0% found this document useful (0 votes)
45 views6 pages

Digital Signature 13a

Uploaded by

gnanajothi k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
45 views6 pages

Digital Signature 13a

Uploaded by

gnanajothi k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
Digital Signature A digital signature is an authentication mechanism that enables the creator of a message to. attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator's private key. Requirements * Message authentication protects two parties who exchange messages from any third party. However, it does not protect the two parties against each other. * In situations where there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is the digital signature. The digital signature is analogous to the handwritten signature. © It must have the following properties 1. It must verify the author and the date and time of the signature. 2. It must to authenticate the contents at the time of the signature. 3, It must be verifiable-by third parties, to resolve disputes. © The digital signature function includes the authentication function. On the basis of these properties, we can. formulate the following requirements for a digital signature. TECHNICAL PUBLICATIONS® - an upthrust for knowledge Cryptography and Cyber Security 4-30 Integrity and Authentication Algorithms Must be a bit pattern depending on the message being signed. Signature must use some information unique to the sender to prevent forgery and denial. | Computationally easy to produceja signature. Computationally easy to recognize and verify the signature. Computationally infeasible to forge a digital signature. a) either by constructing a new message for an existing digital signature. b) or by constructing a fraudulen| digital signature for given message. Practical to retain a copy of the di igi:al signature in storage Two general schemes for digital signatures Every signed message from A to B 1) Direct 2) Arbitrated | Arbitrated Digital Signatures goes to an arbiter BB (Big Brother) that everybody trusts. | . BB checks the signature and the timestamp, origin, content, etc. BB dates the message and sends it to B with an indication that it has been verified’ and it is legitimate. e.g. Every user shares a secret key with the arbiter 2 | A sends to BB in an encrypted form the plaintext P together with B's id, a timestamp and a random number RA. BB decrypts the message and thus makes sure it comes from: A; it also checks the timestamp to protect against replays. | BB then sends B the message P,/A’s id, the timestamp and the random number RA; he also sends a message encrypted with his own private key (that nobody knows) containing A’s id, timestamp t and the plaintext P (or a hash). B cannot check the signature but |trusts it because it comes from BB-he knows that because the entire communication! was encrypted with KB, B will not accept the messages o1 ¥ messages containing the same RA to protect against replay. | 'm case of dispute, B will show the signature he got from BB (only B may have produced it) and BB will decrypt it ° i TECHNICAL PUBLICATIONS? « an upshrust for knowledge Cryptography and Cyber Security 4-34 Integrity and Authentication Algorithms Direct Digital Signature *° This involves only the communicating parties and it is based on public keys. e The sender knows the public key of the receiver. © Digital signature : Encrypt the entire message (or just a hash’ code of the message) with the sender's private key. + If confidentiality is required : Apply the receiver's public key or encrypt using a © shared secret key. «In case of a dispute the receiver B will produce the plaintext P and the signature E(KRA, P) - the judge will apply KUA and decrypt P and check the match : 8 does not know KRA and cannot have produced the signature himself. c * What are the steps to create a digital signature? A et ee aE a1 41. Click review and sign link in email. In the email you received from the sender of the document to sign, click the link labeled “Click here to review and sign...” ... 2. Click prompt in document. ... 3. Create electronic signature. ... 4, Select signature option. ... 5. Sign document. ... CM arr Beit, ee vette The DSA algorithm involves four operations: key fee ne creates the key pair), key distribution, signing and signature Pel BoM oe eee tLe fo) n =). ae PM oye ue Nice te toe pores) Shag ot elon) eee 3. Signing. A message Is signed as follows: ... 4, Signature Verification. What is digital signature algorithm key generation and verification? Digital signatures rely on asymmetric cryptography, also known as public key cryptography. An stalls og consists cd a public/private key pair. The p

You might also like