Digital Signature Standard (DSS)

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Cryptographic Technologies
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
1 Information System Security AABFS-Jordan Summer 2006 Digital Signature and Hashing Functions Prepared by: Maher Abu Hamdeh & Adel Hamdan Supervised by:
Chapter 3 Encryption Algorithms & Systems (Part C)
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 13
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
DSA (Digital Signature Algorithm) Tahani Aljehani.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Prepared by Dr. Lamiaa Elshenawy
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
X. Digital Signatures and Authentication Protocols We begin this chapter with an overview of digital signatures, authentication protocol and Digital Signature.
DIGITAL SIGNATURE ALGORITHM. The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186,
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Cryptographic Hash Function
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Introduction Used for communication to verify
NET 311 Information Security
ICS 454 Principles of Cryptography
Cryptography and Network Security
Cryptography and Network Security Chapter 13
Public-Key Cryptography and Message Authentication
The Secure Sockets Layer (SSL) Protocol
ICS 454 Principles of Cryptography
Digital Signatures…!.
Electronic Mail Security
NET 311 Information Security
Cryptography and Network Security Chapter 13
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter -8 Digital Signatures
One Time Signature.
Cryptography and Network Security Chapter 13
Basics Of Symmetric Encryption
Diffie-Hellman Key Exchange
One-way Hash Function Network Security.
HMAC and its Design Objectives
Hash Function Requirements
Elliptic-Curve Cryptography (ECC)
The RSA Public-Key Encryption Algorithm
The Secure Hash Function (SHA)
Digital Signatures Network Security.
Message Authentication
Simple Hash Functions Network Security.
Presentation transcript:

Digital Signature Standard (DSS) Network Security

Digital Signature Standard (DSS) Objectives of the Topic After completing this topic, a student will be able to explain Digital Signature Standard (DSS).

Digital Signature Standard (DSS) Figures and material in this topic have been adapted from W. Stalling’s “Network Security Essentials ”, 2014. W. Stalling’s “Cryptography and Network Security Principles and Practice”, 2014.

Digital Signature Standard (DSS) The most important development from the work on public-key cryptography is the digital signature. It provides a set of security capabilities that would be difficult to implement in any other way.

Digital Signature Standard (DSS) The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186, known as the Digital Signature Standard (DSS) or the Digital Signature Algorithm (DSA).

Digital Signature Standard (DSS) The DSA makes use of the Secure Hash Algorithm (SHA). The DSA was originally proposed in 1991 and revised in 1993 in response to public feedback concerning the security of the scheme.

Digital Signature Standard (DSS) There was a further minor revision in 1996. In 2000, an expanded version of the standard was issued as FIPS 186-2, subsequently updated to FIPS 186-3 in 2009.

Digital Signature Standard (DSS) The DSA Approach employs an algorithm designed to provide only the digital signature function. it is a public-key technique. Unlike RSA, it cannot be used for encryption or key exchange.

Digital Signature Standard (DSS) The RSA Approach for Digital Signatures: When RSA is used for digital signatures, the message to be signed is input to a hash function that produces a secure hash code of fixed length.

Digital Signature Standard (DSS) This hash code is then encrypted using the sender’s private key to form the signature. Both the message and the signature are then transmitted. The recipient takes the message and produces a hash code.

Digital Signature Standard (DSS) The recipient also decrypts the signature using the sender’s public key. If the calculated hash code matches the decrypted signature, the signature is accepted as valid.

Digital Signature Standard (DSS) Because only the sender knows the private key, only the sender could have produced a valid signature.

Digital Signature Standard (DSS)

Digital Signature Standard (DSS) The DSA Approach: also makes use of a hash function. The hash code is provided as input to a signature function along with a random number k generated for this particular signature.

Digital Signature Standard (DSS) The signature function also depends on the sender’s private key (PRa) and a set of parameters known to a group of communicating principals.

Digital Signature Standard (DSS) We can consider this set to constitute a global public key (PUG). The result is a signature consisting of two components, labeled s and r.

Digital Signature Standard (DSS) At the receiving end, the hash code of the incoming message is generated. This plus the signature is input to a verification function.

Digital Signature Standard (DSS) The verification function also depends on the global public key as well as the sender’s public key (PUa), which is paired with the sender’s private key.

Digital Signature Standard (DSS) The output of the verification function is a value that is equal to the signature component r if the signature is valid.

Digital Signature Standard (DSS) The signature function is such that only the sender, with knowledge of the private key, could have produced the valid signature.

Digital Signature Standard (DSS)