Digital Signature Standard

S
CRYPTOGRAPHY AND
NETWORK SECURITY
Digital Signature Standard
~ S. Janani, AP/CSE, KCET
Digital Signatures
 have looked at message authentication
 but does not address issues of lack of trust
 digital signatures provide the ability to:
 verify author, date & time of signature
 authenticate message contents
 be verified by third parties to resolve disputes
 hence include authentication function with
additional capabilities
Digital Signature Model
Digital Signature Standard
(DSS)
 US Govt approved signature scheme
 designed by NIST & NSA in early 90's
 published as FIPS-186 in 1991
 revised in 1993, 1996 & then 2000
 uses the SHA hash algorithm
 DSS is the standard, DSA is the algorithm
 FIPS 186-2 (2000) includes alternative RSA &
elliptic curve signature variants
 DSA is digital signature only unlike RSA
 is a public-key technique
DSS vs RSA Signatures
Digital Signature Algorithm
(DSA)
 creates a 320 bit signature
 with 512-1024 bit security
 smaller and faster than RSA
 a digital signature scheme only
 security depends on difficulty of computing
discrete logarithms
 variant of ElGamal & Schnorr schemes
DSA Key Generation
 have shared global public key values (p,q,g):
 choose 160-bit prime number q
 choose a large prime p with 2L-1 < p < 2L
 where L= 512 to 1024 bits and is a multiple of 64
 such that q is a 160 bit prime divisor of (p-1)
 choose g = h(p-1)/q
 where 1<h<p-1 and h(p-1)/q mod p > 1
 users choose private & compute public key:
 choose random private key: x<q
 compute public key: y = gx mod p
DSA Signature Creation
 to sign a message M the sender:
 generates a random signature key k, k<q
 nb. k must be random, be destroyed after use,
and never be reused
 then computes signature pair:
r = (gk mod p)mod q
s = [k-1(H(M)+ xr)] mod q
 sends signature (r,s) with message M
DSA Signature Verification
 having received M & signature (r,s)
 to verify a signature, recipient computes:
w = s-1 mod q
u1= [H(M)w ]mod q
u2= (rw)mod q
v = [(gu1 yu2)mod p ]mod q
 if v=r then signature is verified
 see Appendix A for details of proof why
DSS Overview
Summary
 have discussed:
 digital signatures
 digital signature algorithm and standard
1 von 11

Recomendados

Digital signature von
Digital signatureDigital signature
Digital signatureHossain Md Shakhawat
24.6K views29 Folien
Cryptography.ppt von
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
34.1K views22 Folien
Hash Function von
Hash FunctionHash Function
Hash FunctionSiddharth Srivastava
24.2K views32 Folien
Cryptography - 101 von
Cryptography - 101Cryptography - 101
Cryptography - 101n|u - The Open Security Community
5.3K views36 Folien
Digital signature algorithm (de la cruz, genelyn).ppt 2 von
Digital signature algorithm (de la cruz, genelyn).ppt 2Digital signature algorithm (de la cruz, genelyn).ppt 2
Digital signature algorithm (de la cruz, genelyn).ppt 2YooGenelyn
8.3K views19 Folien
block ciphers von
block ciphersblock ciphers
block ciphersAsad Ali
23.9K views66 Folien

Más contenido relacionado

Was ist angesagt?

PGP S/MIME von
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
154 views37 Folien
symmetric key encryption algorithms von
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
7.8K views72 Folien
6. cryptography von
6. cryptography6. cryptography
6. cryptography7wounders
5.6K views42 Folien
CRYPTOGRAPHY AND NETWORK SECURITY von
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
14.9K views120 Folien
Message digest 5 von
Message digest 5Message digest 5
Message digest 5Tirthika Bandi
6.3K views20 Folien
Introduction to Cryptography von
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
13.4K views26 Folien

Was ist angesagt?(20)

PGP S/MIME von Sou Jana
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana154 views
6. cryptography von 7wounders
6. cryptography6. cryptography
6. cryptography
7wounders5.6K views
Cryptography - Block cipher & stream cipher von Niloy Biswas
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas1.6K views
Intro to modern cryptography von zahid-mian
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian2.5K views
Authentication Protocols von Trinity Dwarka
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka10.2K views
Cryptography and network security von patisa
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa42.7K views
Introduction to Cryptography von Seema Goel
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel1.8K views
Symmetric and asymmetric key cryptography von MONIRUL ISLAM
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
MONIRUL ISLAM1.3K views
key distribution in network security von babak danyal
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal36.5K views

Similar a Digital Signature Standard

Digital Signature.ppt von
Digital Signature.pptDigital Signature.ppt
Digital Signature.pptSABITHARASSISTANTPRO
183 views18 Folien
Dss digital signature standard and dsa algorithm von
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithmAbhishek Kesharwani
2.7K views7 Folien
Information and network security 46 digital signature algorithm von
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
93 views11 Folien
Digital signature von
Digital signatureDigital signature
Digital signatureNisha Menon K
967 views33 Folien
Elgamal Digital Signature von
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
332 views13 Folien
Dsa & Digi Cert von
Dsa & Digi CertDsa & Digi Cert
Dsa & Digi CertRam Dutt Shukla
758 views37 Folien

Similar a Digital Signature Standard(20)

Dss digital signature standard and dsa algorithm von Abhishek Kesharwani
Dss  digital signature standard and dsa algorithmDss  digital signature standard and dsa algorithm
Dss digital signature standard and dsa algorithm
Abhishek Kesharwani2.7K views
Information and network security 46 digital signature algorithm von Vaibhav Khanna
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna93 views
Elgamal Digital Signature von Sou Jana
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
Sou Jana332 views
Information and data security digital signatures von Mazin Alwaaly
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly443 views
Introduction to Digital signatures von Rohit Bhat
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat56.4K views
Information and network security 45 digital signature standard von Vaibhav Khanna
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna140 views
Final ss2-digital-signature-group5 von Phan Minh
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
Phan Minh236 views
Digital signature von Sadhana28
Digital signatureDigital signature
Digital signature
Sadhana281.7K views
Digital signature schemes von ravik09783
Digital signature schemesDigital signature schemes
Digital signature schemes
ravik097836.5K views
Simple Overview of PKI and Digital signature by Tarek_Gaber von Tarek Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
Tarek Gaber696 views
RSA & MD5 algorithm von Siva Rushi
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi12.6K views

Más de Sou Jana

UHV Self Management and Peer Pressure.pptx von
UHV Self Management and Peer Pressure.pptxUHV Self Management and Peer Pressure.pptx
UHV Self Management and Peer Pressure.pptxSou Jana
106 views24 Folien
RC4.pptx von
RC4.pptxRC4.pptx
RC4.pptxSou Jana
21 views25 Folien
X.509 Certificates von
X.509 CertificatesX.509 Certificates
X.509 CertificatesSou Jana
500 views12 Folien
Message Authentication Requirement-MAC von
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MACSou Jana
136 views40 Folien
Kerberos von
KerberosKerberos
KerberosSou Jana
243 views21 Folien
Elliptic Curve Cryptography von
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographySou Jana
34 views6 Folien

Más de Sou Jana(17)

UHV Self Management and Peer Pressure.pptx von Sou Jana
UHV Self Management and Peer Pressure.pptxUHV Self Management and Peer Pressure.pptx
UHV Self Management and Peer Pressure.pptx
Sou Jana106 views
X.509 Certificates von Sou Jana
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana500 views
Message Authentication Requirement-MAC von Sou Jana
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
Sou Jana136 views
Kerberos von Sou Jana
KerberosKerberos
Kerberos
Sou Jana243 views
Elliptic Curve Cryptography von Sou Jana
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Sou Jana34 views
Key management.ppt von Sou Jana
Key management.pptKey management.ppt
Key management.ppt
Sou Jana71 views
Mathematics of Asymmetric cryptography von Sou Jana
Mathematics of Asymmetric cryptographyMathematics of Asymmetric cryptography
Mathematics of Asymmetric cryptography
Sou Jana364 views
RSA Algm.pptx von Sou Jana
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
Sou Jana112 views
Diffie Hellman.pptx von Sou Jana
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
Sou Jana192 views
Security Model von Sou Jana
Security ModelSecurity Model
Security Model
Sou Jana51 views
Classical Encryption Techniques von Sou Jana
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
Sou Jana9 views
Perfect Security von Sou Jana
Perfect SecurityPerfect Security
Perfect Security
Sou Jana24 views
Cryptanalysis von Sou Jana
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana409 views
Information Theory von Sou Jana
Information TheoryInformation Theory
Information Theory
Sou Jana28 views
Product Cipher von Sou Jana
Product CipherProduct Cipher
Product Cipher
Sou Jana67 views
Multicore and shared multi processor von Sou Jana
Multicore and shared multi processorMulticore and shared multi processor
Multicore and shared multi processor
Sou Jana69 views

Último

Pitchbook Repowerlab.pdf von
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
9 views12 Folien
Field Programmable Gate Arrays : Architecture von
Field Programmable Gate Arrays : ArchitectureField Programmable Gate Arrays : Architecture
Field Programmable Gate Arrays : ArchitectureUsha Mehta
23 views74 Folien
Module-1, Chapter-2 Data Types, Variables, and Arrays von
Module-1, Chapter-2 Data Types, Variables, and ArraysModule-1, Chapter-2 Data Types, Variables, and Arrays
Module-1, Chapter-2 Data Types, Variables, and ArraysDemian Antony D'Mello
9 views44 Folien
taylor-2005-classical-mechanics.pdf von
taylor-2005-classical-mechanics.pdftaylor-2005-classical-mechanics.pdf
taylor-2005-classical-mechanics.pdfArturoArreola10
37 views808 Folien
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... von
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
5 views25 Folien
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...csegroupvn
16 views210 Folien

Último(20)

Field Programmable Gate Arrays : Architecture von Usha Mehta
Field Programmable Gate Arrays : ArchitectureField Programmable Gate Arrays : Architecture
Field Programmable Gate Arrays : Architecture
Usha Mehta23 views
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... von IJCNCJournal
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal5 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn16 views
IRJET-Productivity Enhancement Using Method Study.pdf von SahilBavdhankar
IRJET-Productivity Enhancement Using Method Study.pdfIRJET-Productivity Enhancement Using Method Study.pdf
IRJET-Productivity Enhancement Using Method Study.pdf
SahilBavdhankar10 views
Basic Design Flow for Field Programmable Gate Arrays von Usha Mehta
Basic Design Flow for Field Programmable Gate ArraysBasic Design Flow for Field Programmable Gate Arrays
Basic Design Flow for Field Programmable Gate Arrays
Usha Mehta10 views
AWS Certified Solutions Architect Associate Exam Guide_published .pdf von Kiran Kumar Malik
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf von AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure10 views
Unlocking Research Visibility.pdf von KhatirNaima
Unlocking Research Visibility.pdfUnlocking Research Visibility.pdf
Unlocking Research Visibility.pdf
KhatirNaima11 views
MongoDB.pdf von ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR351 views
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth von Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 22 views
Integrating Sustainable Development Goals (SDGs) in School Education von SheetalTank1
Integrating Sustainable Development Goals (SDGs) in School EducationIntegrating Sustainable Development Goals (SDGs) in School Education
Integrating Sustainable Development Goals (SDGs) in School Education
SheetalTank113 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande23 views

Digital Signature Standard

  • 1. CRYPTOGRAPHY AND NETWORK SECURITY Digital Signature Standard ~ S. Janani, AP/CSE, KCET
  • 2. Digital Signatures  have looked at message authentication  but does not address issues of lack of trust  digital signatures provide the ability to:  verify author, date & time of signature  authenticate message contents  be verified by third parties to resolve disputes  hence include authentication function with additional capabilities
  • 4. Digital Signature Standard (DSS)  US Govt approved signature scheme  designed by NIST & NSA in early 90's  published as FIPS-186 in 1991  revised in 1993, 1996 & then 2000  uses the SHA hash algorithm  DSS is the standard, DSA is the algorithm  FIPS 186-2 (2000) includes alternative RSA & elliptic curve signature variants  DSA is digital signature only unlike RSA  is a public-key technique
  • 5. DSS vs RSA Signatures
  • 6. Digital Signature Algorithm (DSA)  creates a 320 bit signature  with 512-1024 bit security  smaller and faster than RSA  a digital signature scheme only  security depends on difficulty of computing discrete logarithms  variant of ElGamal & Schnorr schemes
  • 7. DSA Key Generation  have shared global public key values (p,q,g):  choose 160-bit prime number q  choose a large prime p with 2L-1 < p < 2L  where L= 512 to 1024 bits and is a multiple of 64  such that q is a 160 bit prime divisor of (p-1)  choose g = h(p-1)/q  where 1<h<p-1 and h(p-1)/q mod p > 1  users choose private & compute public key:  choose random private key: x<q  compute public key: y = gx mod p
  • 8. DSA Signature Creation  to sign a message M the sender:  generates a random signature key k, k<q  nb. k must be random, be destroyed after use, and never be reused  then computes signature pair: r = (gk mod p)mod q s = [k-1(H(M)+ xr)] mod q  sends signature (r,s) with message M
  • 9. DSA Signature Verification  having received M & signature (r,s)  to verify a signature, recipient computes: w = s-1 mod q u1= [H(M)w ]mod q u2= (rw)mod q v = [(gu1 yu2)mod p ]mod q  if v=r then signature is verified  see Appendix A for details of proof why
  • 11. Summary  have discussed:  digital signatures  digital signature algorithm and standard