SlideShare a Scribd company logo
NISHA MENON K
ROLL NO:16
FISAT
28 July 2014
A digital signature is an electronic signature
that can be used to authenticate the identity
of the sender of a message or the signer of a
document, and possibly to ensure that the
original content of the message or document
that has been sent is unchanged.
28 July 2014 2
Each individual generates his own key pair
Public key known to everyone
&
Private key only to the owner
Private Key – Used for making Digital
Signature
Public Key – Used to verify the Digital
Signature
28 July 2014 3
Digital signatures consists of three Algorithms
 A key generation algorithm that selects a private key uniformly
at random from a set of possible private keys. The algorithm
outputs the private key and a corresponding public key.
 A signing algorithm that, given a message and a private key,
produces a signature.
 A signature verifying algorithm that, given a message, public key
and a signature, either accepts or rejects the message's claim to
authenticity
28 July 2014 4
Private key remains confidential with its owner.
28 July 2014 5
Soft token
Smart cards Hardware
tokens
28 July 2014 6
It must verify
the author and
the date and
time of the
signature
It must
authenticate
the contents at
the time of the
signature
It must be
verifiable by
third parties,
to resolve
disputes
28 July 2014 7
28 July 2014 8
• C only
knows A’s
public key
Key-only
attack
• C is given
access to a
set of
messages
and their
signatures
Known
message
attack
• C chooses a list
of messages
before
attempting to
break A’s
signature
scheme,
independent of
A’s public key;
C then obtains
from A valid
signatures for
the chosen
messages
Generic
chosen
message attack
• Similar to the
generic attack,
except that the
list of messages
to be signed is
chosen after C
knows A’s public
key but before
any signatures
are seen
Directed chosen
message attack
• C may
request
from A
signatures
of
messages
that
depend on
previously
obtained
message-
signature
pairs
Adaptive
chosen
message
attack
C=Attacker, A=Victim
28 July 2014 9
Total
break
• C
determines
A’s private
key
Universal
forgery
• C finds an
efficient
signing
algorithm
that provides
an equivalent
way of
constructing
signatures
• The attacker
receives a
message m
and produces
a signature s
of m.
Selective
forgery
• C forges a
signature
for a
particular
message
chosen by C
Existenti
al forgery
• C forges a
signature
for at least
one
message; C
has no
control over
the message
28 July 2014 10
The signature must be a bit pattern that depends on the message
being signed
The signature must use some information unique to the
sender to prevent both forgery and denial
It must be relatively easy to produce the digital signature
It must be relatively easy to recognize and verify the digital
signature
It must be computationally infeasible to forge a digital
signature
It must be practical to retain a copy of the digital signature in
storage
Refers to a digital signature scheme that involves only the
communicating parties
It is assumed that the destination knows the public key of the
source
Confidentiality can be provided by encrypting the
entire message plus signature with a shared secret key
The validity of the scheme depends on the security of
the sender’s private key
If a sender later wishes to deny sending a particular
message, the sender can claim that the private key was lost
or stolen and that someone else forged his or her signature
One way to thwart or at least weaken this is to require
every signed message to include a timestamp and to
require prompt reporting of compromised keys to a central
authority
28 July 2014 11
Use private key for encryption (signing)
Uses public key for decryption (verification)
Global elements are a prime number q and a,
which is a primitive root of q
Each user generates their key
Chooses a secret key (number): 1 < xA < q-1
Compute their public key: yA = axA mod q
28 July 2014 12
Alice signs a message M to Bob by computing
the hash m = H(M), 0 <= m <= (q-1)
choose random integer K with 1 <= K <= (q-1)
and gcd(K,q-1)=1
compute temporary key: S1 = a
k
mod q
compute K-1mod (q-1)
compute the value: S2 = K-1(m-xAS1) mod (q-1)
signature is:(S1,S2)
any user B can verify the signature by computing
V1 = a
m
mod q
V2 = yA
S1 S1
S2 mod q
signature is valid if V1 = V2
28 July 2014 13
Scheme is based on discrete logarithms
Minimizes the message-dependent amount of
computation required to generate a signature
Main work for signature can be done during the
idle time of the processor
Based on using a prime modulus p, with p – 1
having a prime factor q of appropriate size
Typically p is a 1024-bit number, and q is a 160-bit
number
28 July 2014 14
choose suitable primes p , q
choose a such that a
q
= 1 mod p
(a,p,q) are global parameters for all
each user generates a key
chooses a secret key (number): 0 < s < q
compute their public key: v = a
-s
mod q
28 July 2014 15
user signs message by
choosing random r with 0<r<q and computing
x = ar mod p(preprocessing)
concatenate message with x and hash result to computing:
e = H(M || x)
computing: y = (r + se) mod q
signature is pair (e, y)
Receiver can verify the signature as follows:
computing: x' = ayve mod p
verifying that: e = H(M || x’)
28 July 2014 16
US Govt approved signature scheme
designed by NIST & NSA in early 90's
uses the SHA hash algorithm
DSS is the standard, DSA is the algorithm
DSA can only be used for digital signature
 creates a 320 bit signature
 with 512-1024 bit security
 smaller and faster than RSA
 a digital signature scheme only
 security depends on difficulty of computing discrete
logarithms
 variant of ElGamal & Schnorr schemes
28 July 2014 19
have shared global public key values (p,q,g):
choose 160-bit prime number q
choose a large prime p with 2L-1 < p < 2L
where L= 512 to 1024 bits and is a multiple of 64
such that q is a 160 bit prime divisor of (p-1)
choose g = h(p-1)/q
where 1<h<p-1 and h(p-1)/q mod p > 1
users choose private & compute public key:
choose random private key: x<q
compute public key: y = gx mod p
 to sign a message M the sender:
 generates a random signature key k, k<q
 k must be random, be destroyed after use, and never be
reused
 then computes signature pair:
r = (gk mod p)mod q
s = [k-1(H(M)+ xr)] mod q
 sends signature (r,s) with message M
having received M & signature (r,s)
to verify a signature, recipient computes:
w = s-1 mod q
u1= [H(M)w ]mod q
u2= (rw)mod q
v = [(gu1 yu2)mod p ]mod q
if v=r then signature is verified.
A
gning
d
rifying
28 July 2014 24
All those participating in the
digital signature scheme use the
same global domain parameters,
which define an elliptic curve and
a point of origin on the curve
A signer must first generate a
public, private key pair
A hash value is generated for the
message to be signed; using the
private key, the domain
parameters, and the hash value, a
signature is generated
To verify the signature, the verifier
uses as input the signer’s public
key, the domain parameters, and
the integer s , the output is a value
v that is compared to r ; the
signature is verified if the v = r
Four elements are
involved:
ECDSA Signing and Verifying
RSA Probabilistic Signature Scheme
Latest of the RSA schemes and the one that RSA
Laboratories recommends as the most secure of the
RSA schemes
The PSS approach was first proposed by Bellare and
Rogaway
This approach, unlike the other RSA-based schemes,
introduces a randomization process that enables the
security of the method to be shown to be closely
related to the security of the RSA algorithm itself
28 July 2014 27
MGF is the building block of RSA PSS
It is a pseudorandom function that has input parameters as a
bit string and desired length L.
Based on SHA-1
Randomization means that some part of an algorithm has a
random input, which causes the output to be different for
equivalent inputs.
Randomization in a protocol is usually done with a so called
salt.
28 July 2014 28
The salt usually then has to be shipped along or in
some encoded form within the protocol.
PSS takes the input message and a salt (a random
number) and runs them through a hash function.
This hash H is used as the beginning part of the
output.
28 July 2014 29
Then, a mask of H is calculated, which has the length
of the RSA modulus minus the length of H.
This mask is then XOR-ed with the salt (and some
zero padding) and the output will be called
maskedDB.
Then, maskedDB is appended to H to generate the
input for the RSA function
28 July 2014 30
28 July 2014 31
RSA encoding
28 July 2014 32
RSA PSS Verification
28 July 2014 33
Digital signatures
Elgamal digital signature scheme
The DSA approach
• Elliptic curve digital signature algorithm
• Schnorr digital signature scheme
• RSA-PSS

More Related Content

What's hot

Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
nayakslideshare
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Ssl https
Ssl httpsSsl https
Ssl https
Andrada Boldis
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
Vidulatiwari
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
Suraj Dhalwar
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
Ravi Ranjan
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Krithika Nagarajan
 
Kerberos
KerberosKerberos
Kerberos
Sudeep Shouche
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 

What's hot (20)

Digital signature
Digital  signatureDigital  signature
Digital signature
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Ssl https
Ssl httpsSsl https
Ssl https
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Kerberos
KerberosKerberos
Kerberos
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Kerberos
KerberosKerberos
Kerberos
 

Viewers also liked

Discovery ct750 hd book
Discovery ct750 hd bookDiscovery ct750 hd book
Discovery ct750 hd book
Jhon Arriaga Cordova
 
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
World Agroforestry (ICRAF)
 
ESTADO DE DIREITO - 42 EDIÇÃO
ESTADO DE DIREITO - 42 EDIÇÃOESTADO DE DIREITO - 42 EDIÇÃO
ESTADO DE DIREITO - 42 EDIÇÃO
Estadodedireito
 
Sourabh Resume.2
Sourabh Resume.2Sourabh Resume.2
Sourabh Resume.2
Sourabh Vohra
 
Trabajo de fisioquímica
Trabajo de fisioquímicaTrabajo de fisioquímica
Trabajo de fisioquímica
Daniel Armiijos
 
Water pollution caused by toxic substances
Water pollution caused by toxic substancesWater pollution caused by toxic substances
Water pollution caused by toxic substances
shenaemhe14
 
Digital signature
Digital signatureDigital signature
Digital signature
Sadhana28
 
El marketing no está muerto
El marketing no está muertoEl marketing no está muerto
El marketing no está muerto
Cristina Palacios
 
Unidad de innovación seminario innovación
Unidad de innovación seminario innovaciónUnidad de innovación seminario innovación
Unidad de innovación seminario innovación
Andoni Carrion
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
Nisha Menon K
 
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
PriceMinister
 
elasticsearch basics workshop
elasticsearch basics workshopelasticsearch basics workshop
elasticsearch basics workshop
Mathieu Elie
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Evion Technologies
 
Digital signature
Digital signatureDigital signature
Digital signature
9799907840kd
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
Milan Petrásek
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
YooGenelyn
 
Digital signature ppt
Digital signature pptDigital signature ppt
Digital signature ppt
nurchairulakbarsaad
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
Mahmoud Ezzat
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
ravik09783
 
ApEjes2010
ApEjes2010ApEjes2010

Viewers also liked (20)

Discovery ct750 hd book
Discovery ct750 hd bookDiscovery ct750 hd book
Discovery ct750 hd book
 
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
Miyuki iiyama-charcoal-tree-based-bioenergy-icraf-may2015
 
ESTADO DE DIREITO - 42 EDIÇÃO
ESTADO DE DIREITO - 42 EDIÇÃOESTADO DE DIREITO - 42 EDIÇÃO
ESTADO DE DIREITO - 42 EDIÇÃO
 
Sourabh Resume.2
Sourabh Resume.2Sourabh Resume.2
Sourabh Resume.2
 
Trabajo de fisioquímica
Trabajo de fisioquímicaTrabajo de fisioquímica
Trabajo de fisioquímica
 
Water pollution caused by toxic substances
Water pollution caused by toxic substancesWater pollution caused by toxic substances
Water pollution caused by toxic substances
 
Digital signature
Digital signatureDigital signature
Digital signature
 
El marketing no está muerto
El marketing no está muertoEl marketing no está muerto
El marketing no está muerto
 
Unidad de innovación seminario innovación
Unidad de innovación seminario innovaciónUnidad de innovación seminario innovación
Unidad de innovación seminario innovación
 
unified threat management by Nisha Menon K
 unified threat management by Nisha Menon K unified threat management by Nisha Menon K
unified threat management by Nisha Menon K
 
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
PriceMinister Rakuten Campus 2013 : Présentation par SoColissimo, partenaire ...
 
elasticsearch basics workshop
elasticsearch basics workshopelasticsearch basics workshop
elasticsearch basics workshop
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2
 
Digital signature ppt
Digital signature pptDigital signature ppt
Digital signature ppt
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
ApEjes2010
ApEjes2010ApEjes2010
ApEjes2010
 

Similar to Digital signature

Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
ravik09783
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
Suresh Thammishetty
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
SomuPatil8
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Digital Signature.ppt
Digital Signature.pptDigital Signature.ppt
Digital Signature.ppt
SABITHARASSISTANTPRO
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
Ram Dutt Shukla
 
Ch13
Ch13Ch13
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
jayarao21
 
Rsa
RsaRsa
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
Abhishek Kesharwani
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
VishwanathMahalle
 
Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Module2.pptx
Module2.pptxModule2.pptx
Module2.pptx
ShilpaShettyA1
 

Similar to Digital signature (20)

Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
Encryption
EncryptionEncryption
Encryption
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Digital Signature.ppt
Digital Signature.pptDigital Signature.ppt
Digital Signature.ppt
 
Dsa & Digi Cert
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi Cert
 
Ch13
Ch13Ch13
Ch13
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
Rsa
RsaRsa
Rsa
 
Dss digital signature standard and dsa algorithm
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Network security
Network securityNetwork security
Network security
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Module2.pptx
Module2.pptxModule2.pptx
Module2.pptx
 

More from Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
Nisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
Nisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
Nisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
Nisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Nisha Menon K
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
Nisha Menon K
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
Nisha Menon K
 
Skinput
SkinputSkinput
Skinput
Nisha Menon K
 

More from Nisha Menon K (10)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 

Digital signature

  • 1. NISHA MENON K ROLL NO:16 FISAT 28 July 2014
  • 2. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. 28 July 2014 2
  • 3. Each individual generates his own key pair Public key known to everyone & Private key only to the owner Private Key – Used for making Digital Signature Public Key – Used to verify the Digital Signature 28 July 2014 3
  • 4. Digital signatures consists of three Algorithms  A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key.  A signing algorithm that, given a message and a private key, produces a signature.  A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity 28 July 2014 4
  • 5. Private key remains confidential with its owner. 28 July 2014 5 Soft token Smart cards Hardware tokens
  • 7. It must verify the author and the date and time of the signature It must authenticate the contents at the time of the signature It must be verifiable by third parties, to resolve disputes 28 July 2014 7
  • 8. 28 July 2014 8 • C only knows A’s public key Key-only attack • C is given access to a set of messages and their signatures Known message attack • C chooses a list of messages before attempting to break A’s signature scheme, independent of A’s public key; C then obtains from A valid signatures for the chosen messages Generic chosen message attack • Similar to the generic attack, except that the list of messages to be signed is chosen after C knows A’s public key but before any signatures are seen Directed chosen message attack • C may request from A signatures of messages that depend on previously obtained message- signature pairs Adaptive chosen message attack C=Attacker, A=Victim
  • 9. 28 July 2014 9 Total break • C determines A’s private key Universal forgery • C finds an efficient signing algorithm that provides an equivalent way of constructing signatures • The attacker receives a message m and produces a signature s of m. Selective forgery • C forges a signature for a particular message chosen by C Existenti al forgery • C forges a signature for at least one message; C has no control over the message
  • 10. 28 July 2014 10 The signature must be a bit pattern that depends on the message being signed The signature must use some information unique to the sender to prevent both forgery and denial It must be relatively easy to produce the digital signature It must be relatively easy to recognize and verify the digital signature It must be computationally infeasible to forge a digital signature It must be practical to retain a copy of the digital signature in storage
  • 11. Refers to a digital signature scheme that involves only the communicating parties It is assumed that the destination knows the public key of the source Confidentiality can be provided by encrypting the entire message plus signature with a shared secret key The validity of the scheme depends on the security of the sender’s private key If a sender later wishes to deny sending a particular message, the sender can claim that the private key was lost or stolen and that someone else forged his or her signature One way to thwart or at least weaken this is to require every signed message to include a timestamp and to require prompt reporting of compromised keys to a central authority 28 July 2014 11
  • 12. Use private key for encryption (signing) Uses public key for decryption (verification) Global elements are a prime number q and a, which is a primitive root of q Each user generates their key Chooses a secret key (number): 1 < xA < q-1 Compute their public key: yA = axA mod q 28 July 2014 12
  • 13. Alice signs a message M to Bob by computing the hash m = H(M), 0 <= m <= (q-1) choose random integer K with 1 <= K <= (q-1) and gcd(K,q-1)=1 compute temporary key: S1 = a k mod q compute K-1mod (q-1) compute the value: S2 = K-1(m-xAS1) mod (q-1) signature is:(S1,S2) any user B can verify the signature by computing V1 = a m mod q V2 = yA S1 S1 S2 mod q signature is valid if V1 = V2 28 July 2014 13
  • 14. Scheme is based on discrete logarithms Minimizes the message-dependent amount of computation required to generate a signature Main work for signature can be done during the idle time of the processor Based on using a prime modulus p, with p – 1 having a prime factor q of appropriate size Typically p is a 1024-bit number, and q is a 160-bit number 28 July 2014 14
  • 15. choose suitable primes p , q choose a such that a q = 1 mod p (a,p,q) are global parameters for all each user generates a key chooses a secret key (number): 0 < s < q compute their public key: v = a -s mod q 28 July 2014 15
  • 16. user signs message by choosing random r with 0<r<q and computing x = ar mod p(preprocessing) concatenate message with x and hash result to computing: e = H(M || x) computing: y = (r + se) mod q signature is pair (e, y) Receiver can verify the signature as follows: computing: x' = ayve mod p verifying that: e = H(M || x’) 28 July 2014 16
  • 17. US Govt approved signature scheme designed by NIST & NSA in early 90's uses the SHA hash algorithm DSS is the standard, DSA is the algorithm DSA can only be used for digital signature
  • 18.  creates a 320 bit signature  with 512-1024 bit security  smaller and faster than RSA  a digital signature scheme only  security depends on difficulty of computing discrete logarithms  variant of ElGamal & Schnorr schemes
  • 20. have shared global public key values (p,q,g): choose 160-bit prime number q choose a large prime p with 2L-1 < p < 2L where L= 512 to 1024 bits and is a multiple of 64 such that q is a 160 bit prime divisor of (p-1) choose g = h(p-1)/q where 1<h<p-1 and h(p-1)/q mod p > 1 users choose private & compute public key: choose random private key: x<q compute public key: y = gx mod p
  • 21.  to sign a message M the sender:  generates a random signature key k, k<q  k must be random, be destroyed after use, and never be reused  then computes signature pair: r = (gk mod p)mod q s = [k-1(H(M)+ xr)] mod q  sends signature (r,s) with message M
  • 22. having received M & signature (r,s) to verify a signature, recipient computes: w = s-1 mod q u1= [H(M)w ]mod q u2= (rw)mod q v = [(gu1 yu2)mod p ]mod q if v=r then signature is verified.
  • 23.
  • 25. All those participating in the digital signature scheme use the same global domain parameters, which define an elliptic curve and a point of origin on the curve A signer must first generate a public, private key pair A hash value is generated for the message to be signed; using the private key, the domain parameters, and the hash value, a signature is generated To verify the signature, the verifier uses as input the signer’s public key, the domain parameters, and the integer s , the output is a value v that is compared to r ; the signature is verified if the v = r Four elements are involved:
  • 26. ECDSA Signing and Verifying
  • 27. RSA Probabilistic Signature Scheme Latest of the RSA schemes and the one that RSA Laboratories recommends as the most secure of the RSA schemes The PSS approach was first proposed by Bellare and Rogaway This approach, unlike the other RSA-based schemes, introduces a randomization process that enables the security of the method to be shown to be closely related to the security of the RSA algorithm itself 28 July 2014 27
  • 28. MGF is the building block of RSA PSS It is a pseudorandom function that has input parameters as a bit string and desired length L. Based on SHA-1 Randomization means that some part of an algorithm has a random input, which causes the output to be different for equivalent inputs. Randomization in a protocol is usually done with a so called salt. 28 July 2014 28
  • 29. The salt usually then has to be shipped along or in some encoded form within the protocol. PSS takes the input message and a salt (a random number) and runs them through a hash function. This hash H is used as the beginning part of the output. 28 July 2014 29
  • 30. Then, a mask of H is calculated, which has the length of the RSA modulus minus the length of H. This mask is then XOR-ed with the salt (and some zero padding) and the output will be called maskedDB. Then, maskedDB is appended to H to generate the input for the RSA function 28 July 2014 30
  • 31. 28 July 2014 31 RSA encoding
  • 32. 28 July 2014 32 RSA PSS Verification
  • 33. 28 July 2014 33 Digital signatures Elgamal digital signature scheme The DSA approach • Elliptic curve digital signature algorithm • Schnorr digital signature scheme • RSA-PSS