0% found this document useful (0 votes)
192 views11 pages

Cryptography and Network Security: Sixth Edition by William Stallings

This document discusses digital signatures and their properties. It covers direct digital signatures, the Elgamal and RSA-PSS signature schemes. It also describes the NIST Digital Signature Algorithm (DSA) approach, including key generation, signature generation and verification. Elliptic curve digital signatures and the Schnorr signature scheme are also mentioned. The document provides technical details on how digital signatures work and standards like DSA.

Uploaded by

Sawsan Tawfiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views11 pages

Cryptography and Network Security: Sixth Edition by William Stallings

This document discusses digital signatures and their properties. It covers direct digital signatures, the Elgamal and RSA-PSS signature schemes. It also describes the NIST Digital Signature Algorithm (DSA) approach, including key generation, signature generation and verification. Elliptic curve digital signatures and the Schnorr signature scheme are also mentioned. The document provides technical details on how digital signatures work and standards like DSA.

Uploaded by

Sawsan Tawfiq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Cryptography

and Network
Security
Sixth Edition
by William Stallings
Chapter 13
Digital Signatures
“To guard against the baneful influence exerted by strangers
is therefore an elementary dictate of savage prudence. Hence
before strangers are allowed to enter a district, or at least
before they are permitted to mingle freely with the
inhabitants, certain ceremonies are often performed by the
natives of the country for the purpose of disarming the
strangers of their magical powers, or of disinfecting, so to
speak, the tainted atmosphere by which they are supposed
to be surrounded.”
—Talking to Strange Men,
Ruth Rendell
3
4
5
Digital Signature Properties

It must verify It must It must be


the author and authenticate verifiable by
the date and the contents at third parties, to
time of the the time of the resolve
signature signature disputes(‫) لاــنزاـعات‬

6
Direct Digital Signature
• Refers to a digital signature scheme that involves only the communicating
parties
• It is assumed that the destination knows the public key of the source

• Confidentiality can be provided by encrypting the entire message plus


signature with a shared secret key
• It is important to perform the signature function first and then an outer
confidentiality function
• In case of dispute some third party must view the message and its signature

• The validity of the scheme depends on the security of the sender’s private key
• If a sender later wishes to deny sending a particular message, the sender can claim
that the private key was lost or stolen and that someone else forged his or her
signature
• One way to thwart or at least weaken this ploy (‫ )حيلة‬is to require every signed
message to include a timestamp and to require prompt reporting of compromised
keys to a central authority 7
NIST Digital Signature
Algorithm
• Published by NIST as Federal Information
Processing Standard FIPS 186
• Makes use of the Secure Hash Algorithm (SHA)

• The latest version, FIPS 186-3, also


incorporates digital signature algorithms
based on RSA and on elliptic curve
cryptography

8
9
DSA
Signing
and
Verifying

10
Summary
• Digital signatures • NIST digital signature
• Properties algorithm
• Attacks and forgeries • The DSA approach
• Digital signature
• Elliptic curve digital
requirements
• Direct digital signature signature algorithm
• Global domain parameters
• Elgamal digital signature • Key generation
scheme • Digital signature
generation and
• RSA-PSS authentication
• Mask generation function
• The signing operation • Schnorr digital signature
• Signature verification scheme
11

You might also like