Digital Signature
Digital Signature
Hash Function
h is a one-way function.
1.(1-1/365).(1-2/365).(1-3/365).....(1-22/365) = 0.493
Digital signature is not only tied to the signer but also to the
message that is being signed.
Only the owner can create the digital signature, hence it can be
used to verify who created a message
Alice takes two large primes p, q and computes n=pq. She chooses eA
such that 1< eA <ø(n) with gcd( eA ,ø(n))=1 and calculate dA such that eA
dA ≡ 1 (mod ø(n)). Alice publishes (eA, n) and keep private dA , p, q.
Signing:
1. Alice’s signs t by computing: s ≡ tdA (mod n). She returns s to Bob.
2. Bob computes s/k(mod n). This is the signed message mdA .
Message Signing phase: Let Alice signs a message m. She does following-
1. Select a secret random k such that gcd(k, p-1)=1
2. Computes r≡αk (mod p)
3. Computes s≡k-1 (m-ar) (mod p-1)
PKI is a framework consisting of policies defining the rules under which the
cryptographic systems operate and procedures for generating and publishing
keys and certificates.
Certification Hierarchy:
CA
RA
Demo: https://learn.pkiindia.in/
Thank You
[email protected]