SlideShare a Scribd company logo
1 of 15
BASIC CRYPTO PRIMITIVES - II
2
• Cryptographically Secured Hash Function
– CollisionFree
– Information Hiding
– Puzzle Friendly
• Hash Pointers and Data Structures
– Hashchain
– Hash Tree – Merkle Tree
• A digital code, which can be included with an electronically transmitted
document to verify
– The content of the document isauthenticated
– The identity of thesender
– Prevent non-repudiation – sender will not be able to deny about the
origin of the document
• Only the signing authority can sign a document, but everyone can verify
the signature
• Signature is associated with the particular document
– Signature of one document cannot be transferred to another document
• Also known as asymmetrical cryptography or asymmetric key
cryptography
• Key: A parameter that determines the functional output of a cryptography
algorithm
• Properties of a cryptographic key (you need to prevent it from being
guessed)
– Generate the key truly randomly so that the attacker can not guess it
– The key should be of sufficient length – increasing the length makes
the key difficult to guess
– The key should contain sufficient entropy, all the bits in the key should
be equally random
• Two keys are used
– Private key: Only Alice has her privatekey
– Public key: “Public” to everyone – everyone knows Alice’s publickey
Encrypt the
message with
Bob’s public key
𝑩
𝑩
𝑴
𝑴
′ = 𝑬
𝑬
(
𝑴
𝑴
,𝑲
𝑲
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑
)
Encrypt the
message with his
private key
𝑴
𝑴= 𝑬
𝑬
(
𝑴
𝑴
′
,𝑲
𝑲
𝑩
𝑩 )
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑
M’
• Four phases
– Key generation
– Key distribution
– Encryption
– Decryption
• Sign the message using the Private key
– Only Alice can know her private key
• Verify the signature using the Public key
– Everyone has Alice’s public key and they can verify thesignature
Sign the message
with her private
key
𝑨
𝑨
𝑴
𝑴
′ = 𝑬
𝑬
(
𝑴
𝑴
,𝑲
𝑲
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑
)
Verify the
signature using
Alice’s public key
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑
𝑴
𝑴= 𝑬
𝑬
(
𝑴
𝑴
′
,𝑲
𝑲
𝑨
𝑨 )
M, M’
• Use the message digest to sign, instead of the original message
Sign the message
with her private key
𝑺
𝑺= 𝑬
𝑬
(
𝑯
𝑯
(
𝑴
𝑴
)
,𝑲
𝑲
𝑨
𝑨 )
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑 𝑨
𝑨
Verify the signature
using Alice’s public key
𝑯
𝑯
(
𝑴
𝑴
)= 𝑬
𝑬
(
𝑺
𝑺
,𝑲
𝑲
𝒑
𝒑
𝒑
𝒑
𝒑
𝒑
)
M, S
• Used to validate the origin of a transaction
– Prevent non-repudiation
• Alice can not deny her own transactions
• No one else can claim Alice’s transaction as his/her own transaction
• Bitcoin uses Elliptic Curve Digital Signature Algorithm (ECDSA)
– Based on elliptic curvecryptography
– Supports good randomness in keygeneration
• Alice generates 10 coins
• Sign the transaction A:10 using Alice’s private key and put that in the
blockchain
A:10, Sig(A)
 A:10, Sig(A)
 • Alice transfers 5 coins to Bob
 • Sign the transaction A-B:5 using Alice’s private key and put that in
the blockchain
H(0) H(1)
A->B:5, Sig(A)
• Maintain the economy
– Generate new coins withtime
– Delete old coins withtime
• A central authority like bank can create and destroy coins based on
economic policies
• Crucial Question: How can we distribute coin management (creation and
destroy)
20

More Related Content

Similar to crypto.pptx

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxskknowledge
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptxMaryam522887
 
Cryptography
CryptographyCryptography
CryptographyPPT4U
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysisBARATH800940
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffffmaninthemirrorrror
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptnicolausalex722
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptjamkhan10
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptvimalguptaofficial
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptMuhammadShajid1
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 

Similar to crypto.pptx (20)

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA Algoritmn
RSA AlgoritmnRSA Algoritmn
RSA Algoritmn
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 

Recently uploaded

B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfparaspiyush3
 
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024Hector Del Castillo, CPM, CPMM
 
Job Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJob Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJon Stephenson
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024Bruce Bennett
 
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样qyguxu
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALCaitlinCummins3
 
Kathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleenMcBride8
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样qyguxu
 
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证B
 
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样qyguxu
 
We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!Juli Boned
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfrach3246
 
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样qyguxu
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证gkyvm
 
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证gakamzu
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 25203records
 
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .Dr. David Burkett
 

Recently uploaded (20)

B. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdfB. A. (Prog.) Political Science 6th Semester 2019.pdf
B. A. (Prog.) Political Science 6th Semester 2019.pdf
 
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
WIOA Program Info Session | PMI Silver Spring Chapter | May 17, 2024
 
Job Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJob Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptx
 
LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024LinkedIn For Job Search Presentation May 2024
LinkedIn For Job Search Presentation May 2024
 
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
如何办理(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
 
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOALBLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
BLAHALIFHKSDFOILEWKHJSFDNLDSKFN,DLFKNFMELKFJAERPIOAL
 
Kathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdfKathleen McBride Costume Design Resume.pdf
Kathleen McBride Costume Design Resume.pdf
 
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
如何办理(USYD毕业证书)悉尼大学毕业证成绩单原件一模一样
 
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
一比一原版(UQ毕业证书)澳大利亚昆士兰大学毕业证成绩单学位证
 
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
如何办理(CBU毕业证书)浸会大学毕业证成绩单原件一模一样
 
We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!We’re looking for a Technology consultant to join our Team!
We’re looking for a Technology consultant to join our Team!
 
Rahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdfRahul Chauhan - Data Scientist Resume.pdf
Rahul Chauhan - Data Scientist Resume.pdf
 
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotecAbortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
Abortion pills in Jeddah Saudi Arabia (+966572737505) buy cytotec
 
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(NEU毕业证书)东北大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样
如何办理(UNTEC毕业证书)新西兰联合理工学院毕业证成绩单原件一模一样
 
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(USC毕业证书)南加利福尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UST毕业证书)圣托马斯大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UIUC毕业证书)UIUC毕业证香槟分校毕业证成绩单本科硕士学位证留信学历认证
 
Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2Prest Reed Portfolio revamp Full Sail Presentation 2
Prest Reed Portfolio revamp Full Sail Presentation 2
 
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
CV OF Dr. David Burkett | Cardiologist and Electrophysiologist .
 

crypto.pptx

  • 2. • Cryptographically Secured Hash Function – CollisionFree – Information Hiding – Puzzle Friendly • Hash Pointers and Data Structures – Hashchain – Hash Tree – Merkle Tree
  • 3. • A digital code, which can be included with an electronically transmitted document to verify – The content of the document isauthenticated – The identity of thesender – Prevent non-repudiation – sender will not be able to deny about the origin of the document
  • 4. • Only the signing authority can sign a document, but everyone can verify the signature • Signature is associated with the particular document – Signature of one document cannot be transferred to another document
  • 5. • Also known as asymmetrical cryptography or asymmetric key cryptography • Key: A parameter that determines the functional output of a cryptography algorithm
  • 6. • Properties of a cryptographic key (you need to prevent it from being guessed) – Generate the key truly randomly so that the attacker can not guess it – The key should be of sufficient length – increasing the length makes the key difficult to guess – The key should contain sufficient entropy, all the bits in the key should be equally random
  • 7. • Two keys are used – Private key: Only Alice has her privatekey – Public key: “Public” to everyone – everyone knows Alice’s publickey Encrypt the message with Bob’s public key 𝑩 𝑩 𝑴 𝑴 ′ = 𝑬 𝑬 ( 𝑴 𝑴 ,𝑲 𝑲 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 ) Encrypt the message with his private key 𝑴 𝑴= 𝑬 𝑬 ( 𝑴 𝑴 ′ ,𝑲 𝑲 𝑩 𝑩 ) 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 M’
  • 8. • Four phases – Key generation – Key distribution – Encryption – Decryption
  • 9. • Sign the message using the Private key – Only Alice can know her private key • Verify the signature using the Public key – Everyone has Alice’s public key and they can verify thesignature Sign the message with her private key 𝑨 𝑨 𝑴 𝑴 ′ = 𝑬 𝑬 ( 𝑴 𝑴 ,𝑲 𝑲 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 ) Verify the signature using Alice’s public key 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 𝑴 𝑴= 𝑬 𝑬 ( 𝑴 𝑴 ′ ,𝑲 𝑲 𝑨 𝑨 ) M, M’
  • 10. • Use the message digest to sign, instead of the original message Sign the message with her private key 𝑺 𝑺= 𝑬 𝑬 ( 𝑯 𝑯 ( 𝑴 𝑴 ) ,𝑲 𝑲 𝑨 𝑨 ) 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 𝑨 𝑨 Verify the signature using Alice’s public key 𝑯 𝑯 ( 𝑴 𝑴 )= 𝑬 𝑬 ( 𝑺 𝑺 ,𝑲 𝑲 𝒑 𝒑 𝒑 𝒑 𝒑 𝒑 ) M, S
  • 11. • Used to validate the origin of a transaction – Prevent non-repudiation • Alice can not deny her own transactions • No one else can claim Alice’s transaction as his/her own transaction • Bitcoin uses Elliptic Curve Digital Signature Algorithm (ECDSA) – Based on elliptic curvecryptography – Supports good randomness in keygeneration
  • 12. • Alice generates 10 coins • Sign the transaction A:10 using Alice’s private key and put that in the blockchain A:10, Sig(A)
  • 13.  A:10, Sig(A)  • Alice transfers 5 coins to Bob  • Sign the transaction A-B:5 using Alice’s private key and put that in the blockchain H(0) H(1) A->B:5, Sig(A)
  • 14. • Maintain the economy – Generate new coins withtime – Delete old coins withtime • A central authority like bank can create and destroy coins based on economic policies • Crucial Question: How can we distribute coin management (creation and destroy)
  • 15. 20