SlideShare a Scribd company logo
8
Most read
15
Most read
20
Most read
13.1
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signature
13.2
13-2 PROCESS
Figure 13.1 shows the digital signature process. The
sender uses a signing algorithm to sign the message.
The message and the signature are sent to the receiver.
The receiver receives the message and the signature
and applies the verifying algorithm to the
combination. If the result is true, the message is
accepted; otherwise, it is rejected.
13.2.1 Need for Keys
13.2.2 Signing the Digest
Topics discussed in this section:
13.3
13-2 Continued
Figure 13.1 Digital signature process
13.4
13.2.1 Need for Keys
Figure 13.2 Adding key to the digital signature process
A digital signature needs a public-key system.
The signer signs with her private key; the verifier
verifies with the signer’s public key.
Note
13.5
13.2.1 Continued
A cryptosystem uses the private and public keys of
the receiver: a digital signature uses
the private and public keys of the sender.
Note
13.6
13.2.2 Signing the Digest
Figure 13.3 Signing the digest
13.7
13-3 SERVICES
We discussed several security services in Chapter 1
including message confidentiality, message
authentication, message integrity, and nonrepudiation.
A digital signature can directly provide the last three;
for message confidentiality we still need
encryption/decryption.
13.3.1 Message Authentication
13.3.2 Message Integrity
13.3.3 Nonrepudiation
13.3.4 Confidentiality
Topics discussed in this section:
13.8
A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.
13.3.1 Message Authentication
A digital signature provides message authentication.
Note
13.9
The integrity of the message is preserved even if we sign
the whole message because we cannot get the same
signature if the message is changed.
13.3.2 Message Integrity
A digital signature provides message integrity.
Note
13.10
13.3.3 Nonrepudiation
Figure 13.4 Using a trusted center for nonrepudiation
Nonrepudiation can be provided using a trusted
party.
Note
13.11
13.3.4 Confidentiality
A digital signature does not provide privacy.
If there is a need for privacy, another layer of
encryption/decryption must be applied.
Figure 13.5 Adding confidentiality to a digital signature scheme
Note
13.12
13-5 DIGITAL SIGNATURE SCHEMES
Several digital signature schemes have evolved during
the last few decades. Some of them have been
implemented.
13.5.1 RSA Digital Signature Scheme
13.5.4 Digital Signature Standard (DSS)
Topics discussed in this section:
13.13
13.5.1 RSA Digital Signature Scheme
Figure 13.6 General idea behind the RSA digital signature scheme
13.14
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
13.5.1 Continued
In the RSA digital signature scheme, d is private;
e and n are public.
Note
13.15
Signing and Verifying
13.5.1 Continued
Figure 13.7 RSA digital signature scheme
13.16
13.5.1 Continued
As a trivial example, suppose that Alice chooses p = 823 and q =
953, and calculates n = 784319. The value of f(n) is 782544. Now
she chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:
Example 13.1
Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates
Bob accepts the message because he has verified Alice’s signature.
13.17
RSA Signature on the Message Digest
13.5.1 Continued
Figure 13.8 The RSA signature on the message digest
13.18
13.5.1 Continued
When the digest is signed instead of the message
itself, the susceptibility of the RSA digital signature
scheme depends on the strength of the hash
algorithm.
Note
13.19
13.5.4 Digital Signature Standard (DSS)
Figure 13.13 General idea behind DSS scheme
13.20
Key Generation.
1) Alice chooses primes p and q.
2) Alice uses <Zp*, × > and <Zq*, ×>.
3) Alice creates e1 to be the qth root of 1 modulo p.
4) Alice chooses d and calculates e2 = e1
d.
5) Alice’s public key is (e1, e2, p, q); her private key is (d).
13.5.4 Continued
13.21
Verifying and Signing
13.5.4 Continued
Figure 13.14 DSS scheme
13.22
13.5.1 Continued
Alice chooses q = 101 and p = 8081. Alice selects e0 = 3 and
calculates e1 = e0
(p−1)/q mod p = 6968. Alice chooses d = 61 as the
private key and calculates e2 = e1
d mod p = 2038. Now Alice can
send a message to Bob. Assume that h(M) = 5000 and Alice
chooses r = 71:
Example 13.5
Alice sends M, S1, and S2 to Bob. Bob uses the public keys to
calculate V.
13.23
DSS Versus RSA
Computation of DSS signatures is faster than
computation of RSA signatures when using the same p.
13.5.4 Continued

More Related Content

PPTX
RSA Algorithm
PPT
Digital Signature Standard
PPTX
Wireshark
PPT
Secure Socket Layer
PPTX
PPTX
Elgamal_digital_signature_scheme.pptx
PPTX
Elliptic Curve Cryptography
PPTX
Message digest & digital signature
RSA Algorithm
Digital Signature Standard
Wireshark
Secure Socket Layer
Elgamal_digital_signature_scheme.pptx
Elliptic Curve Cryptography
Message digest & digital signature

What's hot (20)

PPTX
Automata theory -Conversion of ε nfa to nfa
DOCX
Ports and protocols
PPT
Secure shell ppt
PPTX
Kerberos
PPT
Design issues for the layers
PPT
Information and data security digital signatures
PPTX
Hybrid encryption ppt
PPSX
Secure socket layer
PDF
Solution(1)
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
PPTX
PPTX
SSL TLS Protocol
PPTX
Secure SHell
PDF
Operating system structures
PPTX
Digital signature(Cryptography)
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Http Vs Https .
PPT
ch12 medium acess control-unit2.ppt
PPTX
Key management
PPTX
I mage encryption using rc5
Automata theory -Conversion of ε nfa to nfa
Ports and protocols
Secure shell ppt
Kerberos
Design issues for the layers
Information and data security digital signatures
Hybrid encryption ppt
Secure socket layer
Solution(1)
Security of software defined networking (sdn) and cognitive radio network (crn)
SSL TLS Protocol
Secure SHell
Operating system structures
Digital signature(Cryptography)
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Http Vs Https .
ch12 medium acess control-unit2.ppt
Key management
I mage encryption using rc5
Ad

Similar to Digital Signatures RSA DSS Algorithm Explained (20)

PPT
Digital signatures
PPT
ch-13 Digital Signature FOR CNS STUDENTS
PPT
C08 crypto-digital signature13
PPT
digital_sign_interview.ppt
PPT
Introduction to Digital signatures
PPSX
Digital signature
PPT
Digital Signature.ppt
PPT
Digital signature
PPTX
Information and network security 45 digital signature standard
PDF
chap13-digitalsignature.pdf
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPTX
chapter three 3-part II-1lecture slide.pptx
PPT
Key Digital Signatures
PPTX
Digital signature.pptx
PPT
Digital signature
PPTX
Digital signature and it's real time app
PPT
Digital Signature in CryptographyElgammal
PPT
ch13.ppt
PPT
Iss lecture 4
Digital signatures
ch-13 Digital Signature FOR CNS STUDENTS
C08 crypto-digital signature13
digital_sign_interview.ppt
Introduction to Digital signatures
Digital signature
Digital Signature.ppt
Digital signature
Information and network security 45 digital signature standard
chap13-digitalsignature.pdf
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
chapter three 3-part II-1lecture slide.pptx
Key Digital Signatures
Digital signature.pptx
Digital signature
Digital signature and it's real time app
Digital Signature in CryptographyElgammal
ch13.ppt
Iss lecture 4
Ad

More from GoldenMIT (6)

PPTX
Chapter 24 Wireless Network Security Systems
PPTX
Chapter 23 Internet Authentication Applications
PPTX
Chapter 22 Internet Security Protocols and Standards
PDF
Hash Functions - Uses, Requirements, Secure Hash Algorithm
PDF
Information Security Incident Management.pdf
PPT
ch-10.ppt
Chapter 24 Wireless Network Security Systems
Chapter 23 Internet Authentication Applications
Chapter 22 Internet Security Protocols and Standards
Hash Functions - Uses, Requirements, Secure Hash Algorithm
Information Security Incident Management.pdf
ch-10.ppt

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Module 3: Health Systems Tutorial Slides S2 2025
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
Introduction and Scope of Bichemistry.pptx
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
PDF
Business Ethics Teaching Materials for college
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Open folder Downloads.pdf yes yes ges yes
DOCX
UPPER GASTRO INTESTINAL DISORDER.docx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PPTX
How to Manage Starshipit in Odoo 18 - Odoo Slides
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PDF
English Language Teaching from Post-.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Module 3: Health Systems Tutorial Slides S2 2025
Open Quiz Monsoon Mind Game Prelims.pptx
Introduction and Scope of Bichemistry.pptx
Cardiovascular Pharmacology for pharmacy students.pptx
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
Business Ethics Teaching Materials for college
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Open folder Downloads.pdf yes yes ges yes
UPPER GASTRO INTESTINAL DISORDER.docx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Week 4 Term 3 Study Techniques revisited.pptx
Open Quiz Monsoon Mind Game Final Set.pptx
How to Manage Starshipit in Odoo 18 - Odoo Slides
O5-L3 Freight Transport Ops (International) V1.pdf
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
English Language Teaching from Post-.pdf

Digital Signatures RSA DSS Algorithm Explained

  • 1. 13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Digital Signature
  • 2. 13.2 13-2 PROCESS Figure 13.1 shows the digital signature process. The sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver. The receiver receives the message and the signature and applies the verifying algorithm to the combination. If the result is true, the message is accepted; otherwise, it is rejected. 13.2.1 Need for Keys 13.2.2 Signing the Digest Topics discussed in this section:
  • 3. 13.3 13-2 Continued Figure 13.1 Digital signature process
  • 4. 13.4 13.2.1 Need for Keys Figure 13.2 Adding key to the digital signature process A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key. Note
  • 5. 13.5 13.2.1 Continued A cryptosystem uses the private and public keys of the receiver: a digital signature uses the private and public keys of the sender. Note
  • 6. 13.6 13.2.2 Signing the Digest Figure 13.3 Signing the digest
  • 7. 13.7 13-3 SERVICES We discussed several security services in Chapter 1 including message confidentiality, message authentication, message integrity, and nonrepudiation. A digital signature can directly provide the last three; for message confidentiality we still need encryption/decryption. 13.3.1 Message Authentication 13.3.2 Message Integrity 13.3.3 Nonrepudiation 13.3.4 Confidentiality Topics discussed in this section:
  • 8. 13.8 A secure digital signature scheme, like a secure conventional signature can provide message authentication. 13.3.1 Message Authentication A digital signature provides message authentication. Note
  • 9. 13.9 The integrity of the message is preserved even if we sign the whole message because we cannot get the same signature if the message is changed. 13.3.2 Message Integrity A digital signature provides message integrity. Note
  • 10. 13.10 13.3.3 Nonrepudiation Figure 13.4 Using a trusted center for nonrepudiation Nonrepudiation can be provided using a trusted party. Note
  • 11. 13.11 13.3.4 Confidentiality A digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. Figure 13.5 Adding confidentiality to a digital signature scheme Note
  • 12. 13.12 13-5 DIGITAL SIGNATURE SCHEMES Several digital signature schemes have evolved during the last few decades. Some of them have been implemented. 13.5.1 RSA Digital Signature Scheme 13.5.4 Digital Signature Standard (DSS) Topics discussed in this section:
  • 13. 13.13 13.5.1 RSA Digital Signature Scheme Figure 13.6 General idea behind the RSA digital signature scheme
  • 14. 13.14 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA 13.5.1 Continued In the RSA digital signature scheme, d is private; e and n are public. Note
  • 15. 13.15 Signing and Verifying 13.5.1 Continued Figure 13.7 RSA digital signature scheme
  • 16. 13.16 13.5.1 Continued As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = 784319. The value of f(n) is 782544. Now she chooses e = 313 and calculates d = 160009. At this point key generation is complete. Now imagine that Alice wants to send a message with the value of M = 19070 to Bob. She uses her private exponent, 160009, to sign the message: Example 13.1 Alice sends the message and the signature to Bob. Bob receives the message and the signature. He calculates Bob accepts the message because he has verified Alice’s signature.
  • 17. 13.17 RSA Signature on the Message Digest 13.5.1 Continued Figure 13.8 The RSA signature on the message digest
  • 18. 13.18 13.5.1 Continued When the digest is signed instead of the message itself, the susceptibility of the RSA digital signature scheme depends on the strength of the hash algorithm. Note
  • 19. 13.19 13.5.4 Digital Signature Standard (DSS) Figure 13.13 General idea behind DSS scheme
  • 20. 13.20 Key Generation. 1) Alice chooses primes p and q. 2) Alice uses <Zp*, × > and <Zq*, ×>. 3) Alice creates e1 to be the qth root of 1 modulo p. 4) Alice chooses d and calculates e2 = e1 d. 5) Alice’s public key is (e1, e2, p, q); her private key is (d). 13.5.4 Continued
  • 21. 13.21 Verifying and Signing 13.5.4 Continued Figure 13.14 DSS scheme
  • 22. 13.22 13.5.1 Continued Alice chooses q = 101 and p = 8081. Alice selects e0 = 3 and calculates e1 = e0 (p−1)/q mod p = 6968. Alice chooses d = 61 as the private key and calculates e2 = e1 d mod p = 2038. Now Alice can send a message to Bob. Assume that h(M) = 5000 and Alice chooses r = 71: Example 13.5 Alice sends M, S1, and S2 to Bob. Bob uses the public keys to calculate V.
  • 23. 13.23 DSS Versus RSA Computation of DSS signatures is faster than computation of RSA signatures when using the same p. 13.5.4 Continued