Chapter -8 Digital Signatures

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Attacks on Digital Signature Algorithm: RSA
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Data Security and Encryption (CSE348) 1. Lecture # 20 2.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Computer and Network Security - Message Digests, Kerberos, PKI –
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Information Security message M one-way hash fingerprint f = H(M)
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Basic Network Encryption
Digital signatures.
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Last Updated: Oct 14, 2017.
Chapter 13 – Digital Signatures & Authentication Protocols
Message Security, User Authentication, and Key Management
Subject Name: NETWORK SECURITY Subject Code: 10EC832
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Cryptography and Network Security Chapter 13
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Protocol ap1.0: Alice says “I am Alice”
Bishop: Chapter 10 Key Management: Digital Signature
Cryptography and Network Security Chapter 13
Chapters 14,15 Security.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 13 Digital Signature
Cryptography and Network Security Chapter 13
Chapter 3 - Public-Key Cryptography & Authentication
Basic Network Encryption
Basic of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
One-way Hash Function Network Security.
Hash Function Requirements
Chapter 8 roadmap 8.1 What is network security?
Digital Signature Standard (DSS)
Digital Signatures Network Security.
Presentation transcript:

Chapter -8 Digital Signatures Cryptography Techniques (CNET-326)

Digital Signatures The most important development from the work on public-key cryptography is the digital signature. The digital signature provides a set of security capabilities that would be difficult to implement in any other way. Figure 13.1 is a generic model of the process of making and using digital signatures. Bob can sign a message using a digital signature generation algorithm. The inputs to the algorithm are the message and Bob’s private key. Any other user, say Alice, can verify the signature using a verification algorithm, whose inputs are the message, the signature, and Bob’s public key.

Digital Signature Model

Digital Signature Model In simplified terms, the essence of the digital signature mechanism is shown in Stallings Figure 13.2. This repeats the logic shown in Figure 11.3. On example, using RSA, is available at this book's Web site. We begin this chapter with an overview of digital signatures. Then, we introduce the Digital Signature Standard (DSS).

Digital Signature Properties The digital signature must have the following properties: • It must verify the author and the date and time of the signature. • It must authenticate the contents at the time of the signature. • It must be verifiable by third parties, to resolve disputes.

Digital Signatures Requirements On the basis of the properties and attacks just discussed, we can formulate the following requirements for a digital signature. • The signature must be a bit pattern that depends on the message being signed. • The signature must use some information unique to the sender to prevent both forgery and denial. • It must be relatively easy to produce the digital signature. • It must be relatively easy to recognize and verify the digital signature. • It must be computationally infeasible to forge a digital signature. • It must be practical to retain a copy of the digital signature in storage.