SlideShare a Scribd company logo
1 of 22
CSE 597E Fall 2001 PennState University 1
Digital Signature Schemes
Presented By:
Munaiza Matin
CSE 597E Fall 2001 PennState University2
Introduction
 Cryptography – art & science of
preventing users from unauthorized or
illegal actions towards information,
networking resources and services.
 Cryptographic transformation –
conversion of input data into output data
using a cryptographic key.
 Cryptosystem – forward and inverse
cryptographic transformation pair
CSE 597E Fall 2001 PennState University3
A Cryptosystem
Input
data
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
Key Key
Output
data
Input
data
Sender Receiver
CSE 597E Fall 2001 PennState University4
Types of Cryptosystems
 Private key cryptosystem – a private
key is shared between the two
communicating parties which must
be kept secret between themselves.
 Public key cryptosystem – the
sender and receiver do not share the
same key and one key can be public
and the other can be private
CSE 597E Fall 2001 PennState University5
Types of Cryptosystems
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
Key Key
Output
data
Input
data
Sender Receiver
Input
data
Share private key
A Private Key Cryptosystem
CSE 597E Fall 2001 PennState University6
Types of Cryptosystems
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
1st
Key 2nd
Key
Output
data
Input
data
Sender Receiver
Input
data
Do not share the same key information and one key may be public
A Public Key Cryptosystem
CSE 597E Fall 2001 PennState University7
Digital Signatures
 Encryption, message authentication and
digital signatures are all tools of modern
cryptography.
 A signature is a technique for non-
repudiation based on the public key
cryptography.
 The creator of a message can attach a
code, the signature, which guarantees the
source and integrity of the message.
CSE 597E Fall 2001 PennState University8
Properties of Signatures
 Similar to handwritten signatures, digital
signatures must fulfill the following:
 Must not be forgeable
 Recipients must be able to verify them
 Signers must not be able to repudiate them
later
 In addition, digital signatures cannot be
constant and must be a function of the
entire document it signs
CSE 597E Fall 2001 PennState University9
Types of Signatures
 Direct digital signature – involves only the
communicating parties
 Assumed that receiver knows public key of
sender.
 Signature may be formed by (1) encrypting
entire message with sender’s private key or
(2) encrypting hash code of message with
sender’s private key.
 Further encryption of entire message +
signature with receiver’s public key or shared
private key ensures confidentiality.
CSE 597E Fall 2001 PennState University10
Types of Signatures
 Problems with direct signatures:
 Validity of scheme depends on the
security of the sender’s private key ⇒
sender may later deny sending a
certain message.
 Private key may actually be stolen from
X at time T, so timestamp may not
help.
CSE 597E Fall 2001 PennState University11
Types of Signatures
 Arbitrated digital signature – involves a
trusted third party or arbiter
 Every signed message from sender, X, to
receiver, Y, goes to an arbiter, A, first.
 A subjects message + signature to number of
tests to check origin & content
 A dates the message and sends it to Y with
indication that it has been verified to its
satisfaction
CSE 597E Fall 2001 PennState University12
Basic Mechanism of
Signature Schemes
 A key generation algorithm to randomly
select a public key pair.
 A signature algorithm that takes message
+ private key as input and generates a
signature for the message as output
 A signature verification algorithm that
takes signature + public key as input and
generates information bit according to
whether signature is consistent as output.
CSE 597E Fall 2001 PennState University13
Digital Signature Standards
 NIST FIPS 186 Digital Signature Standard
(DSS)
 El Gamal
 RSA Digital Signature
- ISO 9796
- ANSI X9.31
- CCITT X.509
CSE 597E Fall 2001 PennState University14
DSS
 Public-key technique.
 User applies the Secure Hash
Algorithm (SHA) to the message to
produce message digest.
 User’s private key is applied to
message digest using DSA to
generate signature.
CSE 597E Fall 2001 PennState University15
Global Public-Key Components
p A prime number of L bits where L is a multiple of 64 and 512 ≤ L ≤ 1024
q A 160-bit prime factor of p-1
g = h(p-1)/q
mod p, where h is any integer with 1<h< p-1, such that (h(p-1)/q
mod
p)>1
User’s Private Key
x A random or pseudorandom integer with 0<x<q
User’s Public Key
y = gx
mod p
User’s Per-Message Secret Number
k A random or pseudorandom integer with 0<k<q
Signing
r = (gk
mod p) mod q s = [k-1
(H(M) = xr)] mod q
Signature = (r, s)
Verifying
w = (s’)-1
mod q
u1
= [H(M’)w] mod q u2
= (r’)w mod q v = [(gu1
yu2
) mod p] mod q
Test: v = r’
The Digital Signature Algorithm (DSA)
CSE 597E Fall 2001 PennState University16
DSS
 DSA
- M = message to be signed
- H(M) = hash of M using SHA
- M’, r’, s’ = received versions of M,
r, s
CSE 597E Fall 2001 PennState University17
El Gamal Signature Scheme
 A variant of the DSA.
 Based on the assumption that computing
discrete logarithms over a finite field with
a large prime is difficult.
 Assumes that it is computationally
infeasible for anyone other than signer to
find a message M and an integer pair (r,
s) such that aM
= yr
rs
(mod p).
18
El Gamal Signature Scheme
Parameters of El Gamal
p A large prime number such that p-1 has a large
prime factor
x The private key information of a user where x<p
a A primitive element of the finite field for the prime p
y = ax
mod p
(p,a,y) The public key information
19
El Gamal Signature Scheme
Step 1 Randomly choose an integer k such that (k, p-1) = 1,
1<k<p-1, and k has not been used to sign a previous
message
Step 2 Calculate r = ak
(mod p)
Step 3 Find s such that M = xr + ks (mod (p-1))
Step 4 Collect the pair (r, s) as the digital signature on the
message M
Since, M = xr + ks (mod (p-1))
⇒ aM
= a(xr+ks)
= axr
aks
= yr
rs
(mod p)
⇒ Given M and (r, s), the receiver or 3rd
party can
verify the signature by checking whether
aM
= yr
rs
(mod p) holds or not.
CSE 597E Fall 2001 PennState University20
RSA Digital Signature Scheme
 Based on the difficulty of factoring large
numbers.
 Given M, RSA digital signature can be
produced by encrypting either M itself or
a digest of M using the private signature
key s.
 Signature, S = ws
mod n, where w is
message to be signed or message digest
and n = pq (p and q are large primes).
 Verification: w = Sv
mod n, where (v, n) is
the public verification key.
CSE 597E Fall 2001 PennState University21
Conclusions
 Digital signatures are an effective
mechanism used for authenticity and non-
repudiation of messages.
 Several signature schemes exist, but DSS
is probably the most popular.
 Digital signatures may be expanded to be
used as digital pseudonyms which would
prevent authorities from figuring out a
sender’s identity, for example by cross-
matching
CSE 597E Fall 2001 PennState University 22
Thank you!

More Related Content

What's hot

What's hot (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Hash Function
Hash Function Hash Function
Hash Function
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
IP Security
IP SecurityIP Security
IP Security
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
IP Security
IP SecurityIP Security
IP Security
 
Hash function
Hash function Hash function
Hash function
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Message AUthentication Code
Message AUthentication CodeMessage AUthentication Code
Message AUthentication Code
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 

Viewers also liked

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signaturePSPCL
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13ravik09783
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital SignatureAsim Neupane
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital SignaturesRobert Talbert
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...Arathi Jayaprakash
 
PhoneGap Framework for smartphone app developement
PhoneGap Framework for smartphone app developementPhoneGap Framework for smartphone app developement
PhoneGap Framework for smartphone app developementTrieu Nguyen
 

Viewers also liked (20)

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
E tutorial - digital signature
E tutorial - digital signatureE tutorial - digital signature
E tutorial - digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Introduction To Digital Signatures
Introduction To Digital SignaturesIntroduction To Digital Signatures
Introduction To Digital Signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
CMS digital signature
CMS digital signatureCMS digital signature
CMS digital signature
 
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
 
Conclusion
ConclusionConclusion
Conclusion
 
PhoneGap Framework for smartphone app developement
PhoneGap Framework for smartphone app developementPhoneGap Framework for smartphone app developement
PhoneGap Framework for smartphone app developement
 
e-Commerce
e-Commercee-Commerce
e-Commerce
 

Similar to Digital Signature Schemes Explained

Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...National Chengchi University
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
 
Digitall signature update
Digitall signature updateDigitall signature update
Digitall signature updateRashi Dhagat
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.pptjayarao21
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor NetworkSecured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor Networkiosrjce
 

Similar to Digital Signature Schemes Explained (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
 
Rsa
RsaRsa
Rsa
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
 
Ao318992
Ao318992Ao318992
Ao318992
 
Encryption
EncryptionEncryption
Encryption
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Digitall signature update
Digitall signature updateDigitall signature update
Digitall signature update
 
Module2.pptx
Module2.pptxModule2.pptx
Module2.pptx
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Ch13
Ch13Ch13
Ch13
 
C017331720
C017331720C017331720
C017331720
 
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor NetworkSecured Source Anonymous Message Authentication Using Wireless Sensor Network
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 

Digital Signature Schemes Explained

  • 1. CSE 597E Fall 2001 PennState University 1 Digital Signature Schemes Presented By: Munaiza Matin
  • 2. CSE 597E Fall 2001 PennState University2 Introduction  Cryptography – art & science of preventing users from unauthorized or illegal actions towards information, networking resources and services.  Cryptographic transformation – conversion of input data into output data using a cryptographic key.  Cryptosystem – forward and inverse cryptographic transformation pair
  • 3. CSE 597E Fall 2001 PennState University3 A Cryptosystem Input data Forward Cryptographic Transformation Inverse Cryptographic Transformation Key Key Output data Input data Sender Receiver
  • 4. CSE 597E Fall 2001 PennState University4 Types of Cryptosystems  Private key cryptosystem – a private key is shared between the two communicating parties which must be kept secret between themselves.  Public key cryptosystem – the sender and receiver do not share the same key and one key can be public and the other can be private
  • 5. CSE 597E Fall 2001 PennState University5 Types of Cryptosystems Forward Cryptographic Transformation Inverse Cryptographic Transformation Key Key Output data Input data Sender Receiver Input data Share private key A Private Key Cryptosystem
  • 6. CSE 597E Fall 2001 PennState University6 Types of Cryptosystems Forward Cryptographic Transformation Inverse Cryptographic Transformation 1st Key 2nd Key Output data Input data Sender Receiver Input data Do not share the same key information and one key may be public A Public Key Cryptosystem
  • 7. CSE 597E Fall 2001 PennState University7 Digital Signatures  Encryption, message authentication and digital signatures are all tools of modern cryptography.  A signature is a technique for non- repudiation based on the public key cryptography.  The creator of a message can attach a code, the signature, which guarantees the source and integrity of the message.
  • 8. CSE 597E Fall 2001 PennState University8 Properties of Signatures  Similar to handwritten signatures, digital signatures must fulfill the following:  Must not be forgeable  Recipients must be able to verify them  Signers must not be able to repudiate them later  In addition, digital signatures cannot be constant and must be a function of the entire document it signs
  • 9. CSE 597E Fall 2001 PennState University9 Types of Signatures  Direct digital signature – involves only the communicating parties  Assumed that receiver knows public key of sender.  Signature may be formed by (1) encrypting entire message with sender’s private key or (2) encrypting hash code of message with sender’s private key.  Further encryption of entire message + signature with receiver’s public key or shared private key ensures confidentiality.
  • 10. CSE 597E Fall 2001 PennState University10 Types of Signatures  Problems with direct signatures:  Validity of scheme depends on the security of the sender’s private key ⇒ sender may later deny sending a certain message.  Private key may actually be stolen from X at time T, so timestamp may not help.
  • 11. CSE 597E Fall 2001 PennState University11 Types of Signatures  Arbitrated digital signature – involves a trusted third party or arbiter  Every signed message from sender, X, to receiver, Y, goes to an arbiter, A, first.  A subjects message + signature to number of tests to check origin & content  A dates the message and sends it to Y with indication that it has been verified to its satisfaction
  • 12. CSE 597E Fall 2001 PennState University12 Basic Mechanism of Signature Schemes  A key generation algorithm to randomly select a public key pair.  A signature algorithm that takes message + private key as input and generates a signature for the message as output  A signature verification algorithm that takes signature + public key as input and generates information bit according to whether signature is consistent as output.
  • 13. CSE 597E Fall 2001 PennState University13 Digital Signature Standards  NIST FIPS 186 Digital Signature Standard (DSS)  El Gamal  RSA Digital Signature - ISO 9796 - ANSI X9.31 - CCITT X.509
  • 14. CSE 597E Fall 2001 PennState University14 DSS  Public-key technique.  User applies the Secure Hash Algorithm (SHA) to the message to produce message digest.  User’s private key is applied to message digest using DSA to generate signature.
  • 15. CSE 597E Fall 2001 PennState University15 Global Public-Key Components p A prime number of L bits where L is a multiple of 64 and 512 ≤ L ≤ 1024 q A 160-bit prime factor of p-1 g = h(p-1)/q mod p, where h is any integer with 1<h< p-1, such that (h(p-1)/q mod p)>1 User’s Private Key x A random or pseudorandom integer with 0<x<q User’s Public Key y = gx mod p User’s Per-Message Secret Number k A random or pseudorandom integer with 0<k<q Signing r = (gk mod p) mod q s = [k-1 (H(M) = xr)] mod q Signature = (r, s) Verifying w = (s’)-1 mod q u1 = [H(M’)w] mod q u2 = (r’)w mod q v = [(gu1 yu2 ) mod p] mod q Test: v = r’ The Digital Signature Algorithm (DSA)
  • 16. CSE 597E Fall 2001 PennState University16 DSS  DSA - M = message to be signed - H(M) = hash of M using SHA - M’, r’, s’ = received versions of M, r, s
  • 17. CSE 597E Fall 2001 PennState University17 El Gamal Signature Scheme  A variant of the DSA.  Based on the assumption that computing discrete logarithms over a finite field with a large prime is difficult.  Assumes that it is computationally infeasible for anyone other than signer to find a message M and an integer pair (r, s) such that aM = yr rs (mod p).
  • 18. 18 El Gamal Signature Scheme Parameters of El Gamal p A large prime number such that p-1 has a large prime factor x The private key information of a user where x<p a A primitive element of the finite field for the prime p y = ax mod p (p,a,y) The public key information
  • 19. 19 El Gamal Signature Scheme Step 1 Randomly choose an integer k such that (k, p-1) = 1, 1<k<p-1, and k has not been used to sign a previous message Step 2 Calculate r = ak (mod p) Step 3 Find s such that M = xr + ks (mod (p-1)) Step 4 Collect the pair (r, s) as the digital signature on the message M Since, M = xr + ks (mod (p-1)) ⇒ aM = a(xr+ks) = axr aks = yr rs (mod p) ⇒ Given M and (r, s), the receiver or 3rd party can verify the signature by checking whether aM = yr rs (mod p) holds or not.
  • 20. CSE 597E Fall 2001 PennState University20 RSA Digital Signature Scheme  Based on the difficulty of factoring large numbers.  Given M, RSA digital signature can be produced by encrypting either M itself or a digest of M using the private signature key s.  Signature, S = ws mod n, where w is message to be signed or message digest and n = pq (p and q are large primes).  Verification: w = Sv mod n, where (v, n) is the public verification key.
  • 21. CSE 597E Fall 2001 PennState University21 Conclusions  Digital signatures are an effective mechanism used for authenticity and non- repudiation of messages.  Several signature schemes exist, but DSS is probably the most popular.  Digital signatures may be expanded to be used as digital pseudonyms which would prevent authorities from figuring out a sender’s identity, for example by cross- matching
  • 22. CSE 597E Fall 2001 PennState University 22 Thank you!