0% found this document useful (0 votes)
321 views17 pages

PPT

Digital signatures use public key cryptography to provide authentication and verification of digital documents. There are two main types of cryptography: symmetric which uses a shared secret key for encryption and decryption, and asymmetric which uses a public/private key pair. Digital signatures rely on asymmetric cryptography and work by having the sender encrypt a document hash with their private key, then the receiver can decrypt it with the sender's public key to verify the sender's identity and that the document contents have not changed. Common digital signature algorithms include RSA, DSA, and ECDSA which generate and use key pairs to sign and verify documents.

Uploaded by

sanketh99
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views17 pages

PPT

Digital signatures use public key cryptography to provide authentication and verification of digital documents. There are two main types of cryptography: symmetric which uses a shared secret key for encryption and decryption, and asymmetric which uses a public/private key pair. Digital signatures rely on asymmetric cryptography and work by having the sender encrypt a document hash with their private key, then the receiver can decrypt it with the sender's public key to verify the sender's identity and that the document contents have not changed. Common digital signature algorithms include RSA, DSA, and ECDSA which generate and use key pairs to sign and verify documents.

Uploaded by

sanketh99
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

DIGITAL SIGNATURE

-Guide: Ms. Bindu Kiran A

What is a Digital Signature


A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender such that they cannot deny sending it

Digital signature is a type of Cryptography. It helps in keeping communications private. There are two types of Cryptography I. Secret key or Symmetric Cryptography II. Public key or Asymmetric Cryptography

Secret key or Symmetric Cryptography

In Symmetric Cryptography the sender and receiver of a message know and use the same secret key to encrypt the message, and the receiver uses same key to decrypt the message.

Public key or Asymmetric Cryptography


Asymmetric (or public key) Cryptography involves two related keys. 1. One of which only the owner knows the private key. 2. The other which anyone can know the public key.

Asymmetric Cryptography
We use Asymmetric Cryptography for the implementation of Digital Signatures because of the following advantages. 1. Only one party needs to know the private key. 2. The knowledge of the public key by a third party does not compromise security of message transmission.

A digital signature scheme typically consists of three algorithms: 1. Key Generation algorithm. 2. Signing algorithm. 3. Signature verifying algorithm.

Digital signature algorithms


RSA-based signature schemes, such as RSAPSS DSA and its elliptic curve variant ECDSA ElGamal signature scheme PointchevalStern signature algorithm Rabin signature algorithm Pairing-based schemes such as BLS Undeniable signatures

RSA-based signature scheme


Ron Rivest, Adi Shamir, and Leonard Adleman developed the RSA scheme. The following are the three main steps in RSA algorithm 1. Key Generation 2. Encryption 3. Decryption

Key Generation
RSA involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key.

Encryption
Person A transmits his/her public key to person B, keeping his/her private key secret. If person B wants to send a message to person A, he now encrypts the message to be sent to person A using the public key of person A.

Decryption
The message encrypted using the public key of person A by person B is received by person A. This message is then decrypted using the private key of the person A. The message cannot be accessed by anyone other than the person having the private key.

Consider the following example, which shows the working of the RSA algorithm.

Key Generation
Select two large prime numbers p, q Compute n=pq v = (p-1) (q-1) Select small odd integer k relatively prime to v gcd(k, v) = 1 Compute d such that (d k)%v = (k d)%v = 1 Public key is (k, n) Private key is (d, n) example p = 11 q = 29 n = 319 v = 280 k=3 d = 187 public key (3, 319) private key (187, 319)

Encryption
Person A and person B would like to communicate in private Person A uses RSA algorithm to generate her public and private keys
person A makes key (k, n) publicly available to person B and anyone else wanting to send her private messages

Person B uses person As public key (k, n) to encrypt message M:


compute E(M) =(Mk)%n person B sends encrypted message E(M) to person

Decryption
Person A receives E(M) and uses private key (d, n) to decrypt it:
compute D(M) = (E(M)d)%n decrypted message D(M) is original message M

THANK YOU

You might also like