0% found this document useful (0 votes)
54 views2 pages

Digital Signature Tech

Digital signatures authenticate messages by proving the sender's identity, similar to a physical signature. They are computed using a hash of the message and the sender's private information. Commonly used hash functions like MD-5 and SHA create a fixed-length digest from variable-length messages. Digital signatures enforce authentication, integrity, and non-repudiation. When nodes send routing packets in a network, they append their digital signature for verification by recipients to ensure only legitimate nodes participate in route creation and maintenance.

Uploaded by

VikashKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views2 pages

Digital Signature Tech

Digital signatures authenticate messages by proving the sender's identity, similar to a physical signature. They are computed using a hash of the message and the sender's private information. Commonly used hash functions like MD-5 and SHA create a fixed-length digest from variable-length messages. Digital signatures enforce authentication, integrity, and non-repudiation. When nodes send routing packets in a network, they append their digital signature for verification by recipients to ensure only legitimate nodes participate in route creation and maintenance.

Uploaded by

VikashKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Digital signature is a mechanism by which a message is authenticated i.e.

proving
that a message is effectively coming from a given sender, much like a
signature on a paper document. Digital signatures are computed based on the
documents (message/information) that need to be signed and on some private

Figure Error! No text of specified style in document..1 Digital Signature

information held only by the sender.

In practice, instead of using the whole

message, a hash function is applied to the message to obtain the message digest. A
hash function, in this context, takes an arbitrary-sized message as input and
produces a fixed-size message digest as output. Among the commonly used hash
functions in practice are Message Digest 5 (MD-5) and Secure Hash Algorithm
(SHA). These algorithms are fairly sophisticated and ensure that it is highly
improbable for two different messages to be mapped to the same hash value.
Using Digital Signature Authentication, Integrity and Non Repudiation can be
enforced. So digital signature can be used to verify if a node is legitimate to respond
in the network and this digital signature technique is used to authenticate all
legitimate nodes of the network, if any malicious node is willing to be part of the
network then the access to that malicious node is restricted.
As shown in figure 4.1, during route creation and maintenance phase, nodes
appends their digital signature to the RREQ and RREP packets. When the sender
broadcasts RREQ in the network, it appends its signature in the signature column of
RREQ packet. All further recipients of the packets verify the digital signature of
previous nodes by list of all nodes and their respective digital signature. If the

signature is matched then the recipient node can be sure that it is a trusted node in
the network. If the signature is found to be duplicated or the signature is found to be
absent in the signature column then it is considered to be malicious node. Thus, only
legitimate nodes can take part in the process of route creation and maintenance. It
will also be able to handle packet modification and single malicious node problem.
The proposed algorithm is as follows (Sharma & Trivedi, 2011):

You might also like