Download presentation
Presentation is loading. Please wait.
Published byFrode Espeland Modified over 5 years ago
1
Handbook of Applied Cryptography - CH11, from 11.5~11.8
Soon-Woong Min
2
Agenda 11.5 The Digital Signature Algorithm (DSA) 11.6 One-time digital signatures 11.7 Other signature schemes 11.8 Signatures with additional functionality
3
11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.
4
11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.
5
11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.
6
11.5 The Digital Signature Algorithm (DSA)
7
11.5 The Digital Signature Algorithm (DSA)
8
11.5 The Digital Signature Algorithm (DSA)
consists
9
11.5 The Digital Signature Algorithm (DSA)
consists
10
11.5 The Digital Signature Algorithm (DSA)
consists
11
11.5 The Digital Signature Algorithm (DSA)
12
11.5 The Digital Signature Algorithm (DSA)
13
11.6 One-time digital signatures
14
11.6 One-time digital signatures
15
11.6 One-time digital signatures
16
11.6 One-time digital signatures
17
11.6 One-time digital signatures
18
11.6 One-time digital signatures
19
11.7 Other signature schemes
20
11.7 Other signature schemes
21
11.8 Signatures with additional functionality
22
11.8 Signatures with additional functionality
23
11.8 Signatures with additional functionality
24
11.8 Signatures with additional functionality
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.