Unit-4-Digital Signature

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

Digital Signature

conventional signature digital signature


A conventional signature is when we sign a document
included in the document digitally, we send the signature as
a separate document
Verification Method: when the Verification Method: For a digital
recipient receives a document, signature, the recipient receives
she compares the signature on the message and the signature.
the document with the signature The recipient needs to apply a
on file. verification technique to the
combination of the message and
the signature to verify the
authenticity.
Relationship: there is normally a Relationship: there is a one-to-
one-to-many relationship between one relationship between a
a signature and documents. signature and a message.
Duplicity: a copy of the signed Duplicity: there is no such
document can be distinguished distinction unless there is a factor
from the original one on file. of time on the document.
Digital Signature Process

The sender uses a signing algorithm to sign the message.


The message and the signature are sent to the receiver. The
receiver receives the message and the signature and applies
the verifying algorithm to the combination. If the result is
true, the message is accepted; otherwise, it is rejected.
Need for Keys Adding key to the digital signature process

A digital signature needs a public-key system.


The signer signs with her private key; the verifier verifies
with the signer’s public key.
A cryptosystem uses the private and public keys of the
receiver: a digital signature uses
the private and public keys of the sender.
Signing the Digest
Security Services
Message Authentication: a message authentication code
(MAC), sometimes known as a tag, is a short piece of
information used to authenticate a message—in other words, to
confirm that the message came from the stated sender (its
authenticity) and has not been changed.
Message Integrity: Message integrity means that a
message has not been tampered with or altered.
Nonrepudiation: Nonrepudiation refers to the ability to
ensure that a party to a contract or a communication cannot
deny the authenticity of their signature on a document or the
sending of a message that they originated. To repudiate means
to deny.
Confidentiality: the state of keeping or being kept secret or
private.
Message Authentication
A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.
A digital signature provides message authentication.

Message Integrity
The integrity of the message is preserved even if we sign
the whole message because we cannot get the same
signature if the message is changed.

A digital signature provides message integrity.


Nonrepudiation
Using a trusted center for nonrepudiation

Nonrepudiation can be provided using a trusted party.


Confidentiality
Adding confidentiality to a digital signature scheme

A digital signature does not provide privacy.


If there is a need for privacy, another layer of
encryption/decryption must be applied.
Digital Signature Schemes

Several digital signature schemes have evolved during


the last few decades. Some of them have been
implemented.

RSA Digital Signature Scheme


ElGamal Digital Signature Scheme
Digital Signature Standard (DSS)
RSA digital signature scheme

Attacks on RSA Signature:


• Key-Only Attack In RSA,
• Known-Message Attack Public key Ku = {e, n}
Private key Kr = {d, p,q}
Example

As a trivial example, suppose that Alice chooses p = 823 and q =


953, and calculates n = 784319. The value of f(n) is 782544. Now
she chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:

Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates

Bob accepts the message because he has verified Alice’s signature.


RSA Signature on the Message Digest

When the digest is signed instead of the message itself, the


susceptibility of the RSA digital signature scheme depends on the
strength of the hash algorithm.
Digital Signature Standard (DSS)
Digital Signature
Standard (DSS)
Sender Side :
In DSS Approach, a hash code is generated out of the
message and following inputs are given to the signature
function –
• The hash code.
• The random number ‘k’ generated for that particular
signature.
• The private key of the sender i.e., PR(a).
• A global public key(which is a set of parameters for the
communicating principles) i.e., PU(g).
These input to the function will provide us with the output
signature containing two components – ‘s’ and ‘r’. Therefore,
the original message concatenated with the signature is sent
to the receiver.
Receiver Side :
At the receiver end, verification of the sender is done. The hash
code of the sent message is generated. There is a verification
function which takes the following inputs –
• The hash code generated by the receiver.
• Signature components ‘s’ and ‘r’.
• Public key of the sender.
• Global public key.
The output of the verification function is compared with the
signature component ‘r’. Both the values will match if the sent
signature is valid because only the sender with the help of it
private key can generate a valid signature.
Benefits of advanced signature:
• A computerized signature gives better security in the exchange. Any
unapproved individual can’t do fakeness in exchanges.
• You can undoubtedly follow the situation with the archives on which the
computerized mark is applied.
• High velocity up record conveyance.
• It is 100% lawful it is given by the public authority approved ensuring
authority.
• In the event that you have marked a report carefully, you can’t deny it.
• In this mark, When a record is get marked, date and time are consequently
stepped on it.
• It is preposterous to expect to duplicate or change the report marked
carefully.
• ID of the individual that signs.
• Disposal of the chance of committing misrepresentation by a sham.

You might also like