Presentation is loading. Please wait.

Presentation is loading. Please wait.

B. R. Chandavarkar CSE Dept., NITK Surathkal

Similar presentations


Presentation on theme: "B. R. Chandavarkar CSE Dept., NITK Surathkal"— Presentation transcript:

1 B. R. Chandavarkar CSE Dept., NITK Surathkal
Digital Signature B. R. Chandavarkar CSE Dept., NITK Surathkal

2 A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. Typically the signature is formed by taking the hash of the message and encrypting the message with the creator’s private key. The signature guarantees the source and integrity of the message. The digital signature standard (DSS) is an NIST standard that uses the secure hash algorithm (SHA). The most important development from the work on public-key cryptography is the digital signature. The digital signature provides a set of security capabilities that would be difficult to implement in any other way.

3

4 Message authentication protects two parties who exchange messages from any third party. However, it does not protect the two parties against each other. Several forms of dispute between the two are possible. An electronic funds transfer takes place, and the receiver increases the amount of funds transferred and claims that the larger amount had arrived from the sender. An electronic mail message contains instructions to a stockbroker for a transaction that subsequently turns out badly. The sender pretends that the message was never sent.

5 In situations where there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is the digital signature. The digital signature must have the following properties: It must verify the author and the date and time of the signature. It must authenticate the contents at the time of the signature. It must be verifiable by third parties, to resolve disputes. Thus, the digital signature function includes the authentication function.

6 Digital Signature Requirements
The signature must be a bit pattern that depends on the message being signed. The signature must use some information unique to the sender to prevent both forgery and denial. It must be relatively easy to produce the digital signature. It must be relatively easy to recognize and verify the digital signature. It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message. It must be practical to retain a copy of the digital signature in storage.

7 Simplified Depiction of Essential Elements of Digital Signature Process

8 A. ElGamal and Schnorr signature schemes
ElGamal encryption scheme is designed to enable encryption by a user’s public key with decryption by the user’s private key. The ElGamal signature scheme involves the use of the private key for encryption and the public key for decryption

9

10

11

12 B. Schnorr Digital Signature
The Schnorr signature scheme is based on discrete logarithms. The Schnorr scheme minimizes the message-dependent amount of computation required to generate a signature. The main work for signature generation does not depend on the message and can be done during the idle time of the processor. The message-dependent part of the signature generation requires multiplying a 2n-bit integer with an n-bit integer. The scheme is based on using a prime modulus p, with (p-1) having a prime factor of q appropriate size; that is, p-1 ≡ (mod q). Typically, we use p ≈ 21024and q ≈ Thus, p is a 1024-bit number, and q is a 160-bit number, which is also the length of the SHA-1 hash value.

13

14

15 Digital Signature Standard (DSS)
The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186, known as the Digital Signature Standard (DSS). The DSS makes use of the Secure Hash Algorithm (SHA) and presents a new digital signature technique, the Digital Signature Algorithm (DSA). The DSS was originally proposed in 1991 and revised in 1993 in response to public feedback concerning the security of the scheme. There was a further minor revision in In 2000, an expanded version of the standard was issued as FIPS 186-2, subsequently updated to FIPS in 2009. This latest version also incorporates digital signature algorithms based on RSA and on elliptic curve cryptography.

16 The DSS uses an algorithm that is designed to provide only the digital signature function. Unlike RSA, it cannot be used for encryption or key exchange. Nevertheless, it is a public-key technique.

17 The Digital Signature Algorithm
The DSA is based on the difficulty of computing discrete logarithms and is based on schemes originally presented by ElGamal and Schnorr.

18

19

20

21

22


Download ppt "B. R. Chandavarkar CSE Dept., NITK Surathkal"

Similar presentations


Ads by Google