Introduction Used for communication to verify

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Chapter 3 Encryption Algorithms & Systems (Part C)
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 13 Digital Signature
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
DSA (Digital Signature Algorithm) Tahani Aljehani.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Prepared by Dr. Lamiaa Elshenawy
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
DIGITAL SIGNATURE ALGORITHM. The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186,
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Overview Modern public-key cryptosystems: RSA
Symmetric and Asymmetric Encryption
Advanced Computer Networks
Digital Signatures Assignment
Computer Communication & Networks
CSCE 715: Network Systems Security
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
Section 4.6: Digital Signatures
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Digital signatures.
Digital Signatures Last Updated: Oct 14, 2017.
NET 311 Information Security
Efficient CRT-Based RSA Cryptosystems
ICS 454 Principles of Cryptography
Security in Network Communications
Secure Electronic Transaction (SET) University of Windsor
ICS 454 Principles of Cryptography
Digital Signatures…!.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Electronic Mail Security
Lecture 6: Digital Signature
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Message Authentication Code
Chapter 13 Digital Signature
One Time Signature.
Cryptography and Network Security Chapter 13
Advanced Computer Networks
Diffie-Hellman Key Exchange
HMAC and its Design Objectives
Digital Signature Standard (DSS)
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

Introduction Used for communication to verify Authentication of sender/data origin Integrity of the message received Non-repudiation private key for E & public key for D Identification of doc or message etc. For interchanging data electronically

Implementation Scheme has the following 3 algorithm Key generation Signing Verification It includes MAC Hash values of message Digital pen pad device

Digital Signature Standard Digital Signature Algorithm In 1991, NIST proposed DSA to be used in DSS (FIPS PUB 186) Adopted as a standard in 94 In 96, minor revision was issued In 2000, standard was expanded further SHA-1 DSA v/s RSA Free & license DS & DS + Encryption Strength Of Algorithm Computer Security Resource Center NIST(csrc.nist.gov) Federal Information Processing standard

RSA Digital Signature MD Calculation Signing(i.e:-DS Creation) Transmission Of Original Message & DS together Receiver calculates its own MD De-sign digital signature(i.e:-retrieves sender’s MD) Verification(Note:-Same Hash Algo should be used) MD1=MD2 MD1≠MD2