SlideShare a Scribd company logo
Presented By:
MD IRFAN
QUASIM
Zakir Husain College of Engineering and Technology(ZHCET)
DIGITAL
SIGNATURE
Note: This slide made from the Cryptography and Network Security Book by Frouzan.
13.2
Objectives
 To define a digital signature
 To define security services provided by a digital
signature
 To define attacks on digital signatures
 To discuss some digital signature schemes, including
RSA,
 To describe some applications of digital signatures
13.8
13-213-2 PROCESS
Figure 13.1 shows the digital signature process. TheFigure 13.1 shows the digital signature process. The
sender uses a signing algorithm to sign the message.sender uses a signing algorithm to sign the message.
The message and the signature are sent to the receiver.The message and the signature are sent to the receiver.
The receiver receives the message and the signatureThe receiver receives the message and the signature
and applies the verifying algorithm to theand applies the verifying algorithm to the
combination. If the result is true, the message iscombination. If the result is true, the message is
accepted; otherwise, it is rejected.accepted; otherwise, it is rejected.
13.2.1 Need for Keys
13.2.2 Signing the Digest
Topics discussed in this section:Topics discussed in this section:
13.9
13-213-2 Continued
Figure 13.1 Digital signature process
13.10
13.2.1 Need for Keys
Figure 13.2 Adding key to the digital signature process
A digital signature needs a public-key system.
The signer signs with her private key; the verifier
verifies with the signer’s public key.
Note
13.12
13.2.2 Signing the Digest
Figure 13.3 Signing the digest
13.13
13-313-3 SERVICES
We discussed several security services in Chapter 1We discussed several security services in Chapter 1
including message confidentiality, messageincluding message confidentiality, message
authentication, message integrity, and nonrepudiation.authentication, message integrity, and nonrepudiation.
A digital signature can directly provide the last three;A digital signature can directly provide the last three;
for message confidentiality we still needfor message confidentiality we still need
encryption/decryption.encryption/decryption.
13.3.1 Message Authentication
13.3.2 Message Integrity
13.3.3 Nonrepudiation
13.3.4 Confidentiality
Topics discussed in this section:Topics discussed in this section:
13.14
A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.
13.3.1 Message Authentication
A digital signature provides message
authentication.
Note
13.15
The integrity of the message is preserved even if we sign
the whole message because we cannot get the same
signature if the message is changed.
13.3.2 Message Integrity
A digital signature provides message integrity.
Note
13.16
13.3.3 Nonrepudiation
Figure 13.4 Using a trusted center for nonrepudiation
Nonrepudiation can be provided using a trusted
party.
Note
13.17
13.3.4 Confidentiality
A digital signature does not provide privacy.
If there is a need for privacy, another layer of
encryption/decryption must be applied.
Figure 13.5 Adding confidentiality to a digital signature scheme
Note
13.21
13-513-5 DIGITAL SIGNATURE SCHEMES
Several digital signature schemes have evolved duringSeveral digital signature schemes have evolved during
the last few decades. Some of them have beenthe last few decades. Some of them have been
implemented.implemented.
13.5.1 RSA Digital Signature Scheme
13.5.2
13.5.3
13.5.4
13.5.5
Topics discussed in this section:Topics discussed in this section:
13.22
13.5.1 RSA Digital Signature Scheme
Figure 13.6 General idea behind the RSA digital signature scheme
13.23
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
13.5.1 Continued
In the RSA digital signature scheme, d is private;
e and n are public.
Note
13.24
Signing and Verifying
13.5.1 Continued
Figure 13.7 RSA digital signature scheme
13.25
13.5.1 Continued
As a trivial example, suppose that Alice chooses p = 823 and q =
953, and calculates n = 784319. The value of φ(n) is 782544. Now
she chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:
Example 13.1
Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates
Bob accepts the message because he has verified Alice’s signature.
13.26
RSA Signature on the Message Digest
13.5.1 Continued
Figure 13.8 The RSA signature on the message digest
13.27
13.5.1 Continued
When the digest is signed instead of the message
itself, the susceptibility of the RSA digital signature
scheme depends on the strength of the hash
algorithm.
Note

More Related Content

What's hot

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
Dr.Florence Dayana
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
Vipin Tejwani
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
Cryptography
CryptographyCryptography
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
DomainKeys Identified Mail (DKIM).pptx
DomainKeys Identified Mail (DKIM).pptxDomainKeys Identified Mail (DKIM).pptx
DomainKeys Identified Mail (DKIM).pptx
SrijanKumarShetty
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
amanchaurasia
 
IPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP Explained
Andriy Berestovskyy
 

What's hot (20)

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
DomainKeys Identified Mail (DKIM).pptx
DomainKeys Identified Mail (DKIM).pptxDomainKeys Identified Mail (DKIM).pptx
DomainKeys Identified Mail (DKIM).pptx
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
IPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP Explained
 

Viewers also liked

Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Ehtisham Ali
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Digital signature ppt
Digital signature pptDigital signature ppt
Digital signature ppt
nurchairulakbarsaad
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Sumanth Paramesh
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
SRINIVAS REDDY
 
Automatic control of street light using LDR
Automatic control of street light using LDRAutomatic control of street light using LDR
Automatic control of street light using LDR
Devang Loharikar
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
Mihika Shah
 
automatic street light
automatic street lightautomatic street light
automatic street lightAnish Anand
 
COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)
Victor Al
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Evaluation for the digital media production
Evaluation for the digital media productionEvaluation for the digital media production
Evaluation for the digital media production
munirba
 
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
Pratik Gandhi
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
deepakmarndi
 

Viewers also liked (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Digital signature ppt
Digital signature pptDigital signature ppt
Digital signature ppt
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMSGSM BASED PREPAID ENERGY METER BILLING VIA SMS
GSM BASED PREPAID ENERGY METER BILLING VIA SMS
 
Automatic control of street light using LDR
Automatic control of street light using LDRAutomatic control of street light using LDR
Automatic control of street light using LDR
 
NIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGYNIGHT VISION TECHNOLOGY
NIGHT VISION TECHNOLOGY
 
automatic street light
automatic street lightautomatic street light
automatic street light
 
COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)COMPUTER AIDED PROCESS PLANNING (CAPP)
COMPUTER AIDED PROCESS PLANNING (CAPP)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
prepaid energy meter
prepaid energy meterprepaid energy meter
prepaid energy meter
 
Evaluation for the digital media production
Evaluation for the digital media productionEvaluation for the digital media production
Evaluation for the digital media production
 
Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)Computer Aided Process Planning (CAPP)
Computer Aided Process Planning (CAPP)
 
Seminar on night vision technology ppt
Seminar on night vision technology pptSeminar on night vision technology ppt
Seminar on night vision technology ppt
 
ppt on PLC
ppt on PLCppt on PLC
ppt on PLC
 

Similar to Digital signatures

C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
ravik09783
 
ch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTSch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTS
tpvvsreenivasarao
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
jayarao21
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
Lecture12
Lecture12Lecture12
Lecture12
Hardik Padhy
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
Jagsir Singh
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Jayanth Dwijesh H P
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
TELKOMNIKA JOURNAL
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
Akash Kamble
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
IJERA Editor
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel
 

Similar to Digital signatures (20)

C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
ch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTSch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTS
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Lecture12
Lecture12Lecture12
Lecture12
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Digital signature
Digital signatureDigital signature
Digital signature
 
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 

Recently uploaded

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
iemerc2024
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 

Recently uploaded (20)

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Self-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptxSelf-Control of Emotions by Slidesgo.pptx
Self-Control of Emotions by Slidesgo.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 

Digital signatures

  • 1. Presented By: MD IRFAN QUASIM Zakir Husain College of Engineering and Technology(ZHCET) DIGITAL SIGNATURE Note: This slide made from the Cryptography and Network Security Book by Frouzan.
  • 2. 13.2 Objectives  To define a digital signature  To define security services provided by a digital signature  To define attacks on digital signatures  To discuss some digital signature schemes, including RSA,  To describe some applications of digital signatures
  • 3. 13.8 13-213-2 PROCESS Figure 13.1 shows the digital signature process. TheFigure 13.1 shows the digital signature process. The sender uses a signing algorithm to sign the message.sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver.The message and the signature are sent to the receiver. The receiver receives the message and the signatureThe receiver receives the message and the signature and applies the verifying algorithm to theand applies the verifying algorithm to the combination. If the result is true, the message iscombination. If the result is true, the message is accepted; otherwise, it is rejected.accepted; otherwise, it is rejected. 13.2.1 Need for Keys 13.2.2 Signing the Digest Topics discussed in this section:Topics discussed in this section:
  • 4. 13.9 13-213-2 Continued Figure 13.1 Digital signature process
  • 5. 13.10 13.2.1 Need for Keys Figure 13.2 Adding key to the digital signature process A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key. Note
  • 6. 13.12 13.2.2 Signing the Digest Figure 13.3 Signing the digest
  • 7. 13.13 13-313-3 SERVICES We discussed several security services in Chapter 1We discussed several security services in Chapter 1 including message confidentiality, messageincluding message confidentiality, message authentication, message integrity, and nonrepudiation.authentication, message integrity, and nonrepudiation. A digital signature can directly provide the last three;A digital signature can directly provide the last three; for message confidentiality we still needfor message confidentiality we still need encryption/decryption.encryption/decryption. 13.3.1 Message Authentication 13.3.2 Message Integrity 13.3.3 Nonrepudiation 13.3.4 Confidentiality Topics discussed in this section:Topics discussed in this section:
  • 8. 13.14 A secure digital signature scheme, like a secure conventional signature can provide message authentication. 13.3.1 Message Authentication A digital signature provides message authentication. Note
  • 9. 13.15 The integrity of the message is preserved even if we sign the whole message because we cannot get the same signature if the message is changed. 13.3.2 Message Integrity A digital signature provides message integrity. Note
  • 10. 13.16 13.3.3 Nonrepudiation Figure 13.4 Using a trusted center for nonrepudiation Nonrepudiation can be provided using a trusted party. Note
  • 11. 13.17 13.3.4 Confidentiality A digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. Figure 13.5 Adding confidentiality to a digital signature scheme Note
  • 12. 13.21 13-513-5 DIGITAL SIGNATURE SCHEMES Several digital signature schemes have evolved duringSeveral digital signature schemes have evolved during the last few decades. Some of them have beenthe last few decades. Some of them have been implemented.implemented. 13.5.1 RSA Digital Signature Scheme 13.5.2 13.5.3 13.5.4 13.5.5 Topics discussed in this section:Topics discussed in this section:
  • 13. 13.22 13.5.1 RSA Digital Signature Scheme Figure 13.6 General idea behind the RSA digital signature scheme
  • 14. 13.23 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA 13.5.1 Continued In the RSA digital signature scheme, d is private; e and n are public. Note
  • 15. 13.24 Signing and Verifying 13.5.1 Continued Figure 13.7 RSA digital signature scheme
  • 16. 13.25 13.5.1 Continued As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = 784319. The value of φ(n) is 782544. Now she chooses e = 313 and calculates d = 160009. At this point key generation is complete. Now imagine that Alice wants to send a message with the value of M = 19070 to Bob. She uses her private exponent, 160009, to sign the message: Example 13.1 Alice sends the message and the signature to Bob. Bob receives the message and the signature. He calculates Bob accepts the message because he has verified Alice’s signature.
  • 17. 13.26 RSA Signature on the Message Digest 13.5.1 Continued Figure 13.8 The RSA signature on the message digest
  • 18. 13.27 13.5.1 Continued When the digest is signed instead of the message itself, the susceptibility of the RSA digital signature scheme depends on the strength of the hash algorithm. Note