SlideShare a Scribd company logo
1 of 29
Digital Signatures
Lowry Memorial
College
G.N. Joel
digital signature
Outline
 What is digital signature?
 security services and attacks on digital
signature
 Digital signatures scheme
 RSA digital signature
 Digital Signature Standard (DSS)
 Elliptic curve digital signature
Lowry Memorial
College
G.N. Joel
digital signature
1. What is digital signature?
 Signature is a proof that a document
come from the correct source.
 When A sends message to B, B
needs to check the authenticity of
sender.
 Digital signature is a process of
signing a message with sender’s
private key.
Lowry Memorial
College
G.N. Joel
digital signature
Lowry Memorial
College
G.N. Joel
digital signature
Comparison
Between conventional and Digital signature
Lowry Memorial
College
G.N. Joel
digital signature
 Conventional signature is included in the
document.
 Conventional is part of document.
 Digital signature is separate from
documents.
 In digital signature:
The receiver receives Message and signature
and verify the sender’s signature.
Lowry Memorial
College
G.N. Joel
digital signature
2. Relationship
 In conventional signature: is one to many
relation between signature and documents.
 A person uses same signature to signs many
documents.
 Digital signature, one to one relationship
Lowry Memorial
College
G.N. Joel
digital signature
3. Verification method
 In conventional signature, a receiver
compare a signature with the one in
the files.
 Digital signature, a copy of signature
is not stored any where.
 The receiver apply verification
techniques to the message
Lowry Memorial
College
G.N. Joel
digital signature
2.Process of digital signature
 The sender uses signing algorithm to
sign the message.
 The message and signature are sent
to the receiver.
 The receiver receives message and
signature.
 Receiver applies verifying algorithm if
result is true, the message is
accepted, else it is rejected.
Lowry Memorial
College
G.N. Joel
digital signature
Digital Signature Process
Lowry Memorial
College
G.N. Joel
digital signature
Cont’s
 Add Keys to Signature:
Lowry Memorial
College
G.N. Joel
digital signature
 The sender uses his private key,
applied to a signing algorithm to
sign a document.
 The receiver uses the public key
of the sender, applied to verifying
algorithm to verify a document
Lowry Memorial
College
G.N. Joel
digital signature
Symmetric-key
ciphers:
Block ciphers
Stream ciphers
Public-key
ciphers
Digital Signatures services
Lowry Memorial
College
G.N. Joel
digital signature
Services
Confidentiality Data integrity Authentication Non-repudiation
Message authentication
Entity authenticationArbitrary length
hash functions
Message
Authentication
codes (MACs)
Digital signatures
Authentication
primitives
Digital signatures
MACs
Digital
signatures
Forgery Types
 If the attack is successful, then the
result is forgery.
 There Two types:
 Existential
 Selective
Lowry Memorial
College
G.N. Joel
digital signature
1. Existential forgery
• The eve(attacker) may be able to
create a valid message-signature pair.
• On other hand she can not use.
Lowry Memorial
College
G.N. Joel
digital signature
Cont.'s
2. Selective forgery
The eve may be able to forge sender’s
signature on a message with the
content selectively chosen by eve
Lowry Memorial
College
G.N. Joel
digital signature
Digital Signature Scheme
1. RSA digital signature
2. ElGamal digital signature
3. Schnorr Digital signature
4. Digital Signature Standard(DSS)
5. Elliptic Curve Digital Signature
Lowry Memorial
College
G.N. Joel
digital signature
RSA signature algorithm
Lowry Memorial
College
G.N. Joel
digital signature
RSA
 Developed in 1978 by Rivest, Shamir and
Adleman (RSA)
 Most popular public key cryptosystem
 Based on the hard problem of “integer
factorization”
Lowry Memorial
College
G.N. Joel
digital signature
RSA Digital Signature scheme
 Following are the steps:
I. the private key and public key
belongs to the sender.
II. The sender uses his private key to
sign a document.
III.The receiver uses sender’s public to
verify a document.
Lowry Memorial
College
G.N. Joel
digital signature
Key-Generation for RSA(1)
1. Generate two large random distinct primes
p and q, each roughly the same size
2. Compute n = pq and
3. Select random integer e:
1<e< ⌀ (n), such that gcd(e, ⌀)=1
2. Compute unique integer d:
1<d<⌀ (n), such that ed=1 mod ⌀ (n)
2. Public key is (n, e); Private key is d
( ) ( 1)( 1)n p q   
Lowry Memorial
College
G.N. Joel
digital signature
RSA signature generation and verification
 Signing a message :
Lowry Memorial
College
G.N. Joel
digital signature
Alice creates a signature out of the message using her
private exponent S=M
d
modn and sends the message
and the signature to Bob
 Verifying:
Bob receives M and S, bob applies alice’s public
exponent to the signature to create a copy of the
message M=S
e
mod n
Lowry Memorial
College
G.N. Joel
digital signature
RSA signature example
Alice
 p=5 q=7 n = 35 φ(n) = 4·6=24
 e = 5; d: ed = 5d=1 mod 24 => d = 5
Public key: (n=35, e=5) Private key: d=5
 M = [0, n-1]
 For all m Є M R(m)=m
 m = 26; R(m) = 26 s = 265 mod 35 = 31
Bob:
 R(m) = 315 mod 35 = 26 Є [0, n-1]
 m = R-1(m) = 26
m~
m~
Lowry Memorial
College
G.N. Joel
digital signature
Possible Attacks on RSA signature
 Integer factorization
 If an adversary is able to factor n, then
 Multiplicative property of RSA
 If , then s is valid signature for m:
 Hence, to avoid this attack R must not be
multiplicative, i.e.
))n((ed:d)q)(p()n(,pqn  modfindand 111 
)n(ss)m~m~(m~sm~m~m~
)n(modm~s
)n(modm~s dd
d
d
modthenif 212121
22
11



Lowry Memorial
College
G.N. Joel
digital signature
RMm~  )m(Rm~ 
)b(R)a(R)ba(RMb,a 
26
Digital Signature Standard(DSS)
The DSS is a collection of procedures
and standards for generating a digital
signature used for authenticating
electronic documents.
Lowry Memorial
College
G.N. Joel
digital signature
 The Digital Signature Standard is
intended to be used:
 In electronic funds transfer.
 In software distribution, electronic mail,
data storage and applications which require
high data integrity assurance.
Lowry Memorial
College
G.N. Joel
digital signature
The Elliptic Curve Digital Signature
Algorithm (ECDSA)
Lowry Memorial College
G.N. Joel
digital signature

More Related Content

What's hot

Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 
Electronic Payment Systems
Electronic Payment SystemsElectronic Payment Systems
Electronic Payment Systemsitsvineeth209
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Exploring The Secret of Source Coding and Cryptograpic Coding
Exploring The Secret of Source Coding and Cryptograpic CodingExploring The Secret of Source Coding and Cryptograpic Coding
Exploring The Secret of Source Coding and Cryptograpic CodingLesa Cote
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocolsLê Liêu
 

What's hot (8)

Digital signature
Digital signatureDigital signature
Digital signature
 
Electronic Payment Systems
Electronic Payment SystemsElectronic Payment Systems
Electronic Payment Systems
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
 
Nonlinear Communications: Achievable Rates, Estimation, and Decoding
Nonlinear Communications: Achievable Rates, Estimation, and DecodingNonlinear Communications: Achievable Rates, Estimation, and Decoding
Nonlinear Communications: Achievable Rates, Estimation, and Decoding
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Exploring The Secret of Source Coding and Cryptograpic Coding
Exploring The Secret of Source Coding and Cryptograpic CodingExploring The Secret of Source Coding and Cryptograpic Coding
Exploring The Secret of Source Coding and Cryptograpic Coding
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 

Similar to Digital signatures

CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.pptjayarao21
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
L-2.10 Digital Signatures.pptx
L-2.10 Digital Signatures.pptxL-2.10 Digital Signatures.pptx
L-2.10 Digital Signatures.pptxSpartanKing7
 
Non-Transferable Signatures with PGP
Non-Transferable Signatures with PGPNon-Transferable Signatures with PGP
Non-Transferable Signatures with PGPblogzilla
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cnDhaval Bhatia
 
Digital_signature[1]and its basics .pptx
Digital_signature[1]and its basics .pptxDigital_signature[1]and its basics .pptx
Digital_signature[1]and its basics .pptxneonaveen
 

Similar to Digital signatures (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
L-2.10 Digital Signatures.pptx
L-2.10 Digital Signatures.pptxL-2.10 Digital Signatures.pptx
L-2.10 Digital Signatures.pptx
 
Sindhu priya .s
Sindhu priya .sSindhu priya .s
Sindhu priya .s
 
Non-Transferable Signatures with PGP
Non-Transferable Signatures with PGPNon-Transferable Signatures with PGP
Non-Transferable Signatures with PGP
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Jdbc 7
Jdbc 7Jdbc 7
Jdbc 7
 
Digital Signature.ppt
Digital Signature.pptDigital Signature.ppt
Digital Signature.ppt
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
Ds over
Ds overDs over
Ds over
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
Digital_signature[1]and its basics .pptx
Digital_signature[1]and its basics .pptxDigital_signature[1]and its basics .pptx
Digital_signature[1]and its basics .pptx
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Digital signatures

  • 2. Outline  What is digital signature?  security services and attacks on digital signature  Digital signatures scheme  RSA digital signature  Digital Signature Standard (DSS)  Elliptic curve digital signature Lowry Memorial College G.N. Joel digital signature
  • 3. 1. What is digital signature?  Signature is a proof that a document come from the correct source.  When A sends message to B, B needs to check the authenticity of sender.  Digital signature is a process of signing a message with sender’s private key. Lowry Memorial College G.N. Joel digital signature
  • 5. Comparison Between conventional and Digital signature Lowry Memorial College G.N. Joel digital signature
  • 6.  Conventional signature is included in the document.  Conventional is part of document.  Digital signature is separate from documents.  In digital signature: The receiver receives Message and signature and verify the sender’s signature. Lowry Memorial College G.N. Joel digital signature
  • 7. 2. Relationship  In conventional signature: is one to many relation between signature and documents.  A person uses same signature to signs many documents.  Digital signature, one to one relationship Lowry Memorial College G.N. Joel digital signature
  • 8. 3. Verification method  In conventional signature, a receiver compare a signature with the one in the files.  Digital signature, a copy of signature is not stored any where.  The receiver apply verification techniques to the message Lowry Memorial College G.N. Joel digital signature
  • 9. 2.Process of digital signature  The sender uses signing algorithm to sign the message.  The message and signature are sent to the receiver.  The receiver receives message and signature.  Receiver applies verifying algorithm if result is true, the message is accepted, else it is rejected. Lowry Memorial College G.N. Joel digital signature
  • 10. Digital Signature Process Lowry Memorial College G.N. Joel digital signature
  • 11. Cont’s  Add Keys to Signature: Lowry Memorial College G.N. Joel digital signature
  • 12.  The sender uses his private key, applied to a signing algorithm to sign a document.  The receiver uses the public key of the sender, applied to verifying algorithm to verify a document Lowry Memorial College G.N. Joel digital signature
  • 13. Symmetric-key ciphers: Block ciphers Stream ciphers Public-key ciphers Digital Signatures services Lowry Memorial College G.N. Joel digital signature Services Confidentiality Data integrity Authentication Non-repudiation Message authentication Entity authenticationArbitrary length hash functions Message Authentication codes (MACs) Digital signatures Authentication primitives Digital signatures MACs Digital signatures
  • 14. Forgery Types  If the attack is successful, then the result is forgery.  There Two types:  Existential  Selective Lowry Memorial College G.N. Joel digital signature
  • 15. 1. Existential forgery • The eve(attacker) may be able to create a valid message-signature pair. • On other hand she can not use. Lowry Memorial College G.N. Joel digital signature
  • 16. Cont.'s 2. Selective forgery The eve may be able to forge sender’s signature on a message with the content selectively chosen by eve Lowry Memorial College G.N. Joel digital signature
  • 17. Digital Signature Scheme 1. RSA digital signature 2. ElGamal digital signature 3. Schnorr Digital signature 4. Digital Signature Standard(DSS) 5. Elliptic Curve Digital Signature Lowry Memorial College G.N. Joel digital signature
  • 18. RSA signature algorithm Lowry Memorial College G.N. Joel digital signature
  • 19. RSA  Developed in 1978 by Rivest, Shamir and Adleman (RSA)  Most popular public key cryptosystem  Based on the hard problem of “integer factorization” Lowry Memorial College G.N. Joel digital signature
  • 20. RSA Digital Signature scheme  Following are the steps: I. the private key and public key belongs to the sender. II. The sender uses his private key to sign a document. III.The receiver uses sender’s public to verify a document. Lowry Memorial College G.N. Joel digital signature
  • 21. Key-Generation for RSA(1) 1. Generate two large random distinct primes p and q, each roughly the same size 2. Compute n = pq and 3. Select random integer e: 1<e< ⌀ (n), such that gcd(e, ⌀)=1 2. Compute unique integer d: 1<d<⌀ (n), such that ed=1 mod ⌀ (n) 2. Public key is (n, e); Private key is d ( ) ( 1)( 1)n p q    Lowry Memorial College G.N. Joel digital signature
  • 22. RSA signature generation and verification  Signing a message : Lowry Memorial College G.N. Joel digital signature Alice creates a signature out of the message using her private exponent S=M d modn and sends the message and the signature to Bob  Verifying: Bob receives M and S, bob applies alice’s public exponent to the signature to create a copy of the message M=S e mod n
  • 24. RSA signature example Alice  p=5 q=7 n = 35 φ(n) = 4·6=24  e = 5; d: ed = 5d=1 mod 24 => d = 5 Public key: (n=35, e=5) Private key: d=5  M = [0, n-1]  For all m Є M R(m)=m  m = 26; R(m) = 26 s = 265 mod 35 = 31 Bob:  R(m) = 315 mod 35 = 26 Є [0, n-1]  m = R-1(m) = 26 m~ m~ Lowry Memorial College G.N. Joel digital signature
  • 25. Possible Attacks on RSA signature  Integer factorization  If an adversary is able to factor n, then  Multiplicative property of RSA  If , then s is valid signature for m:  Hence, to avoid this attack R must not be multiplicative, i.e. ))n((ed:d)q)(p()n(,pqn  modfindand 111  )n(ss)m~m~(m~sm~m~m~ )n(modm~s )n(modm~s dd d d modthenif 212121 22 11    Lowry Memorial College G.N. Joel digital signature RMm~  )m(Rm~  )b(R)a(R)ba(RMb,a 
  • 27. The DSS is a collection of procedures and standards for generating a digital signature used for authenticating electronic documents. Lowry Memorial College G.N. Joel digital signature
  • 28.  The Digital Signature Standard is intended to be used:  In electronic funds transfer.  In software distribution, electronic mail, data storage and applications which require high data integrity assurance. Lowry Memorial College G.N. Joel digital signature
  • 29. The Elliptic Curve Digital Signature Algorithm (ECDSA) Lowry Memorial College G.N. Joel digital signature