digital signature algo.pptx

DSA (Digital Signature Algorithm)
DSA (Digital Signature Algorithm)
• This section describes the DSA (Digital
Signature Algorithm) algorithm, which
consists of 2 parts:
• generation of a pair of public key and private
key;
• generation and verification of digital
signature.
What Is DSA
• What Is DSA (Digital Signature Algorithm)?
• DSA is a United States Federal Government
standard for digital signatures. It was
proposed by the National Institute of
Standards and Technology (NIST) in August
1991 for use in their Digital Signature
Standard (DSS), specified in FIPS 186 in 1993.
public key and private key generation
• The first part of the DSA algorithm is the public key and private key
generation, which can be described as:
• Choose a prime number q, which is called the prime divisor.
• Choose another primer number p, such that p-1 mod q = 0. p is
called the prime modulus.
• Choose an integer g, such that 1 < g < p, g^q mod p = 1 and g =
h^((p–1)/q) mod p. q is also called g's multiplicative order modulo
p.
• Choose an integer, such that 0 < x < q.
• Compute y as g^x mod p.
• Package the public key as {p,q,g,y}.
• Package the private key as {p,q,g,x}.
generate a message signature
• Generate the message digest h, using a hash
algorithm like SHA1.
• Generate a random number k, such that 0 < k < q.
• Compute r as (g^k mod p) mod q.
• Compute i, such that k*i mod q = 1. i is called the
modular multiplicative inverse of k modulo q.
• Compute s = i*(h+r*x) mod q.
• Package the digital signature as {r,s}.
verify a message signature
• Generate the message digest h, using the same
hash algorithm.
• Compute w, such that s*w mod q = 1. w is called
the modular multiplicative inverse of s modulo q.
• Compute u1 = h*w mod q.
• Compute u2 = r*w mod q.
• Compute v = (((g^u1)*(y^u2)) mod p) mod q.
• If v == r, the digital signature is valid.
Example
Continue
Continue
1 von 9

Recomendados

Information and network security 45 digital signature standard von
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
140 views14 Folien
Digital signature algorithm (de la cruz, genelyn).ppt 2 von
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
8.3K views19 Folien
Information and network security 46 digital signature algorithm von
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
93 views11 Folien
RSA von
RSARSA
RSAbansidhar11
209 views21 Folien
Dss digital signature standard and dsa algorithm von
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithmAbhishek Kesharwani
2.7K views7 Folien
RSA.pptx von
RSA.pptxRSA.pptx
RSA.pptxmic
10 views8 Folien

Más contenido relacionado

Similar a digital signature algo.pptx

Public Key Cryptography von
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
33.2K views188 Folien
Post quantum cryptography - thesis von
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
1.2K views23 Folien
555_Spring12_topic22.ppt von
555_Spring12_topic22.ppt555_Spring12_topic22.ppt
555_Spring12_topic22.pptMohammedJifar1
1 view11 Folien
New ppt.ppt von
New ppt.pptNew ppt.ppt
New ppt.pptssuser4030a8
2 views21 Folien
RSA & MD5 algorithm von
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
12.6K views21 Folien
chap13-digitalsignature.pdf von
chap13-digitalsignature.pdfchap13-digitalsignature.pdf
chap13-digitalsignature.pdfShilpachaudhari10
5 views32 Folien

Similar a digital signature algo.pptx(20)

Post quantum cryptography - thesis von Samy Shehata
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Samy Shehata1.2K views
RSA & MD5 algorithm von Siva Rushi
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi12.6K views
Cryptography using rsa cryptosystem von Samdish Arora
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora1.7K views
Digital signature von Coders Hub
Digital signatureDigital signature
Digital signature
Coders Hub962 views
Paillier Cryptosystem von Dejan Radic
Paillier CryptosystemPaillier Cryptosystem
Paillier Cryptosystem
Dejan Radic117 views
Final Project SkeletonCipherClient.javaFinal Project SkeletonC.docx von voversbyobersby
Final Project SkeletonCipherClient.javaFinal Project SkeletonC.docxFinal Project SkeletonCipherClient.javaFinal Project SkeletonC.docx
Final Project SkeletonCipherClient.javaFinal Project SkeletonC.docx
voversbyobersby3 views
Digital Signature Standard von Sou Jana
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana519 views

Más de BLACKSPAROW

DICTIONARY USING.pptx von
DICTIONARY USING.pptxDICTIONARY USING.pptx
DICTIONARY USING.pptxBLACKSPAROW
2 views7 Folien
ix d.pptx von
ix d.pptxix d.pptx
ix d.pptxBLACKSPAROW
1 view15 Folien
Soft skills and it’s Importance (1).pptx von
Soft skills and it’s Importance (1).pptxSoft skills and it’s Importance (1).pptx
Soft skills and it’s Importance (1).pptxBLACKSPAROW
12 views10 Folien
Unit 6 - PART2.pptx von
Unit 6 - PART2.pptxUnit 6 - PART2.pptx
Unit 6 - PART2.pptxBLACKSPAROW
16 views17 Folien
Unit 4.pptx von
Unit 4.pptxUnit 4.pptx
Unit 4.pptxBLACKSPAROW
15 views30 Folien
80386-1.pptx von
80386-1.pptx80386-1.pptx
80386-1.pptxBLACKSPAROW
182 views15 Folien

Último

JRN 362 - Lecture Twenty-Two von
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-TwoRich Hanley
39 views157 Folien
Education of marginalized and socially disadvantages segments.pptx von
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptxGarimaBhati5
52 views36 Folien
Introduction to AERO Supply Chain - #BEAERO Trainning program von
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning programGuennoun Wajih
135 views78 Folien
ppt_dunarea.pptx von
ppt_dunarea.pptxppt_dunarea.pptx
ppt_dunarea.pptxvvvgeorgevvv
68 views5 Folien
Volf work.pdf von
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
91 views43 Folien

Último(20)

JRN 362 - Lecture Twenty-Two von Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 views
Education of marginalized and socially disadvantages segments.pptx von GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati552 views
Introduction to AERO Supply Chain - #BEAERO Trainning program von Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih135 views
INT-244 Topic 6b Confucianism von S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer51 views
Pharmaceutical Analysis PPT (BP 102T) von yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009118 views
UNIT NO 13 ORGANISMS AND POPULATION.pptx von Madhuri Bhande
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptx
Madhuri Bhande48 views
The Future of Micro-credentials: Is Small Really Beautiful? von Mark Brown
The Future of Micro-credentials:  Is Small Really Beautiful?The Future of Micro-credentials:  Is Small Really Beautiful?
The Future of Micro-credentials: Is Small Really Beautiful?
Mark Brown121 views
OOPs - JAVA Quick Reference.pdf von ArthyR3
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdf
ArthyR376 views
Interaction of microorganisms with vascular plants.pptx von MicrobiologyMicro
Interaction of microorganisms with vascular plants.pptxInteraction of microorganisms with vascular plants.pptx
Interaction of microorganisms with vascular plants.pptx
GSoC 2024 .pdf von ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz245 views
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab... von RAHUL PAL
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...
Research Methodology (M. Pharm, IIIrd Sem.)_UNIT_IV_CPCSEA Guidelines for Lab...
RAHUL PAL45 views
Presentation_NC_Future now 2006.pdf von Lora
Presentation_NC_Future now 2006.pdfPresentation_NC_Future now 2006.pdf
Presentation_NC_Future now 2006.pdf
Lora 38 views
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx von Niranjan Chavan
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptxGuidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Guidelines & Identification of Early Sepsis DR. NN CHAVAN 02122023.pptx
Niranjan Chavan43 views

digital signature algo.pptx

  • 2. DSA (Digital Signature Algorithm) • This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: • generation of a pair of public key and private key; • generation and verification of digital signature.
  • 3. What Is DSA • What Is DSA (Digital Signature Algorithm)? • DSA is a United States Federal Government standard for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186 in 1993.
  • 4. public key and private key generation • The first part of the DSA algorithm is the public key and private key generation, which can be described as: • Choose a prime number q, which is called the prime divisor. • Choose another primer number p, such that p-1 mod q = 0. p is called the prime modulus. • Choose an integer g, such that 1 < g < p, g^q mod p = 1 and g = h^((p–1)/q) mod p. q is also called g's multiplicative order modulo p. • Choose an integer, such that 0 < x < q. • Compute y as g^x mod p. • Package the public key as {p,q,g,y}. • Package the private key as {p,q,g,x}.
  • 5. generate a message signature • Generate the message digest h, using a hash algorithm like SHA1. • Generate a random number k, such that 0 < k < q. • Compute r as (g^k mod p) mod q. • Compute i, such that k*i mod q = 1. i is called the modular multiplicative inverse of k modulo q. • Compute s = i*(h+r*x) mod q. • Package the digital signature as {r,s}.
  • 6. verify a message signature • Generate the message digest h, using the same hash algorithm. • Compute w, such that s*w mod q = 1. w is called the modular multiplicative inverse of s modulo q. • Compute u1 = h*w mod q. • Compute u2 = r*w mod q. • Compute v = (((g^u1)*(y^u2)) mod p) mod q. • If v == r, the digital signature is valid.