SlideShare a Scribd company logo
DSA (Digital Signature Algorithm)
DSA (Digital Signature Algorithm)
• This section describes the DSA (Digital
Signature Algorithm) algorithm, which
consists of 2 parts:
• generation of a pair of public key and private
key;
• generation and verification of digital
signature.
What Is DSA
• What Is DSA (Digital Signature Algorithm)?
• DSA is a United States Federal Government
standard for digital signatures. It was
proposed by the National Institute of
Standards and Technology (NIST) in August
1991 for use in their Digital Signature
Standard (DSS), specified in FIPS 186 in 1993.
public key and private key generation
• The first part of the DSA algorithm is the public key and private key
generation, which can be described as:
• Choose a prime number q, which is called the prime divisor.
• Choose another primer number p, such that p-1 mod q = 0. p is
called the prime modulus.
• Choose an integer g, such that 1 < g < p, g^q mod p = 1 and g =
h^((p–1)/q) mod p. q is also called g's multiplicative order modulo
p.
• Choose an integer, such that 0 < x < q.
• Compute y as g^x mod p.
• Package the public key as {p,q,g,y}.
• Package the private key as {p,q,g,x}.
generate a message signature
• Generate the message digest h, using a hash
algorithm like SHA1.
• Generate a random number k, such that 0 < k < q.
• Compute r as (g^k mod p) mod q.
• Compute i, such that k*i mod q = 1. i is called the
modular multiplicative inverse of k modulo q.
• Compute s = i*(h+r*x) mod q.
• Package the digital signature as {r,s}.
verify a message signature
• Generate the message digest h, using the same
hash algorithm.
• Compute w, such that s*w mod q = 1. w is called
the modular multiplicative inverse of s modulo q.
• Compute u1 = h*w mod q.
• Compute u2 = r*w mod q.
• Compute v = (((g^u1)*(y^u2)) mod p) mod q.
• If v == r, the digital signature is valid.
Example
Continue
Continue

More Related Content

PPTX
Information and network security 45 digital signature standard
PPT
implementing the encryption in the JAVA.ppt
PDF
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
PPTX
Information and network security 46 digital signature algorithm
PPT
DOC
Dss digital signature standard and dsa algorithm
PPTX
RSA.pptx
 
Information and network security 45 digital signature standard
implementing the encryption in the JAVA.ppt
Lec 4 Public Key Cryptography & Digital Identity 2022f.pdf
Digital signature algorithm (de la cruz, genelyn).ppt 2
Information and network security 46 digital signature algorithm
Dss digital signature standard and dsa algorithm
RSA.pptx
 

Similar to digital signature algo.pptx (20)

PPTX
Module 5-DSS.pptx crypto currency notes incoming
PDF
PKC&RSA
PPT
PPT
Digital Signature in CryptographyElgammal
PPTX
Public Key Cryptography
PPT
RSA Algorithm.ppt
PDF
Post quantum cryptography - thesis
PPT
555_Spring12_topic22.ppt
PPT
New ppt.ppt
PPTX
RSA & MD5 algorithm
PDF
chap13-digitalsignature.pdf
PPT
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
PPTX
Cryptography using rsa cryptosystem
PPTX
Homomorphic Encryption
PPTX
RSA-W7(rsa) d1-d2
PPTX
Digital signature
PPTX
Paillier Cryptosystem
DOCX
Final Project SkeletonCipherClient.javaFinal Project SkeletonC.docx
PDF
Presentation about RSA
Module 5-DSS.pptx crypto currency notes incoming
PKC&RSA
Digital Signature in CryptographyElgammal
Public Key Cryptography
RSA Algorithm.ppt
Post quantum cryptography - thesis
555_Spring12_topic22.ppt
New ppt.ppt
RSA & MD5 algorithm
chap13-digitalsignature.pdf
session6Mdjdjjskskskxkckjdjddddkfjjfjjjj
Cryptography using rsa cryptosystem
Homomorphic Encryption
RSA-W7(rsa) d1-d2
Digital signature
Paillier Cryptosystem
Final Project SkeletonCipherClient.javaFinal Project SkeletonC.docx
Presentation about RSA
Ad

More from BLACKSPAROW (13)

PPTX
DICTIONARY USING.pptx
PPTX
ix d.pptx
PPTX
Soft skills and it’s Importance (1).pptx
PPTX
Unit 6 - PART2.pptx
PPTX
Unit 4.pptx
PPTX
80386-1.pptx
PPTX
UnitOnePresentationSlides.pptx
PPTX
24.pptx
PPTX
1791.pptx
PPTX
UNIT 3.pptx
PPTX
UNIT 2.pptx
PPTX
Unit four .pptx
PPT
ECC_basics.ppt
DICTIONARY USING.pptx
ix d.pptx
Soft skills and it’s Importance (1).pptx
Unit 6 - PART2.pptx
Unit 4.pptx
80386-1.pptx
UnitOnePresentationSlides.pptx
24.pptx
1791.pptx
UNIT 3.pptx
UNIT 2.pptx
Unit four .pptx
ECC_basics.ppt
Ad

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharma ospi slides which help in ospi learning
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Insiders guide to clinical Medicine.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Insiders guide to clinical Medicine.pdf
Supply Chain Operations Speaking Notes -ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O7-L3 Supply Chain Operations - ICLT Program

digital signature algo.pptx

  • 2. DSA (Digital Signature Algorithm) • This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: • generation of a pair of public key and private key; • generation and verification of digital signature.
  • 3. What Is DSA • What Is DSA (Digital Signature Algorithm)? • DSA is a United States Federal Government standard for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186 in 1993.
  • 4. public key and private key generation • The first part of the DSA algorithm is the public key and private key generation, which can be described as: • Choose a prime number q, which is called the prime divisor. • Choose another primer number p, such that p-1 mod q = 0. p is called the prime modulus. • Choose an integer g, such that 1 < g < p, g^q mod p = 1 and g = h^((p–1)/q) mod p. q is also called g's multiplicative order modulo p. • Choose an integer, such that 0 < x < q. • Compute y as g^x mod p. • Package the public key as {p,q,g,y}. • Package the private key as {p,q,g,x}.
  • 5. generate a message signature • Generate the message digest h, using a hash algorithm like SHA1. • Generate a random number k, such that 0 < k < q. • Compute r as (g^k mod p) mod q. • Compute i, such that k*i mod q = 1. i is called the modular multiplicative inverse of k modulo q. • Compute s = i*(h+r*x) mod q. • Package the digital signature as {r,s}.
  • 6. verify a message signature • Generate the message digest h, using the same hash algorithm. • Compute w, such that s*w mod q = 1. w is called the modular multiplicative inverse of s modulo q. • Compute u1 = h*w mod q. • Compute u2 = r*w mod q. • Compute v = (((g^u1)*(y^u2)) mod p) mod q. • If v == r, the digital signature is valid.