SlideShare a Scribd company logo
Information and Network Security:44
Direct Digital Signatures
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Digital Signature Requirements
must depend on the message signed
must use information unique to sender
to prevent both forgery and denial
must be relatively easy to produce
must be relatively easy to recognize & verify
be computationally infeasible to forge
with new message for existing digital signature
with fraudulent digital signature for given message
be practical save digital signature in storage
Direct Digital Signatures
• involve only sender & receiver
• assumed receiver has sender’s public-key
• digital signature made by sender signing entire message or hash with
private-key
• can encrypt using receivers public-key
• important that sign first then encrypt message & signature
• security depends on sender’s private-key
Direct Digital Signatures
• The term direct digital signature refers to a digital signature scheme
that involves only the communicating parties (source, destination).
• It is assumed that the destination knows the public key of the source.
Direct Digital Signatures involve the direct application of public-key
algorithms involving only the communicating parties.
• A digital signature may be formed by encrypting the entire message
with the sender’s private key, or by encrypting a hash code of the
message with the sender’s private key.
Direct Digital Signatures
• Confidentiality can be provided by further encrypting the entire
message plus signature using either public or private key schemes.
• It is important to perform the signature function first and then an
outer confidentiality function, since in case of dispute, some third
party must view the message and its signature. But these approaches
are dependent on the security of the sender’s private-key.
• Will have problems if it is lost/stolen and signatures forged. The
universally accepted technique for dealing with these threats is the
use of a digital certificate and certificate authorities.
ElGamal Digital Signatures
• signature variant of ElGamal, related to D-H
• so uses exponentiation in a finite (Galois)
• with security based difficulty of computing discrete
logarithms, as in D-H
• use private key for encryption (signing)
• uses public key for decryption (verification)
• each user (eg. A) generates their key
• chooses a secret key (number): 1 < xA < q-1
• compute their public key: yA = a
xA
mod q
ElGamal Digital Signatures
• T. Elgamal announced a public-key scheme based on discrete
logarithms, closely related to the Diffie-Hellman technique [ELGA84,
ELGA85].
• The ElGamal encryption scheme is designed to enable encryption by a
user's public key with decryption by the user's private key.
• The ElGamal signature scheme involves the use of the private key for
encryption and the public key for decryption.
• The ElGamal cryptosystem is used in some form in a number of
standards including the digital signature standard (DSS) and the
S/MIME email standard.
ElGamal Digital Signature
• Alice signs a message M to Bob by computing
• the hash m = H(M), 0 <= m <= (q-1)
• chose random integer K with 1 <= K <= (q-1) and
gcd(K,q-1)=1
• compute temporary key: S1 = a
k
mod q
• compute K-1 the inverse of K mod (q-1)
• compute the value: S2 = K-1(m-xAS1) mod (q-1)
• signature is:(S1,S2)
• any user B can verify the signature by computing
• V1 = a
m
mod q
• V2 = yA
S1 S1
S2 mod q
• signature is valid if V1 = V2
ElGamal Digital Signature
• To sign a message M, user A first computes the hash m = H(M), such
that m is an integer in the range 0 <= m <= q – 1. A then forms a
digital signature as shown.
• The basic idea with El Gamal signatures is to again choose a
temporary random signing key, protect it, then use it solve the
specified equation on the hash of the message to create the signature
(in 2 pieces).
• Verification consists of confirming the validation equation that relates
the signature to the (hash of the) message
ElGamal Signature Example
• use field GF(19) q=19 and a=10
• Alice computes her key:
• A chooses xA=16 & computes yA=10
16
mod 19 = 4
• Alice signs message with hash m=14 as (3,4):
• choosing random K=5 which has gcd(18,5)=1
• computing S1 = 10
5
mod 19 = 3
• finding K-1 mod (q-1) = 5-1 mod 18 = 11
• computing S2 = 11(14-16.3) mod 18 = 4
• any user B can verify the signature by computing
• V1 = 10
14
mod 19 = 16
• V2 = 43.34 = 5184 = 16 mod 19
• since 16 = 16 signature is valid
Assignment
• What are the properties and requirements for a digital signature?
• Explain ElGamal Digital Signature

More Related Content

PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Session Hijacking ppt
PPTX
MACs based on Hash Functions, MACs based on Block Ciphers
PPTX
SHA- Secure hashing algorithm
PPT
Message authentication
 
PPTX
Public Key Cryptography
PPT
X.509 Certificates
PPTX
MD5 ALGORITHM.pptx
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Session Hijacking ppt
MACs based on Hash Functions, MACs based on Block Ciphers
SHA- Secure hashing algorithm
Message authentication
 
Public Key Cryptography
X.509 Certificates
MD5 ALGORITHM.pptx

What's hot (20)

PPTX
Identity and Access Management (IAM)
PPTX
PPTX
Public Key Cryptosystem
PPTX
Malware Detection Using Machine Learning Techniques
PPTX
Active contour segmentation
PPTX
IP Security
PPT
Authentication Protocols
PPTX
CLOUD COMPUTING UNIT-1
PPT
Cloud Security
PPT
INTRUSION DETECTION TECHNIQUES
PPTX
NIST Cloud Computing Reference Architecture
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Amoeba distributed operating System
PPT
Block Cipher and its Design Principles
PPTX
Face Recognition based Lecture Attendance System
PPTX
Trusted systems
ODP
Malware Dectection Using Machine learning
PPTX
Classical encryption techniques
PPT
Message authentication and hash function
Identity and Access Management (IAM)
Public Key Cryptosystem
Malware Detection Using Machine Learning Techniques
Active contour segmentation
IP Security
Authentication Protocols
CLOUD COMPUTING UNIT-1
Cloud Security
INTRUSION DETECTION TECHNIQUES
NIST Cloud Computing Reference Architecture
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Amoeba distributed operating System
Block Cipher and its Design Principles
Face Recognition based Lecture Attendance System
Trusted systems
Malware Dectection Using Machine learning
Classical encryption techniques
Message authentication and hash function
Ad

Similar to Information and network security 44 direct digital signatures (20)

PPTX
Cyptography and network security unit 3-1
PPT
Information and data security digital signatures
PPTX
Network security
PPT
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPT
ch13 ABCD.ppt
PPT
ch13.ppt
PPTX
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
PPTX
Digital signature
PPT
Digital Signature.ppt
PDF
2. public key cryptography and RSA
PPT
Introduction to Digital signatures
PPT
digital_sign_interview.ppt
PPTX
Introduction to Cryptography and digital signatures
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPT
Elgamal Digital Signature
PPSX
Digital signature
PDF
PPTX
UNIT-IV.pptx
Cyptography and network security unit 3-1
Information and data security digital signatures
Network security
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
ch13 ABCD.ppt
ch13.ppt
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Digital signature
Digital Signature.ppt
2. public key cryptography and RSA
Introduction to Digital signatures
digital_sign_interview.ppt
Introduction to Cryptography and digital signatures
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Elgamal Digital Signature
Digital signature
UNIT-IV.pptx
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 30 random numbers
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 30 random numbers
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues

Recently uploaded (20)

PDF
Understanding Forklifts - TECH EHS Solution
PDF
Digital Strategies for Manufacturing Companies
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
System and Network Administraation Chapter 3
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
PPTX
Online Work Permit System for Fast Permit Processing
PDF
top salesforce developer skills in 2025.pdf
Understanding Forklifts - TECH EHS Solution
Digital Strategies for Manufacturing Companies
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Which alternative to Crystal Reports is best for small or large businesses.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Wondershare Filmora 15 Crack With Activation Key [2025
System and Network Administraation Chapter 3
Softaken Excel to vCard Converter Software.pdf
Nekopoi APK 2025 free lastest update
Design an Analysis of Algorithms I-SECS-1021-03
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Design an Analysis of Algorithms II-SECS-1021-03
Odoo POS Development Services by CandidRoot Solutions
Internet Downloader Manager (IDM) Crack 6.42 Build 41
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System
Online Work Permit System for Fast Permit Processing
top salesforce developer skills in 2025.pdf

Information and network security 44 direct digital signatures

  • 1. Information and Network Security:44 Direct Digital Signatures Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Digital Signature Requirements must depend on the message signed must use information unique to sender to prevent both forgery and denial must be relatively easy to produce must be relatively easy to recognize & verify be computationally infeasible to forge with new message for existing digital signature with fraudulent digital signature for given message be practical save digital signature in storage
  • 3. Direct Digital Signatures • involve only sender & receiver • assumed receiver has sender’s public-key • digital signature made by sender signing entire message or hash with private-key • can encrypt using receivers public-key • important that sign first then encrypt message & signature • security depends on sender’s private-key
  • 4. Direct Digital Signatures • The term direct digital signature refers to a digital signature scheme that involves only the communicating parties (source, destination). • It is assumed that the destination knows the public key of the source. Direct Digital Signatures involve the direct application of public-key algorithms involving only the communicating parties. • A digital signature may be formed by encrypting the entire message with the sender’s private key, or by encrypting a hash code of the message with the sender’s private key.
  • 5. Direct Digital Signatures • Confidentiality can be provided by further encrypting the entire message plus signature using either public or private key schemes. • It is important to perform the signature function first and then an outer confidentiality function, since in case of dispute, some third party must view the message and its signature. But these approaches are dependent on the security of the sender’s private-key. • Will have problems if it is lost/stolen and signatures forged. The universally accepted technique for dealing with these threats is the use of a digital certificate and certificate authorities.
  • 6. ElGamal Digital Signatures • signature variant of ElGamal, related to D-H • so uses exponentiation in a finite (Galois) • with security based difficulty of computing discrete logarithms, as in D-H • use private key for encryption (signing) • uses public key for decryption (verification) • each user (eg. A) generates their key • chooses a secret key (number): 1 < xA < q-1 • compute their public key: yA = a xA mod q
  • 7. ElGamal Digital Signatures • T. Elgamal announced a public-key scheme based on discrete logarithms, closely related to the Diffie-Hellman technique [ELGA84, ELGA85]. • The ElGamal encryption scheme is designed to enable encryption by a user's public key with decryption by the user's private key. • The ElGamal signature scheme involves the use of the private key for encryption and the public key for decryption. • The ElGamal cryptosystem is used in some form in a number of standards including the digital signature standard (DSS) and the S/MIME email standard.
  • 8. ElGamal Digital Signature • Alice signs a message M to Bob by computing • the hash m = H(M), 0 <= m <= (q-1) • chose random integer K with 1 <= K <= (q-1) and gcd(K,q-1)=1 • compute temporary key: S1 = a k mod q • compute K-1 the inverse of K mod (q-1) • compute the value: S2 = K-1(m-xAS1) mod (q-1) • signature is:(S1,S2) • any user B can verify the signature by computing • V1 = a m mod q • V2 = yA S1 S1 S2 mod q • signature is valid if V1 = V2
  • 9. ElGamal Digital Signature • To sign a message M, user A first computes the hash m = H(M), such that m is an integer in the range 0 <= m <= q – 1. A then forms a digital signature as shown. • The basic idea with El Gamal signatures is to again choose a temporary random signing key, protect it, then use it solve the specified equation on the hash of the message to create the signature (in 2 pieces). • Verification consists of confirming the validation equation that relates the signature to the (hash of the) message
  • 10. ElGamal Signature Example • use field GF(19) q=19 and a=10 • Alice computes her key: • A chooses xA=16 & computes yA=10 16 mod 19 = 4 • Alice signs message with hash m=14 as (3,4): • choosing random K=5 which has gcd(18,5)=1 • computing S1 = 10 5 mod 19 = 3 • finding K-1 mod (q-1) = 5-1 mod 18 = 11 • computing S2 = 11(14-16.3) mod 18 = 4 • any user B can verify the signature by computing • V1 = 10 14 mod 19 = 16 • V2 = 43.34 = 5184 = 16 mod 19 • since 16 = 16 signature is valid
  • 11. Assignment • What are the properties and requirements for a digital signature? • Explain ElGamal Digital Signature