0 ratings0% found this document useful (0 votes) 45 views6 pagesDigital Signature 13a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Digital Signature
A digital signature is an authentication mechanism that enables the creator of a
message to. attach a code that acts as a signature. The signature is formed by
taking the hash of the message and encrypting the message with the creator's
private key.
Requirements
* Message authentication protects two parties who exchange messages from any
third party. However, it does not protect the two parties against each other.
* In situations where there is not complete trust between sender and receiver,
something more than authentication is needed. The most attractive solution to this
problem is the digital signature. The digital signature is analogous to the
handwritten signature.
© It must have the following properties
1. It must verify the author and the date and time of the signature.
2. It must to authenticate the contents at the time of the signature.
3, It must be verifiable-by third parties, to resolve disputes.
© The digital signature function includes the authentication function. On the basis of
these properties, we can. formulate the following requirements for a digital
signature.
TECHNICAL PUBLICATIONS® - an upthrust for knowledgeCryptography and Cyber Security
4-30 Integrity and Authentication Algorithms
Must be a bit pattern depending on the message being signed.
Signature must use some information unique to the sender to prevent forgery and
denial. |
Computationally easy to produceja signature.
Computationally easy to recognize and verify the signature.
Computationally infeasible to forge a digital signature.
a) either by constructing a new message for an existing digital signature.
b) or by constructing a fraudulen|
digital signature for given message.
Practical to retain a copy of the di
igi:al signature in storage
Two general schemes for digital signatures
Every signed message from A to B
1) Direct 2) Arbitrated |
Arbitrated Digital Signatures
goes to an arbiter BB (Big Brother) that everybody
trusts. | .
BB checks the signature and the timestamp, origin, content, etc.
BB dates the message and sends it to B with an indication that it has been verified’
and it is legitimate.
e.g. Every user shares a secret key with the arbiter
2 |
A sends to BB in an encrypted form the plaintext P together with B's id, a
timestamp and a random number RA.
BB decrypts the message and thus makes sure it comes from: A; it also checks the
timestamp to protect against replays.
|
BB then sends B the message P,/A’s id, the timestamp and the random number
RA; he also sends a message encrypted with his own private key (that nobody
knows) containing A’s id, timestamp t and the plaintext P (or a hash).
B cannot check the signature but |trusts it because it comes from BB-he knows that
because the entire communication! was encrypted with KB,
B will not accept the messages o1
¥ messages containing the same RA to protect
against replay. |
'm case of dispute, B will show the signature he got from BB (only B may have
produced it) and BB will decrypt it °
i
TECHNICAL PUBLICATIONS? « an upshrust for knowledgeCryptography and Cyber Security 4-34 Integrity and Authentication Algorithms
Direct Digital Signature
*° This involves only the communicating parties and it is based on public keys.
e The sender knows the public key of the receiver.
© Digital signature : Encrypt the entire message (or just a hash’ code of the message)
with the sender's private key.
+ If confidentiality is required : Apply the receiver's public key or encrypt using a ©
shared secret key.
«In case of a dispute the receiver B will produce the plaintext P and the signature
E(KRA, P) - the judge will apply KUA and decrypt P and check the match : 8
does not know KRA and cannot have produced the signature himself.
c
*What are the steps to create a digital signature? A
et ee aE a1
41. Click review and sign link in email. In the email
you received from the sender of the
document to sign, click the link labeled “Click
here to review and sign...” ...
2. Click prompt in document. ...
3. Create electronic signature. ...
4, Select signature option. ...
5. Sign document. ...
CM arr Beit, ee
vetteThe DSA algorithm involves four operations: key fee ne
creates the key pair), key distribution, signing and signature
Pel
BoM oe eee tLe fo) n =). ae
PM oye ue Nice te toe pores) Shag ot elon) eee
3. Signing. A message Is signed as follows: ...
4, Signature Verification.What is digital signature algorithm key generation
and verification?
Digital signatures rely on asymmetric cryptography, also
known as public key cryptography. An stalls og
consists cd a public/private key pair. The p