INS - Lecture12 - Digital Signature
INS - Lecture12 - Digital Signature
Digital Signatures
Lecture 12
Dr. Amir Mehmood
Digital Signatures
2
Digital Signature Properties
8
What is a digital signature?
Non-repudiation: With digital
signature, signer cannot successfully
claim he/she did not sign a message.
Integrity: A digital signature ensures
that the message was not altered in
transit.
9
Digital Signature
Operation is similar to that of the
MAC
The hash value of a message is
encrypted with a user’s private key
Anyone who knows the user’s public
key can verify the integrity of the
message
An attacker who wishes to alter the
message would need to know the
user’s private key
Implications of digital signatures go
beyond just message authentication
© 2017 Pearson Education, Ltd., All rights reserved.
Message Authentication Using Plain
Encryption (Recall)
11
Message Encryption (Recall)
12
Message Authentication Code (MAC) (Recall)
13
© 2017 Pearson Education, Ltd., All rights reserved.
How is a Digital Signature
Produced?
Very briefly, a typical digital signature
works like this:
A signature in the form of a code is
generated by applying an algorithm and
the sender's private key to message
contents.
The recipient verifies the signature by
decrypting it using the sender's public
key.
16
The Idea
Goal - guarantee that message must
have originated with certain entity
Idea - encrypt with private key,
decrypt with public key
Only owner of the private key could
have generated original message
17
Steps in making a digital
signature
Joe runs a one-way hash function to create a fixed
length message digest from the message to be sent
Joe encrypts the message digest with his private
key to create a digital signature.
Joe sends the signature and the message to Alice
Alice decrypts the signature with Joe’s public key to
reveal the message digest
Alice then applies the same one-way function to the
message she received from Joe to produce a
message digest
Alice compares the message digest she created
with the message digest sent by Joe. If they
compare the integrity of the messages is verified.
18
Steps in making a digital
signature
19
Steps in making a digital
signature
20
ELGAMAL DIGITAL SIGNATURE SCHEME
21
ELGAMAL DIGITAL SIGNATURE SCHEME
22
ELGAMAL DIGITAL SIGNATURE SCHEME
23
SCHNORR DIGITAL SIGNATURE SCHEME
24
SCHNORR DIGITAL SIGNATURE SCHEME
25