20 Digital Signature Class 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Digital Signature

Let us begin by looking at the differences between


conventional signatures and digital signatures.

Inclusion
A conventional signature is included in the document; it
is part of the document. But when we sign a document
digitally, we send the signature as a separate document.
Verification Method
For a conventional signature, when the recipient receives a
document, she compares the signature on the document
with the signature on file. For a digital signature, the
recipient receives the message and the signature. The
recipient needs to apply a verification technique to the
combination of the message and the signature to verify the
authenticity.
Relationship
For a conventional signature, there is normally a one-to-
many relationship between a signature and documents. For
a digital signature, there is a one-to-one relationship
between a signature and a message.
Duplicity
In conventional signature, a copy of the signed document
can be distinguished from the original one on file. In digital
signature, there is no such distinction unless there is a
factor of time on the document.
PROCESS
Figure shows the digital signature process. The sender uses
a signing algorithm to sign the message. The message and
the signature are sent to the receiver. The receiver receives
the message and the signature and applies the verifying
algorithm to the combination. If the result is true, the
message is accepted; otherwise, it is rejected.

Digital Signature Process


Need for Keys
Adding key to the digital signature process

A digital signature needs a public-key system.


The signer signs with her private key; the verifier
verifies with the signer’s public key.
Continued

A cryptosystem uses the private and public keys of


the receiver: a digital signature uses
the private and public keys of the sender.
Signing the Digest
SERVICES

A digital signature can directly provide message


authentication, message integrity, and nonrepudiation
Message Authentication
A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.

A digital signature provides message authentication.


Message Integrity

The integrity of the message is preserved even if we sign


the whole message because we cannot get the same
signature if the message is changed.

A digital signature provides message integrity.


Nonrepudiation

Using a trusted center for nonrepudiation

Note

Nonrepudiation can be provided using a trusted


party.
Confidentiality
Adding confidentiality to a digital signature scheme

Note

A digital signature does not provide privacy.


If there is a need for privacy, another layer of
encryption/decryption must be applied.
RSA Digital Signature Scheme

General idea behind the RSA digital signature scheme


Continued
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA

Note
In the RSA digital signature scheme, d is private;
e and n are public.
Signing and Verifying
RSA digital Signature Scheme
Example
As a trivial example, suppose that Alice chooses p = 823 and q = 953,
and calculates n = 784319. The value of f(n) is 782544. Now she
chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:

Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates

Bob accepts the message because he has verified Alice’s signature.


RSA Signature on the Message Digest

The RSA Signature on the Message Digest


When the digest is signed instead of the message
itself, the susceptibility of the RSA digital signature
scheme depends on the strength of the hash
algorithm.

You might also like