SlideShare a Scribd company logo
9
Most read
15
Most read
20
Most read
CSE 597E Fall 2001 PennState University 1
Digital Signature Schemes
Presented By:
Munaiza Matin
CSE 597E Fall 2001 PennState University2
Introduction
 Cryptography – art & science of
preventing users from unauthorized or
illegal actions towards information,
networking resources and services.
 Cryptographic transformation –
conversion of input data into output data
using a cryptographic key.
 Cryptosystem – forward and inverse
cryptographic transformation pair
CSE 597E Fall 2001 PennState University3
A Cryptosystem
Input
data
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
Key Key
Output
data
Input
data
Sender Receiver
CSE 597E Fall 2001 PennState University4
Types of Cryptosystems
 Private key cryptosystem – a private
key is shared between the two
communicating parties which must
be kept secret between themselves.
 Public key cryptosystem – the
sender and receiver do not share the
same key and one key can be public
and the other can be private
CSE 597E Fall 2001 PennState University5
Types of Cryptosystems
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
Key Key
Output
data
Input
data
Sender Receiver
Input
data
Share private key
A Private Key Cryptosystem
CSE 597E Fall 2001 PennState University6
Types of Cryptosystems
Forward
Cryptographic
Transformation
Inverse
Cryptographic
Transformation
1st
Key 2nd
Key
Output
data
Input
data
Sender Receiver
Input
data
Do not share the same key information and one key may be public
A Public Key Cryptosystem
CSE 597E Fall 2001 PennState University7
Digital Signatures
 Encryption, message authentication and
digital signatures are all tools of modern
cryptography.
 A signature is a technique for non-
repudiation based on the public key
cryptography.
 The creator of a message can attach a
code, the signature, which guarantees the
source and integrity of the message.
CSE 597E Fall 2001 PennState University8
Properties of Signatures
 Similar to handwritten signatures, digital
signatures must fulfill the following:
 Must not be forgeable
 Recipients must be able to verify them
 Signers must not be able to repudiate them
later
 In addition, digital signatures cannot be
constant and must be a function of the
entire document it signs
CSE 597E Fall 2001 PennState University9
Types of Signatures
 Direct digital signature – involves only the
communicating parties
 Assumed that receiver knows public key of
sender.
 Signature may be formed by (1) encrypting
entire message with sender’s private key or
(2) encrypting hash code of message with
sender’s private key.
 Further encryption of entire message +
signature with receiver’s public key or shared
private key ensures confidentiality.
CSE 597E Fall 2001 PennState University10
Types of Signatures
 Problems with direct signatures:
 Validity of scheme depends on the
security of the sender’s private key ⇒
sender may later deny sending a
certain message.
 Private key may actually be stolen from
X at time T, so timestamp may not
help.
CSE 597E Fall 2001 PennState University11
Types of Signatures
 Arbitrated digital signature – involves a
trusted third party or arbiter
 Every signed message from sender, X, to
receiver, Y, goes to an arbiter, A, first.
 A subjects message + signature to number of
tests to check origin & content
 A dates the message and sends it to Y with
indication that it has been verified to its
satisfaction
CSE 597E Fall 2001 PennState University12
Basic Mechanism of
Signature Schemes
 A key generation algorithm to randomly
select a public key pair.
 A signature algorithm that takes message
+ private key as input and generates a
signature for the message as output
 A signature verification algorithm that
takes signature + public key as input and
generates information bit according to
whether signature is consistent as output.
CSE 597E Fall 2001 PennState University13
Digital Signature Standards
 NIST FIPS 186 Digital Signature Standard
(DSS)
 El Gamal
 RSA Digital Signature
- ISO 9796
- ANSI X9.31
- CCITT X.509
CSE 597E Fall 2001 PennState University14
DSS
 Public-key technique.
 User applies the Secure Hash
Algorithm (SHA) to the message to
produce message digest.
 User’s private key is applied to
message digest using DSA to
generate signature.
CSE 597E Fall 2001 PennState University15
Global Public-Key Components
p A prime number of L bits where L is a multiple of 64 and 512 ≤ L ≤ 1024
q A 160-bit prime factor of p-1
g = h(p-1)/q
mod p, where h is any integer with 1<h< p-1, such that (h(p-1)/q
mod
p)>1
User’s Private Key
x A random or pseudorandom integer with 0<x<q
User’s Public Key
y = gx
mod p
User’s Per-Message Secret Number
k A random or pseudorandom integer with 0<k<q
Signing
r = (gk
mod p) mod q s = [k-1
(H(M) = xr)] mod q
Signature = (r, s)
Verifying
w = (s’)-1
mod q
u1
= [H(M’)w] mod q u2
= (r’)w mod q v = [(gu1
yu2
) mod p] mod q
Test: v = r’
The Digital Signature Algorithm (DSA)
CSE 597E Fall 2001 PennState University16
DSS
 DSA
- M = message to be signed
- H(M) = hash of M using SHA
- M’, r’, s’ = received versions of M,
r, s
CSE 597E Fall 2001 PennState University17
El Gamal Signature Scheme
 A variant of the DSA.
 Based on the assumption that computing
discrete logarithms over a finite field with
a large prime is difficult.
 Assumes that it is computationally
infeasible for anyone other than signer to
find a message M and an integer pair (r,
s) such that aM
= yr
rs
(mod p).
18
El Gamal Signature Scheme
Parameters of El Gamal
p A large prime number such that p-1 has a large
prime factor
x The private key information of a user where x<p
a A primitive element of the finite field for the prime p
y = ax
mod p
(p,a,y) The public key information
19
El Gamal Signature Scheme
Step 1 Randomly choose an integer k such that (k, p-1) = 1,
1<k<p-1, and k has not been used to sign a previous
message
Step 2 Calculate r = ak
(mod p)
Step 3 Find s such that M = xr + ks (mod (p-1))
Step 4 Collect the pair (r, s) as the digital signature on the
message M
Since, M = xr + ks (mod (p-1))
⇒ aM
= a(xr+ks)
= axr
aks
= yr
rs
(mod p)
⇒ Given M and (r, s), the receiver or 3rd
party can
verify the signature by checking whether
aM
= yr
rs
(mod p) holds or not.
CSE 597E Fall 2001 PennState University20
RSA Digital Signature Scheme
 Based on the difficulty of factoring large
numbers.
 Given M, RSA digital signature can be
produced by encrypting either M itself or
a digest of M using the private signature
key s.
 Signature, S = ws
mod n, where w is
message to be signed or message digest
and n = pq (p and q are large primes).
 Verification: w = Sv
mod n, where (v, n) is
the public verification key.
CSE 597E Fall 2001 PennState University21
Conclusions
 Digital signatures are an effective
mechanism used for authenticity and non-
repudiation of messages.
 Several signature schemes exist, but DSS
is probably the most popular.
 Digital signatures may be expanded to be
used as digital pseudonyms which would
prevent authorities from figuring out a
sender’s identity, for example by cross-
matching
CSE 597E Fall 2001 PennState University 22
Thank you!

More Related Content

PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
Digital Signature Standard
PPTX
Digital signature(Cryptography)
PPTX
SHA-256.pptx
PPT
Ch01
 
PPT
Set Secure Electronic Transaction (SET)
PPTX
RSA ALGORITHM
Cryptography and Network Security William Stallings Lawrie Brown
Digital Signature Standard
Digital signature(Cryptography)
SHA-256.pptx
Ch01
 
Set Secure Electronic Transaction (SET)
RSA ALGORITHM

What's hot (20)

DOCX
S/MIME
PPTX
Security services and mechanisms
PDF
Web Security
PPTX
Hash Function
PPTX
Pgp pretty good privacy
PDF
Electronic mail security
PPTX
Ad-Hoc Networks
PDF
PPTX
Principles of public key cryptography and its Uses
PPTX
SHA- Secure hashing algorithm
PDF
2. public key cryptography and RSA
PPT
key distribution in network security
PPSX
Mac protocols of adhoc network
PPTX
Multiplexing in mobile computing
PDF
IP Security
PPTX
Data Encryption Standard (DES)
PPTX
RSA Algorithm
PPT
Email security
PPTX
Case Study - SUN NFS
S/MIME
Security services and mechanisms
Web Security
Hash Function
Pgp pretty good privacy
Electronic mail security
Ad-Hoc Networks
Principles of public key cryptography and its Uses
SHA- Secure hashing algorithm
2. public key cryptography and RSA
key distribution in network security
Mac protocols of adhoc network
Multiplexing in mobile computing
IP Security
Data Encryption Standard (DES)
RSA Algorithm
Email security
Case Study - SUN NFS
Ad

Viewers also liked (20)

PPT
Introduction to Digital signatures
PPT
Digital Signature
PPT
Digital signature
PPTX
Seminar ppt on digital signature
PPTX
Digital signature
PDF
E tutorial - digital signature
PPT
Digital Signature
PPT
C08 crypto-digital signature13
PPT
Digital signature
PDF
Digital Signature
PPT
Digital signature introduction
DOCX
Literature review of Digital Signature
PPT
Digital Signature
PDF
Introduction To Digital Signatures
PDF
Digital signatures
PPTX
CMS digital signature
PPTX
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
PDF
Conclusion
PDF
PhoneGap Framework for smartphone app developement
PPT
Introduction to Digital signatures
Digital Signature
Digital signature
Seminar ppt on digital signature
Digital signature
E tutorial - digital signature
Digital Signature
C08 crypto-digital signature13
Digital signature
Digital Signature
Digital signature introduction
Literature review of Digital Signature
Digital Signature
Introduction To Digital Signatures
Digital signatures
CMS digital signature
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
Conclusion
PhoneGap Framework for smartphone app developement
Ad

Similar to Digital signature schemes (20)

PPSX
Digital signature
PPTX
Information and network security 45 digital signature standard
PDF
PPT
Information and data security digital signatures
PPT
Digital Signature.ppt
PPTX
L-2.10 Digital Signatures.pptx
PDF
chap13-digitalsignature.pdf
PPT
Digital Signature in CryptographyElgammal
PPT
PPTX
Digital signatures
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPTX
Information and network security 44 direct digital signatures
DOC
Dss digital signature standard and dsa algorithm
PPTX
Digital Signature Standard (DSSaaa).pptx
PPT
CHAPTER 09 - Digital signatures.ppt
PPT
Digital signature
PDF
Simple Overview of PKI and Digital signature by Tarek_Gaber
PPTX
Digitalsignature&protocol Cryptographycss
PPT
New ppt.ppt
PPTX
CYBER SECURITY : DIGITAL SIGNATURE,
Digital signature
Information and network security 45 digital signature standard
Information and data security digital signatures
Digital Signature.ppt
L-2.10 Digital Signatures.pptx
chap13-digitalsignature.pdf
Digital Signature in CryptographyElgammal
Digital signatures
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
Information and network security 44 direct digital signatures
Dss digital signature standard and dsa algorithm
Digital Signature Standard (DSSaaa).pptx
CHAPTER 09 - Digital signatures.ppt
Digital signature
Simple Overview of PKI and Digital signature by Tarek_Gaber
Digitalsignature&protocol Cryptographycss
New ppt.ppt
CYBER SECURITY : DIGITAL SIGNATURE,

Recently uploaded (20)

PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPT
tcp ip networks nd ip layering assotred slides
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
artificial intelligence overview of it and more
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
international classification of diseases ICD-10 review PPT.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
An introduction to the IFRS (ISSB) Stndards.pdf
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
tcp ip networks nd ip layering assotred slides
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Digital Literacy And Online Safety on internet
artificial intelligence overview of it and more
Decoding a Decade: 10 Years of Applied CTI Discipline
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introuction about ICD -10 and ICD-11 PPT.pptx
Introuction about WHO-FIC in ICD-10.pptx
Internet___Basics___Styled_ presentation
Paper PDF World Game (s) Great Redesign.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10

Digital signature schemes

  • 1. CSE 597E Fall 2001 PennState University 1 Digital Signature Schemes Presented By: Munaiza Matin
  • 2. CSE 597E Fall 2001 PennState University2 Introduction  Cryptography – art & science of preventing users from unauthorized or illegal actions towards information, networking resources and services.  Cryptographic transformation – conversion of input data into output data using a cryptographic key.  Cryptosystem – forward and inverse cryptographic transformation pair
  • 3. CSE 597E Fall 2001 PennState University3 A Cryptosystem Input data Forward Cryptographic Transformation Inverse Cryptographic Transformation Key Key Output data Input data Sender Receiver
  • 4. CSE 597E Fall 2001 PennState University4 Types of Cryptosystems  Private key cryptosystem – a private key is shared between the two communicating parties which must be kept secret between themselves.  Public key cryptosystem – the sender and receiver do not share the same key and one key can be public and the other can be private
  • 5. CSE 597E Fall 2001 PennState University5 Types of Cryptosystems Forward Cryptographic Transformation Inverse Cryptographic Transformation Key Key Output data Input data Sender Receiver Input data Share private key A Private Key Cryptosystem
  • 6. CSE 597E Fall 2001 PennState University6 Types of Cryptosystems Forward Cryptographic Transformation Inverse Cryptographic Transformation 1st Key 2nd Key Output data Input data Sender Receiver Input data Do not share the same key information and one key may be public A Public Key Cryptosystem
  • 7. CSE 597E Fall 2001 PennState University7 Digital Signatures  Encryption, message authentication and digital signatures are all tools of modern cryptography.  A signature is a technique for non- repudiation based on the public key cryptography.  The creator of a message can attach a code, the signature, which guarantees the source and integrity of the message.
  • 8. CSE 597E Fall 2001 PennState University8 Properties of Signatures  Similar to handwritten signatures, digital signatures must fulfill the following:  Must not be forgeable  Recipients must be able to verify them  Signers must not be able to repudiate them later  In addition, digital signatures cannot be constant and must be a function of the entire document it signs
  • 9. CSE 597E Fall 2001 PennState University9 Types of Signatures  Direct digital signature – involves only the communicating parties  Assumed that receiver knows public key of sender.  Signature may be formed by (1) encrypting entire message with sender’s private key or (2) encrypting hash code of message with sender’s private key.  Further encryption of entire message + signature with receiver’s public key or shared private key ensures confidentiality.
  • 10. CSE 597E Fall 2001 PennState University10 Types of Signatures  Problems with direct signatures:  Validity of scheme depends on the security of the sender’s private key ⇒ sender may later deny sending a certain message.  Private key may actually be stolen from X at time T, so timestamp may not help.
  • 11. CSE 597E Fall 2001 PennState University11 Types of Signatures  Arbitrated digital signature – involves a trusted third party or arbiter  Every signed message from sender, X, to receiver, Y, goes to an arbiter, A, first.  A subjects message + signature to number of tests to check origin & content  A dates the message and sends it to Y with indication that it has been verified to its satisfaction
  • 12. CSE 597E Fall 2001 PennState University12 Basic Mechanism of Signature Schemes  A key generation algorithm to randomly select a public key pair.  A signature algorithm that takes message + private key as input and generates a signature for the message as output  A signature verification algorithm that takes signature + public key as input and generates information bit according to whether signature is consistent as output.
  • 13. CSE 597E Fall 2001 PennState University13 Digital Signature Standards  NIST FIPS 186 Digital Signature Standard (DSS)  El Gamal  RSA Digital Signature - ISO 9796 - ANSI X9.31 - CCITT X.509
  • 14. CSE 597E Fall 2001 PennState University14 DSS  Public-key technique.  User applies the Secure Hash Algorithm (SHA) to the message to produce message digest.  User’s private key is applied to message digest using DSA to generate signature.
  • 15. CSE 597E Fall 2001 PennState University15 Global Public-Key Components p A prime number of L bits where L is a multiple of 64 and 512 ≤ L ≤ 1024 q A 160-bit prime factor of p-1 g = h(p-1)/q mod p, where h is any integer with 1<h< p-1, such that (h(p-1)/q mod p)>1 User’s Private Key x A random or pseudorandom integer with 0<x<q User’s Public Key y = gx mod p User’s Per-Message Secret Number k A random or pseudorandom integer with 0<k<q Signing r = (gk mod p) mod q s = [k-1 (H(M) = xr)] mod q Signature = (r, s) Verifying w = (s’)-1 mod q u1 = [H(M’)w] mod q u2 = (r’)w mod q v = [(gu1 yu2 ) mod p] mod q Test: v = r’ The Digital Signature Algorithm (DSA)
  • 16. CSE 597E Fall 2001 PennState University16 DSS  DSA - M = message to be signed - H(M) = hash of M using SHA - M’, r’, s’ = received versions of M, r, s
  • 17. CSE 597E Fall 2001 PennState University17 El Gamal Signature Scheme  A variant of the DSA.  Based on the assumption that computing discrete logarithms over a finite field with a large prime is difficult.  Assumes that it is computationally infeasible for anyone other than signer to find a message M and an integer pair (r, s) such that aM = yr rs (mod p).
  • 18. 18 El Gamal Signature Scheme Parameters of El Gamal p A large prime number such that p-1 has a large prime factor x The private key information of a user where x<p a A primitive element of the finite field for the prime p y = ax mod p (p,a,y) The public key information
  • 19. 19 El Gamal Signature Scheme Step 1 Randomly choose an integer k such that (k, p-1) = 1, 1<k<p-1, and k has not been used to sign a previous message Step 2 Calculate r = ak (mod p) Step 3 Find s such that M = xr + ks (mod (p-1)) Step 4 Collect the pair (r, s) as the digital signature on the message M Since, M = xr + ks (mod (p-1)) ⇒ aM = a(xr+ks) = axr aks = yr rs (mod p) ⇒ Given M and (r, s), the receiver or 3rd party can verify the signature by checking whether aM = yr rs (mod p) holds or not.
  • 20. CSE 597E Fall 2001 PennState University20 RSA Digital Signature Scheme  Based on the difficulty of factoring large numbers.  Given M, RSA digital signature can be produced by encrypting either M itself or a digest of M using the private signature key s.  Signature, S = ws mod n, where w is message to be signed or message digest and n = pq (p and q are large primes).  Verification: w = Sv mod n, where (v, n) is the public verification key.
  • 21. CSE 597E Fall 2001 PennState University21 Conclusions  Digital signatures are an effective mechanism used for authenticity and non- repudiation of messages.  Several signature schemes exist, but DSS is probably the most popular.  Digital signatures may be expanded to be used as digital pseudonyms which would prevent authorities from figuring out a sender’s identity, for example by cross- matching
  • 22. CSE 597E Fall 2001 PennState University 22 Thank you!