algorithm. A digital signature
scheme typically includes three algorithms:
 A key generation algorithm that selects a private key uniformly
at random from a set of possible private keys. The algorithm outputs
the private key and a corresponding public key.
 A signing algorithm that, given a message and a private key,
produces a signature.
 A signature verifying algorithm that, given a message, public
key and a signature, either accepts or rejects the message’s claim to
authenticity.
Implementation
Result - ECC
Result - RSA
DEMO
By Mr. Silver
Final ss2-digital-signature-group5

More Related Content

What's hot

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
municsaa
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 

What's hot (20)

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric EncryptionCryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
Cryptography
CryptographyCryptography
Cryptography
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Viewers also liked

Network components
Network componentsNetwork components
Network components
Anas Karzoun
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
Dipak Badhe
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 

Viewers also liked (20)

AllBits presentation - Security in Theory
AllBits presentation - Security in TheoryAllBits presentation - Security in Theory
AllBits presentation - Security in Theory
 
Network components
Network componentsNetwork components
Network components
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
 
Dcn ppt-transmission media
Dcn  ppt-transmission mediaDcn  ppt-transmission media
Dcn ppt-transmission media
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
3 d image processsing operations
3 d image processsing operations3 d image processsing operations
3 d image processsing operations
 
Network topology
Network topologyNetwork topology
Network topology
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similar to Final ss2-digital-signature-group5

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
Tuhin_Das
 

Similar to Final ss2-digital-signature-group5 (20)

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Encryption
EncryptionEncryption
Encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Final ss2-digital-signature-group5

  • 1. Digital Signature Group 5 Chu Huu Thanh 4C13 Phan The Minh 4C13 Tran Thi Thu 4C13 Nguyen Thi Thuy Ngan 4C13
  • 2. Definition:  A digital signature for an electronic message is equivalent to a personal signature on a written document.  It is created by using a form of cryptography.  A unique electronic binding of the identity of the signer to the origin of the message is provided by the digital signature on a message.  It make the proof of the message origin and a method to verify the integrity of the message.
  • 3. Model of Digital Signature - Signer feeds data to the hash function and generates hash of data. - Signature is appended to the data and then both are sent to the verifier. - The verification algorithm gives some value as output. - This hash value and output of verification algorithm are compared. Based on the comparison result, verifier decides whether the digital signature is valid. - digital signature is created by ‘private’ key of signer.
  • 4.
  • 5. RSA is a public-key cryptosystem, it was invented in 1977 by Ronald L. Rivest .Public- key cryptography, also known as asymmetric cryptography. It uses that key pair for encryption and decryption. •Public key:key to encrypt •Private key:key to decrypt •Plaintext: original format •Ciphertext: data encrypted •Encryption:is the process of converting the original data into data encryption •Decryption: is the reverse process of coding , data transformation is encoded into the original format . II.RS A
  • 6. Processsing: The data will be encrypted with the recipient’s public key in order to just only he/she can read it by hash function, which creates X.Then the recipient use his/her private key which only he/she know to decrypt X to see the content of sender’s message.
  • 7. Advantages  Security and convenience  Key distribution much easier  Disadvantages  Low speed  Easy fake  No repudiation. ADVANTAGES AND DISADVANTAGES OF RSA ALGORITHM
  • 8. RSA variants: The objectives behind these variants are either to improve RSA decryption time, to accelerate RSA encryption time or to rebalance RSA encryption and decryption time:  Rebalanced RSA-CRT variant  Rebalance RSA-CRT scheme A  Rebalance RSA-CRT scheme B  Mprime RSA variant  Rprime RSA  RAM-RSA  RBM-RSA
  • 10. The Elliptic Curve An elliptic curve E is the graph of points of the plane curve defined by the Weierstrass-equation: y^2 = x^3 + ax + b (mod p),(i, j)
  • 11. A Geometric Approach  Adding two points on an ellipse  Adding two points reflected across the x-axis
  • 12. A Geometric Approach Doubling the point P Doubling P when y-coordinate is zero
  • 13. The Elliptic Curve in a picture
  • 14. Why Signing with ECC?  Key pair generation: Randomly select d [1, n-1].∈ Compute Q=dP, P, Q is a point on the curve (Public key is Q, private key is d) The naive algorithm to draw the d from Q is the computation of a sequence of points P, 2P, 3P, 4P, until Q=dP. If we know d and P, finding Q is an easy work. But if we know Q and GP, finding the PK is hard because it requires us to solve the discrete logarithm problem.
  • 15. III.  The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). A digital signature scheme should be existentially non-forgeable under chosen message attack. The ECDSA have a smaller key size, which makes faster computation time and reduction in processing power, storage space and bandwidth. This makes the ECDSA ideal for constrained devices such as pagers and smart cards.
  • 18. In ECDSA, the signature generation and verification is similar to DSA, but the key generation is based on ECC algorithm. A digital signature scheme typically includes three algorithms:  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message’s claim to authenticity.
  • 19.
  • 20.
  • 21.