We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13
Introduction
Used for communication to verify
Authentication of sender/data origin Integrity of the message received Non-repudiation private key for E & public key for D Identification of doc or message etc. For interchanging data electronically Implementation Scheme has the following 3 algorithm 1. Key generation 2. Signing 3. Verification It includes 1. MAC 2. Hash values of message 3. Digital pen pad device Digital Signature Standard Digital Signature Algorithm In 1991, NIST proposed DSA to be used in DSS (FIPS PUB 186) Adopted as a standard in 94 In 96, minor revision was issued In 2000, standard was expanded further SHA-1 DSA v/s RSA 1. Free & license 2. DS & DS + Encryption 3. Strength Of Algorithm • Computer Security Resource Center NIST(csrc.nist.gov) • Federal Information Processing standard RSA Digital Signature 1. MD Calculation 2. Signing(i.e:-DS Creation) 3. Transmission Of Original Message & DS together 4. Receiver calculates its own MD 5. De-sign digital signature(i.e:-retrieves sender’s MD) 6. Verification(Note:-Same Hash Algo should be used) a) MD1=MD2 b) MD1≠MD2