Digital Signatures…!.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Chapter 3 Encryption Algorithms & Systems (Part C)
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Prepared by Dr. Lamiaa Elshenawy
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Overview Modern public-key cryptosystems: RSA
Unit 3 Section 6.4: Internet Security
1. Public Key Encryption (A Simple Case)
Computer Communication & Networks
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
第四章 數位簽章.
第四章 數位簽章.
Cryptographic Hash Function
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 10 – Digital Signatures.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Introduction Used for communication to verify
Cryptography and Security Technologies
Public Key Encryption and the RSA Algorithm
Authentication Protocols
NET 311 Information Security
Cryptography in .Net CS 795.
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Lecture 6: Digital Signature
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Chapter 13 Digital Signature
Cryptography and Network Security Chapter 13
Chapter 3 - Public-Key Cryptography & Authentication
Cryptology Design Fundamentals
Oblivious Transfer.
Digital Signature Standard (DSS)
LAB 3: Digital Signature
Presentation transcript:

Digital Signatures…!

Digital Signatures What is a digital signature? A digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact.

Creation of Digital Signatures A digital signature scheme typically consists of three algorithms: HASHING algorithm. Signature Generation Algorithm A signature verifying algorithm that, given a message, public key and a signature, either accepts or rejects the message's claim to authenticity.

Methods of Encryption based on Privacy Encryption scrambles or modifies a message or document so it cannot be read and understood, except by the intended recipient. A key is necessary to reverse the scrambling or modification, to make the message readable. Methods of Encryption based on Privacy are as follows: a message may be digitally signed, but not encrypted a message may be encrypted first, then digitally signed a message may be digitally signed first, then encrypted

Prerequisites to create a digital signature Public-private digital key pair Certificate Authority. The public key certificate creates proof of the identity of the signer by using the services of a certificate authority. A certificate authority uses a variety of processes to associate the particular public key with an individual. The combination of public key and proof of identity result in a public key certificate - also called a signer's certificate.

Digital Signature Verification It is the process of checking the digital signature by the reference to the original message and a given public key. Verifying also relies on a formula. Here, the formula depends on three inputs: The output of the formula is a simple answer: YES or NO.

Digital Signature Schemes The following are the widely used Schemes for Digital Signatures RSA Scheme ElGamal Scheme Schnorr Scheme Digital Signature Standard (DSS)

RSA Algorithm RSA stands for Rivest, Shamir and Adleman who first publicly described the algorithm RSA involves a public key and a private key.  The keys for the RSA algorithm are generated the following way: Choose two distinct prime numbers p and q. Compute n = pq, n is used as a modulus in further steps Compute φ(n) = (p – 1)(q – 1), where φ is Euler's quotient function. Choose an integer e such that 1< e <φ(n) and gcd(e,φ(n)) = 1, i.e. e and φ(n) are co-prime and e is released as the public key exponent. Determine d = e–1 mod φ(n); i.e. d is the multiplicative inverse of e mod φ(n) and d is kept as the private key exponent.

Digital Signature Standard (DSS) The DSA is used by a signatory to generate a digital signature on data and by a verifier to verify the authenticity of the signature. Each signatory has a public and private key. For both signature generation and verification, the data which is referred to as a message, M, is reduced by means of the Secure Hash Algorithm (SHA) The DSA makes use of the following parameters: k = a randomly or pseudorandomly generated integer with 0 < k < q The integers p, q, and g can be public and can be common to a group of users. A user's private and public keys are x and y, respectively.

Digital Signature Standard (DSS) The signature of a message M is the pair of numbers r and s computed according to the equations below: r = (gk mod p) mod q and  s = (k-1(SHA(M) + xr)) mod q. In the above, k-1 is the multiplicative inverse of k, mod q; i.e. (k-1 k) mod q = 1 and 0< k-1< q. The verification process goes as below: Let M', r' and s' be the received versions of M, r, and s, respectively, and let y be the public key of the signatory. The verifier first checks to see that 0 < r' < q and 0 < s' < q; if either condition is violated the signature shall be rejected. If these two conditions are satisfied, the verifier computes  v = (((g)ul (y)u2) mod p) mod q.  If v = r', then the signature is verified else if v != r’ then the received message could have been modified and hence not authentic

Advantages of Digital Signatures Authentication, identification of the person that signs. Integrity of data, every change will be detected. Non repudiation, because the author cannot be denied of his work (he created and sent). Imposter prevention Elimination of possibility of committing fraud by an imposter