0% found this document useful (0 votes)
21 views13 pages

Digital Signature

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views13 pages

Digital Signature

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Introduction

 Used for communication to verify


 Authentication of sender/data origin
 Integrity of the message received
 Non-repudiation private key for E & public key for
D
 Identification of doc or message etc.
 For interchanging data electronically
Implementation
 Scheme has the following 3 algorithm
1. Key generation
2. Signing
3. Verification
 It includes
1. MAC
2. Hash values of message
3. Digital pen pad device
Digital Signature Standard
 Digital Signature Algorithm
 In 1991, NIST proposed DSA to be used in DSS (FIPS PUB 186)
 Adopted as a standard in 94
 In 96, minor revision was issued
 In 2000, standard was expanded further
 SHA-1
 DSA v/s RSA
1. Free & license
2. DS & DS + Encryption
3. Strength Of Algorithm
• Computer Security Resource Center NIST(csrc.nist.gov)
• Federal Information Processing standard
RSA Digital Signature
1. MD Calculation
2. Signing(i.e:-DS Creation)
3. Transmission Of Original Message & DS together
4. Receiver calculates its own MD
5. De-sign digital signature(i.e:-retrieves sender’s MD)
6. Verification(Note:-Same Hash Algo should be used)
a) MD1=MD2
b) MD1≠MD2

You might also like