Lecture6 2
Lecture6 2
Applied College
Computer Sciences Program
CYB104
Lecture 6: Digital Signatures
1
Outline
• Cryptographic goals
• Digital signatures
• RSA digital signature
• Applications of Digital signatures
2
Cryptographic Goals
Cryptographic goals
m is a signed message
s is a valid signature for m
m, s
Alice Bob
4
Why Digital
Signatures?
• To provide Authenticity,
Integrity and Non-repudiation
to electronic documents
• To use the Internet as the
safe and secure medium for e-
Commerce and e-Governance
What is Digital
Signature?
• Digital signatures are one of the most
important inventions of modern
cryptography.
• Digital signature, a fundamental
primitive of cryptography, offers non-
repudiation, integrity, public
verifiability and authenticity of
transmitted messages.
• Verifiability: As the public key of the
signer is known, anybody can verify
the message and the digital signature.
Digital Signatures
9
Message Authentication Codes
• MAC f(x, key):{0,1}* {0,1}n
• knowing x and key f is easy to compute
• it is infeasible to calculate f(x, key)
without the key
10
Message Authentication Code
07/22/2024 11
Difference between MAC and digital
signature
• To prove the validity of a MAC to a third
party, you need to reveal the key
• If you can verify a MAC, you can also
create it
• MAC does not allow a distinction to be
made between the parties sharing the key
• Computing a MAC is (usually) much faster
than computing a digital signature
• Important for devices with low
computing power
12
RSA signature algorithm
13
RSA signature generation and verification
RSA signature Example
1. Select primes: p=11 & q=17
2. Compute n = pq =11×17=187
3. Compute ø(n)=(p–1)(q-1)=16 × 10 =160
4. Select e : gcd(e,160)=1; choose e=7
5. Determine d: de=1 mod 160 and d < 160 Value is d=23
6. Publish public key PK={7,187}
7. Keep secret private key SK={23}
RSA Example cont- Sign
• Amal want to send message AEC (65 69 67), so that Bandar wants to ensure it is
from Amal and has not been modified in transit.
• Sign:
S1 = 6523 mod 187 = 142
S2 = 6923 mod 187 = 137
S3 = 6723 mod 187 = 67
Amal then send 142 137 67
RSA Example cont- Verify
18
RSA Key pair
RSA Key pair (including Algorithm identifier) [2048 bit]
Private Key
3082 010a 0282 0101 00b1 d311 e079 5543 0708 4ccb 0542 00e2 0d83 463d e493
bab6 06d3 0d59 bd3e c1ce 4367 018a 21a8 efbc ccd0 a2cc b055 9653 8466 0500 da44
4980 d854 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc
3ab1 463d 1ef0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4
3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39
0a8a cf42 b2f0 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103
a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a
63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4
bb90 bcff 9634 04e3 459e a146 2840 8102 0301 0001
Public Key
3082 01e4 f267 0142 0f61 dd12 e089 5547 0f08 4ccb 0542 00e2 0d83 463d e493
bab6 0673 0d59 bf3e c1ce 4367 012a 11a8 efbc ccd0 a2cc b055 9653 8466 0500 da44
4980 d8b4 0aa5 2586 94ed 6356 ff70 6ca3 a119 d278 be68 2a44 5e2f cfcc 185e 47bc
3ab1 463d 1df0 b92c 345f 8c7c 4c08 299d 4055 eb3c 7d83 deb5 f0f7 8a83 0ea1 4cb4
3aa5 b35f 5a22 97ec 199b c105 68fd e6b7 a991 942c e478 4824 1a25 193a eb95 9c39
0a8a cf42 b250 1cd5 5ffb 6bed 6856 7b39 2c72 38b0 ee93 a9d3 7b77 3ceb 7103
a938 4a16 6c89 2aca da33 1379 c255 8ced 9cbb f2cb 5b10 f82e 6135 c629 4c2a d02a
63d1 6559 b4f8 cdf9 f400 84b6 5742 859d 32a8 f92a 54fb ff78 41bc bd71 28f4
bb90 bcff 9634 04de 45de af46 2240 8410 02f1 0001
19
Private key protection
24
Applications in Telecommunications
A. Subscribers
Subscriber’s services management
• STD/ISD, Opening, Closing, Initializing Password
Shifting of telephones, Accessories (Clip, Cordless)
Small Payments through telephones bills
• Books, gifts, Internet purchases
Mobile Authentication of SMS
• Share market trading, Intra/Inter office instructions
Mobile Phones as Credit cards
• Mobile operator can venture into credit card business