SlideShare a Scribd company logo
1 of 35
13.1
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 13
Digital Signature
13.2
Objectives
 To define a digital signature
 To define security services provided by a digital
signature
 To define attacks on digital signatures
 To discuss some digital signature schemes, including
RSA, ElGamal,
 Schnorr, DSS, and elliptic curve
 To describe some applications of digital signatures
Chapter 13
13.3
13-113-1 COMPARISON
Let us begin by looking at the differences betweenLet us begin by looking at the differences between
conventional signatures and digital signatures.conventional signatures and digital signatures.
13.1.1 Inclusion
13.1.2 Verification Method 390
13.1.3 Relationship
13.1.4 Duplicity
Topics discussed in this section:Topics discussed in this section:
13.4
A conventional signature is included in the document; it
is part of the document. But when we sign a document
digitally, we send the signature as a separate document.
13.1.1 Inclusion
13.5
For a conventional signature, when the recipient receives
a document, she compares the signature on the document
with the signature on file. For a digital signature, the
recipient receives the message and the signature. The
recipient needs to apply a verification technique to the
combination of the message and the signature to verify
the authenticity.
13.1.2 Verification Method
13.6
For a conventional signature, there is normally a one-to-
many relationship between a signature and documents.
For a digital signature, there is a one-to-one relationship
between a signature and a message.
13.1.3 Relationship
13.7
In conventional signature, a copy of the signed document
can be distinguished from the original one on file. In
digital signature, there is no such distinction unless there
is a factor of time on the document.
13.1.4 Duplicity
13.8
13-213-2 PROCESS
Figure 13.1 shows the digital signature process. TheFigure 13.1 shows the digital signature process. The
sender uses a signing algorithm to sign the message.sender uses a signing algorithm to sign the message.
The message and the signature are sent to the receiver.The message and the signature are sent to the receiver.
The receiver receives the message and the signatureThe receiver receives the message and the signature
and applies the verifying algorithm to theand applies the verifying algorithm to the
combination. If the result is true, the message iscombination. If the result is true, the message is
accepted; otherwise, it is rejected.accepted; otherwise, it is rejected.
13.2.1 Need for Keys
13.2.2 Signing the Digest
Topics discussed in this section:Topics discussed in this section:
13.9
13-213-2 Continued
Figure 13.1 Digital signature process
13.10
13.2.1 Need for Keys
Figure 13.2 Adding key to the digital signature process
A digital signature needs a public-key system.
The signer signs with her private key; the verifier
verifies with the signer’s public key.
Note
13.11
13.2.1 Continued
A cryptosystem uses the private and public keys of
the receiver: a digital signature uses
the private and public keys of the sender.
Note
13.12
13.2.2 Signing the Digest
Figure 13.3 Signing the digest
13.13
13-313-3 SERVICES
We discussed several security services in Chapter 1We discussed several security services in Chapter 1
including message confidentiality,including message confidentiality, messagemessage
authenticationauthentication, message integrity, and, message integrity, and nonrepudiationnonrepudiation..
A digital signature can directly provide the last three;A digital signature can directly provide the last three;
for message confidentiality we still needfor message confidentiality we still need
encryption/decryption.encryption/decryption.
13.3.1 Message Authentication
13.3.2 Message Integrity
13.3.3 Nonrepudiation
13.3.4 Confidentiality
Topics discussed in this section:Topics discussed in this section:
13.14
A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.
13.3.1 Message Authentication
A digital signature provides message
authentication.
Note
13.15
The integrity of the message is preserved even if we sign
the whole message because we cannot get the same
signature if the message is changed.
13.3.2 Message Integrity
A digital signature provides message integrity.
Note
13.16
13.3.3 Nonrepudiation
Figure 13.4 Using a trusted center for nonrepudiation
Nonrepudiation can be provided using a trusted
party.
Note
13.17
13.3.4 Confidentiality
A digital signature does not provide privacy.
If there is a need for privacy, another layer of
encryption/decryption must be applied.
Figure 13.5 Adding confidentiality to a digital signature scheme
Note
13.18
13-413-4 ATTACKS ON DIGITAL SIGNATURE
This section describes some attacks on digitalThis section describes some attacks on digital
signatures and defines the types of forgery.signatures and defines the types of forgery.
13.4.1 Attack Types
13.4.2 Forgery Types
Topics discussed in this section:Topics discussed in this section:
13.19
13.4.1 Attack Types
Key-Only Attack
Known-Message Attack
Chosen-Message Attack
the attacker first learns signatures on arbitrary messages of the attacker's
choice.
the attacker is given valid signatures for a variety of messages known by
the attacker but not chosen by the attacker.
the attacker is only given the public verification key.
13.20
13.4.2 Forgery Types
Existential Forgery
Selective Forgery
Existential forgery is the creation (by an adversary) of
any message/signature pair (m,σ), where σ was not
produced by the legitimate signer.
Selective forgery is the creation (by an adversary) of
a message/signature pair (m,σ) where m has been
chosen by the adversary prior to the attack.
13.21
13-513-5 DIGITAL SIGNATURE SCHEMES
Several digital signature schemes have evolved duringSeveral digital signature schemes have evolved during
the last few decades. Some of them have beenthe last few decades. Some of them have been
implemented.implemented.
13.5.1 RSA Digital Signature Scheme
13.5.2 ElGamal Digital Signature Scheme
13.5.3 Schnorr Digital Signature Scheme
13.5.4 Digital Signature Standard (DSS)
13.5.5 Elliptic Curve Digital Signature Scheme
Topics discussed in this section:Topics discussed in this section:
13.22
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
13.5.1 Continued
In the RSA digital signature scheme, d is private;
e and n are public.
Note
13.23
Signing and Verifying
13.5.1 Continued
Figure 13.7 RSA digital signature scheme
13.24
13.5.1 Continued
As a trivial example, suppose that Alice chooses p = 823 and q =
953, and calculates n = 784319. The value of φ(n) is 782544. Now
she chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:
Example 13.1
Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates
Bob accepts the message because he has verified Alice’s signature.
13.25
RSA Signature on the Message Digest
13.5.1 Continued
Figure 13.8 The RSA signature on the message digest
13.26
13.5.1 Continued
When the digest is signed instead of the message
itself, the susceptibility of the RSA digital signature
scheme depends on the strength of the hash
algorithm.
Note
13.27
13.5.2 ElGamal Digital Signature Scheme
Figure 13.9 General idea behind the ElGamal digital signature scheme
13.28
Key Generation
The key generation procedure here is exactly the same as
the one used in the cryptosystem.
13.5.2 Continued
In ElGamal digital signature scheme, (e1, e2, p) is
Alice’s public key; d is her private key.
Note
13.29
Verifying and Signing
13.5.2 Continued
Figure 13.10 ElGamal digital signature scheme
13.30
13.5.3 Schnorr Digital Signature Scheme
Figure 13.11 General idea behind the Schnorr digital signature scheme
13.31
13.5.4 Digital Signature Standard (DSS)
Figure 13.13 General idea behind DSS scheme
13.32
DSS Versus RSA
Computation of DSS signatures is faster than
computation of RSA signatures when using the same p.
DSS Versus ElGamal
DSS signatures are smaller than ElGamal signatures
because q is smaller than p.
13.5.4 Continued
13.33
13.5.5 Elliptic Curve Digital Signature Scheme
Figure 13.15 General idea behind the ECDSS scheme
13.34
13-613-6 VARIATIONS AND APPLICATIONS
This section briefly discusses variations andThis section briefly discusses variations and
applications for digital signatures.applications for digital signatures.
13.6.1 Variations
13.6.2 Applications
Topics discussed in this section:Topics discussed in this section:
13.35
13.6.1 Variations
Time Stamped Signatures
Sometimes a signed document needs to be time stamped to
prevent it from being replayed by an adversary. This is
called time-stamped digital signature scheme.
Blind Signatures
Sometimes we have a document that we want to get
signed without revealing the contents of the document to
the signer.

More Related Content

What's hot

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key ExchangeSAURABHDHAGE6
 
Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptxSou Jana
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 

What's hot (20)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 

Viewers also liked

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital SignaturesRobert Talbert
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in CryptographyBasudev Saha
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & AnalysisPawandeep Kaur
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signaturePSPCL
 
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...Neelabja Manna
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 

Viewers also liked (20)

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Digital signature
Digital signatureDigital signature
Digital signature
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Digital signature price in chennai
Digital signature price in chennaiDigital signature price in chennai
Digital signature price in chennai
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Similar to C08 crypto-digital signature13

Digital signatures
 Digital signatures Digital signatures
Digital signaturesSTUDENT
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.pptjayarao21
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET Journal
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationChakshu Sharma
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)Vishal Kumar
 

Similar to C08 crypto-digital signature13 (20)

Digital signatures
 Digital signatures Digital signatures
Digital signatures
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
527
527527
527
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
Ch13
Ch13Ch13
Ch13
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

C08 crypto-digital signature13

  • 1. 13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature
  • 2. 13.2 Objectives  To define a digital signature  To define security services provided by a digital signature  To define attacks on digital signatures  To discuss some digital signature schemes, including RSA, ElGamal,  Schnorr, DSS, and elliptic curve  To describe some applications of digital signatures Chapter 13
  • 3. 13.3 13-113-1 COMPARISON Let us begin by looking at the differences betweenLet us begin by looking at the differences between conventional signatures and digital signatures.conventional signatures and digital signatures. 13.1.1 Inclusion 13.1.2 Verification Method 390 13.1.3 Relationship 13.1.4 Duplicity Topics discussed in this section:Topics discussed in this section:
  • 4. 13.4 A conventional signature is included in the document; it is part of the document. But when we sign a document digitally, we send the signature as a separate document. 13.1.1 Inclusion
  • 5. 13.5 For a conventional signature, when the recipient receives a document, she compares the signature on the document with the signature on file. For a digital signature, the recipient receives the message and the signature. The recipient needs to apply a verification technique to the combination of the message and the signature to verify the authenticity. 13.1.2 Verification Method
  • 6. 13.6 For a conventional signature, there is normally a one-to- many relationship between a signature and documents. For a digital signature, there is a one-to-one relationship between a signature and a message. 13.1.3 Relationship
  • 7. 13.7 In conventional signature, a copy of the signed document can be distinguished from the original one on file. In digital signature, there is no such distinction unless there is a factor of time on the document. 13.1.4 Duplicity
  • 8. 13.8 13-213-2 PROCESS Figure 13.1 shows the digital signature process. TheFigure 13.1 shows the digital signature process. The sender uses a signing algorithm to sign the message.sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver.The message and the signature are sent to the receiver. The receiver receives the message and the signatureThe receiver receives the message and the signature and applies the verifying algorithm to theand applies the verifying algorithm to the combination. If the result is true, the message iscombination. If the result is true, the message is accepted; otherwise, it is rejected.accepted; otherwise, it is rejected. 13.2.1 Need for Keys 13.2.2 Signing the Digest Topics discussed in this section:Topics discussed in this section:
  • 9. 13.9 13-213-2 Continued Figure 13.1 Digital signature process
  • 10. 13.10 13.2.1 Need for Keys Figure 13.2 Adding key to the digital signature process A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key. Note
  • 11. 13.11 13.2.1 Continued A cryptosystem uses the private and public keys of the receiver: a digital signature uses the private and public keys of the sender. Note
  • 12. 13.12 13.2.2 Signing the Digest Figure 13.3 Signing the digest
  • 13. 13.13 13-313-3 SERVICES We discussed several security services in Chapter 1We discussed several security services in Chapter 1 including message confidentiality,including message confidentiality, messagemessage authenticationauthentication, message integrity, and, message integrity, and nonrepudiationnonrepudiation.. A digital signature can directly provide the last three;A digital signature can directly provide the last three; for message confidentiality we still needfor message confidentiality we still need encryption/decryption.encryption/decryption. 13.3.1 Message Authentication 13.3.2 Message Integrity 13.3.3 Nonrepudiation 13.3.4 Confidentiality Topics discussed in this section:Topics discussed in this section:
  • 14. 13.14 A secure digital signature scheme, like a secure conventional signature can provide message authentication. 13.3.1 Message Authentication A digital signature provides message authentication. Note
  • 15. 13.15 The integrity of the message is preserved even if we sign the whole message because we cannot get the same signature if the message is changed. 13.3.2 Message Integrity A digital signature provides message integrity. Note
  • 16. 13.16 13.3.3 Nonrepudiation Figure 13.4 Using a trusted center for nonrepudiation Nonrepudiation can be provided using a trusted party. Note
  • 17. 13.17 13.3.4 Confidentiality A digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. Figure 13.5 Adding confidentiality to a digital signature scheme Note
  • 18. 13.18 13-413-4 ATTACKS ON DIGITAL SIGNATURE This section describes some attacks on digitalThis section describes some attacks on digital signatures and defines the types of forgery.signatures and defines the types of forgery. 13.4.1 Attack Types 13.4.2 Forgery Types Topics discussed in this section:Topics discussed in this section:
  • 19. 13.19 13.4.1 Attack Types Key-Only Attack Known-Message Attack Chosen-Message Attack the attacker first learns signatures on arbitrary messages of the attacker's choice. the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker. the attacker is only given the public verification key.
  • 20. 13.20 13.4.2 Forgery Types Existential Forgery Selective Forgery Existential forgery is the creation (by an adversary) of any message/signature pair (m,σ), where σ was not produced by the legitimate signer. Selective forgery is the creation (by an adversary) of a message/signature pair (m,σ) where m has been chosen by the adversary prior to the attack.
  • 21. 13.21 13-513-5 DIGITAL SIGNATURE SCHEMES Several digital signature schemes have evolved duringSeveral digital signature schemes have evolved during the last few decades. Some of them have beenthe last few decades. Some of them have been implemented.implemented. 13.5.1 RSA Digital Signature Scheme 13.5.2 ElGamal Digital Signature Scheme 13.5.3 Schnorr Digital Signature Scheme 13.5.4 Digital Signature Standard (DSS) 13.5.5 Elliptic Curve Digital Signature Scheme Topics discussed in this section:Topics discussed in this section:
  • 22. 13.22 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA 13.5.1 Continued In the RSA digital signature scheme, d is private; e and n are public. Note
  • 23. 13.23 Signing and Verifying 13.5.1 Continued Figure 13.7 RSA digital signature scheme
  • 24. 13.24 13.5.1 Continued As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = 784319. The value of φ(n) is 782544. Now she chooses e = 313 and calculates d = 160009. At this point key generation is complete. Now imagine that Alice wants to send a message with the value of M = 19070 to Bob. She uses her private exponent, 160009, to sign the message: Example 13.1 Alice sends the message and the signature to Bob. Bob receives the message and the signature. He calculates Bob accepts the message because he has verified Alice’s signature.
  • 25. 13.25 RSA Signature on the Message Digest 13.5.1 Continued Figure 13.8 The RSA signature on the message digest
  • 26. 13.26 13.5.1 Continued When the digest is signed instead of the message itself, the susceptibility of the RSA digital signature scheme depends on the strength of the hash algorithm. Note
  • 27. 13.27 13.5.2 ElGamal Digital Signature Scheme Figure 13.9 General idea behind the ElGamal digital signature scheme
  • 28. 13.28 Key Generation The key generation procedure here is exactly the same as the one used in the cryptosystem. 13.5.2 Continued In ElGamal digital signature scheme, (e1, e2, p) is Alice’s public key; d is her private key. Note
  • 29. 13.29 Verifying and Signing 13.5.2 Continued Figure 13.10 ElGamal digital signature scheme
  • 30. 13.30 13.5.3 Schnorr Digital Signature Scheme Figure 13.11 General idea behind the Schnorr digital signature scheme
  • 31. 13.31 13.5.4 Digital Signature Standard (DSS) Figure 13.13 General idea behind DSS scheme
  • 32. 13.32 DSS Versus RSA Computation of DSS signatures is faster than computation of RSA signatures when using the same p. DSS Versus ElGamal DSS signatures are smaller than ElGamal signatures because q is smaller than p. 13.5.4 Continued
  • 33. 13.33 13.5.5 Elliptic Curve Digital Signature Scheme Figure 13.15 General idea behind the ECDSS scheme
  • 34. 13.34 13-613-6 VARIATIONS AND APPLICATIONS This section briefly discusses variations andThis section briefly discusses variations and applications for digital signatures.applications for digital signatures. 13.6.1 Variations 13.6.2 Applications Topics discussed in this section:Topics discussed in this section:
  • 35. 13.35 13.6.1 Variations Time Stamped Signatures Sometimes a signed document needs to be time stamped to prevent it from being replayed by an adversary. This is called time-stamped digital signature scheme. Blind Signatures Sometimes we have a document that we want to get signed without revealing the contents of the document to the signer.