0% found this document useful (0 votes)
32 views5 pages

Zeel 10

ins practical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views5 pages

Zeel 10

ins practical
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Faculty of Engineering & Technology

Information and Network Security Laboratory


(203105311)
B. Tech CSE 4th Year 7th Semester

PRACTICAL : 10

AIM: Demonstrate working of Digital Signature using Cryptool.

THEORY: Digital signatures are a critical component of modern


cryptography, providing a means to ensure the authenticity, integrity, and
non-repudiation of digital messages. This explanation outlines the theory
behind digital signatures and demonstrates their functionality using
CrypTool, an interactive cryptography tool.

❖ Theory of Digital Signatures:-

➢ Basic Concepts
A digital signature is a mathematical scheme that binds a person
or entity to digital data, ensuring that the data has not been altered
in transit. The process relies on public key cryptography, which
utilizes a pair of keys: a private key (kept secret by the signer) and
a public key (shared with recipients).

➢ How Digital Signatures Work:-


1. Key Generation: Each user generates a pair of keys—one private
and one public. The private key is used for signing data, while the
public key is used for verification.
2. Signing Process:
• The signer creates a hash of the message using a hash
function, which produces a fixed-length string unique to the
content of the message.
• This hash is then encrypted with the signer's private key to
create the digital signature.
• The original message and its digital signature are sent to the
recipient.
3. Verification Process:
• The recipient receives the message and the digital signature.
• To verify, the recipient decrypts the digital signature using
the sender's public key, retrieving the original hash value.

P a g e | 39
Enrollment No.: 210303105269
Name: Zeel Koladiya
Div: 7B25
Faculty of Engineering & Technology
Information and Network Security Laboratory
(203105311)
B. Tech CSE 4th Year 7th Semester

• The recipient then computes a new hash from the received


message.
• If both hash values match, it confirms that the message is
authentic and has not been altered; otherwise, it indicates
tampering or an invalid signature

✓ Open Cryptool.
Open new file and write some content in it.

✓ Digital Signatures/PKI → Signature demonstrate.

✓ Click on select hash function → Select MD5.


✓ Click on Generate Key → Generate prime key → Store key.
✓ Provide Certificate → Enter name, first name and pin
→ click on create Certificate and PSE.

P a g e | 40
Enrollment No.: 210303105269
Name: Zeel Koladiya
Div: 7B25
Faculty of Engineering & Technology
Information and Network Security Laboratory
(203105311)
B. Tech CSE 4th Year 7th Semester

➢ Click on Document, Hash function, RSA key, Certificate


simultaneously. And observe the changes in output.

P a g e | 41
Enrollment No.: 210303105269
Name: Zeel Koladiya
Div: 7B25
Faculty of Engineering & Technology
Information and Network Security Laboratory
(203105311)
B. Tech CSE 4th Year 7th Semester

➢ Click on Compute hash value, Encrypt hash value, Generate


signature simultaneously.

➢ Click on Hash value, Encrypted hash value, Signature and then


click on Store signature → ok. And obser the output.

P a g e | 42
Enrollment No.: 210303105269
Name: Zeel Koladiya
Div: 7B25
Faculty of Engineering & Technology
Information and Network Security Laboratory
(203105311)
B. Tech CSE 4th Year 7th Semester

✓ Digital Signatures/PKI → Verify Signature.


✓ Choose the signature from list by name.
✓ Click on verify signature.

P a g e | 43
Enrollment No.: 210303105269
Name: Zeel Koladiya
Div: 7B25

You might also like