Presentation is loading. Please wait.

Presentation is loading. Please wait.

Handbook of Applied Cryptography - CH11, from 11.5~11.8

Similar presentations


Presentation on theme: "Handbook of Applied Cryptography - CH11, from 11.5~11.8"— Presentation transcript:

1 Handbook of Applied Cryptography - CH11, from 11.5~11.8
Soon-Woong Min

2 Agenda 11.5 The Digital Signature Algorithm (DSA) 11.6 One-time digital signatures 11.7 Other signature schemes 11.8 Signatures with additional functionality

3 11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.

4 11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.

5 11.5 The Digital Signature Algorithm (DSA)
Authentication : Bob wants to be sure that his communication partner is Alice. Data integrity : Bob wants to be sure that Alice’s message has not been altered. i.e., contain no modification, insertion or deletion Non-repudiation : Alice cannot claim that she did not send the message, if she actually sent it. This service is particularly important in electronic commerce applications, where it is important that a consumer cannot deny the authorization of a purchase.

6 11.5 The Digital Signature Algorithm (DSA)

7 11.5 The Digital Signature Algorithm (DSA)

8 11.5 The Digital Signature Algorithm (DSA)
consists

9 11.5 The Digital Signature Algorithm (DSA)
consists

10 11.5 The Digital Signature Algorithm (DSA)
consists

11 11.5 The Digital Signature Algorithm (DSA)

12 11.5 The Digital Signature Algorithm (DSA)

13 11.6 One-time digital signatures

14 11.6 One-time digital signatures

15 11.6 One-time digital signatures

16 11.6 One-time digital signatures

17 11.6 One-time digital signatures

18 11.6 One-time digital signatures

19 11.7 Other signature schemes

20 11.7 Other signature schemes

21 11.8 Signatures with additional functionality

22 11.8 Signatures with additional functionality

23 11.8 Signatures with additional functionality

24 11.8 Signatures with additional functionality


Download ppt "Handbook of Applied Cryptography - CH11, from 11.5~11.8"

Similar presentations


Ads by Google