Elgamal Digital Signature

S
CS8792 - Cryptography and
Network Security
Digital Signature – Elgamal DS
~ S. Janani, AP/CSE
KCET
Contents
 Why DS
 DS Model
 Attacks and Forgeries
 Direct Vs Arbitrary DS
 Elgamal DS
Elgamal Digital Signature
Digital Signatures
 have looked at message authentication
 but does not address issues of lack of trust
 digital signatures provide the ability to:
 verify author, date & time of signature
 authenticate message contents
 be verified by third parties to resolve disputes
 hence include authentication function with
additional capabilities
Digital Signature Model
Digital
Signature
Model
Attacks and Forgeries
 attacks
 key-only attack
 known message attack
 generic chosen message attack
 directed chosen message attack
 adaptive chosen message attack
 break success levels
 total break
 Universal forgery
 selective forgery
 existential forgery
Digital Signature Requirements
 must depend on the message signed
 must use information unique to sender
 to prevent both forgery and denial
 must be relatively easy to produce
 must be relatively easy to recognize & verify
 be computationally infeasible to forge
 with new message for existing digital signature
 with fraudulent digital signature for given message
 be practical save digital signature in storage
Direct Digital Signatures
 involve only sender & receiver
 assumed receiver has sender’s public-key
 digital signature made by sender signing entire
message or hash with private-key
 can encrypt using receivers public-key
 important that sign first then encrypt message &
signature
 security depends on sender’s private-key
ElGamal Digital Signatures
 signature variant of ElGamal, related to D-H
 so uses exponentiation in a finite (Galois)
 with security based difficulty of computing discrete logarithms,
as in D-H
 use private key for encryption (signing)
 uses public key for decryption (verification)
 each user (eg. A) generates their key
 chooses a secret key (number): 1 < xA < q-1
 compute their public key: yA = a
xA
mod q
ElGamal Digital Signature
 Alice signs a message M to Bob by computing
 the hash m = H(M), 0 <= m <= (q-1)
 chose random integer K with 1 <= K <= (q-1) and gcd(K,q-
1)=1
 compute temporary key: S1 = a
k
mod q
 compute K-1 the inverse of K mod (q-1)
 compute the value: S2 = K-1(m-xAS1) mod (q-1)
 signature is:(S1,S2)
 any user B can verify the signature by computing
 V1 = a
m
mod q
 V2 = yA
S1 S1
S2 mod q
 signature is valid if V1 = V2
ElGamal Signature Example
 use field GF(19) q=19 and a=10
 Alice computes her key:
 A chooses xA=16 & computes yA=10
16
mod 19 = 4
 Alice signs message with hash m=14 as (3,4):
 choosing random K=5 which has gcd(18,5)=1
 computing S1 = 10
5
mod 19 = 3
 finding K-1 mod (q-1) = 5-1 mod 18 = 11
 computing S2 = 11(14-16.3) mod 18 = 4
 any user B can verify the signature by computing
 V1 = 10
14
mod 19 = 16
 V2 = 43.34 = 5184 = 16 mod 19
 since 16 = 16 signature is valid
Summary
 have discussed:
 digital signatures - requirements
 ElGamal signature scheme
1 von 13

Recomendados

Kerberos von
KerberosKerberos
KerberosSou Jana
242 views21 Folien
Key management.ppt von
Key management.pptKey management.ppt
Key management.pptSou Jana
71 views23 Folien
RSA Algm.pptx von
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
112 views30 Folien
Diffie Hellman.pptx von
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptxSou Jana
189 views8 Folien
18CS2005 Cryptography and Network Security von
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
565 views91 Folien
RSA Algorithm von
RSA AlgorithmRSA Algorithm
RSA AlgorithmSrinadh Muvva
802 views14 Folien

Más contenido relacionado

Was ist angesagt?

RSA ALGORITHM von
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHMShashank Shetty
51.1K views28 Folien
Message Authentication von
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
1.7K views20 Folien
Fundamentals of cryptography von
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptographyHossain Md Shakhawat
8.4K views53 Folien
Key distribution code.ppt von
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
704 views15 Folien
Digital Signature von
Digital SignatureDigital Signature
Digital SignatureMohamed Talaat
8.6K views19 Folien
2. public key cryptography and RSA von
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
2.3K views24 Folien

Was ist angesagt?(20)

Message Authentication von chauhankapil
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil1.7K views
Network security cryptography ppt von Thushara92
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara9229K views
Data Encryption Standard (DES) von Haris Ahmed
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed34K views
public key infrastructure von vimal kumar
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar23.4K views
Authentication Protocols von Trinity Dwarka
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka10.2K views
Message authentication von CAS
Message authenticationMessage authentication
Message authentication
CAS26.3K views
x.509-Directory Authentication Service von Swathy T
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
Swathy T21.2K views

Similar a Elgamal Digital Signature

Digital Signature.ppt von
Digital Signature.pptDigital Signature.ppt
Digital Signature.pptSABITHARASSISTANTPRO
180 views18 Folien
Information and data security digital signatures von
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
440 views27 Folien
Ch13 von
Ch13Ch13
Ch13Joe Christensen
1.6K views21 Folien
Introduction to cryptography von
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographySuresh Thammishetty
1.8K views31 Folien
15 ma cs and signatures von
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signaturesdrewz lin
456 views21 Folien
Information and network security 44 direct digital signatures von
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
140 views11 Folien

Similar a Elgamal Digital Signature(20)

Information and data security digital signatures von Mazin Alwaaly
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
Mazin Alwaaly440 views
15 ma cs and signatures von drewz lin
15   ma cs and signatures15   ma cs and signatures
15 ma cs and signatures
drewz lin456 views
Information and network security 44 direct digital signatures von Vaibhav Khanna
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna140 views
digital_sign_interview.ppt von jayarao21
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
jayarao212 views
Introduction to Digital signatures von Rohit Bhat
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat56.4K views
Digital signature schemes von ravik09783
Digital signature schemesDigital signature schemes
Digital signature schemes
ravik097836.4K views
Information and data security other public key cryptosystems von Mazin Alwaaly
Information and data security other public key cryptosystemsInformation and data security other public key cryptosystems
Information and data security other public key cryptosystems
Mazin Alwaaly161 views
Information and network security 46 digital signature algorithm von Vaibhav Khanna
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna93 views
Presentation on Cryptography_Based on IEEE_Paper von Nithin Cv
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv344 views
Cloud computing and security 03 von Akash Kamble
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
Akash Kamble138 views

Más de Sou Jana

PGP S/MIME von
PGP S/MIMEPGP S/MIME
PGP S/MIMESou Jana
145 views37 Folien
UHV Self Management and Peer Pressure.pptx von
UHV Self Management and Peer Pressure.pptxUHV Self Management and Peer Pressure.pptx
UHV Self Management and Peer Pressure.pptxSou Jana
100 views24 Folien
RC4.pptx von
RC4.pptxRC4.pptx
RC4.pptxSou Jana
21 views25 Folien
X.509 Certificates von
X.509 CertificatesX.509 Certificates
X.509 CertificatesSou Jana
476 views12 Folien
Elliptic Curve Cryptography von
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographySou Jana
34 views6 Folien
Mathematics of Asymmetric cryptography von
Mathematics of Asymmetric cryptographyMathematics of Asymmetric cryptography
Mathematics of Asymmetric cryptographySou Jana
351 views31 Folien

Más de Sou Jana(13)

PGP S/MIME von Sou Jana
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana145 views
UHV Self Management and Peer Pressure.pptx von Sou Jana
UHV Self Management and Peer Pressure.pptxUHV Self Management and Peer Pressure.pptx
UHV Self Management and Peer Pressure.pptx
Sou Jana100 views
X.509 Certificates von Sou Jana
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana476 views
Elliptic Curve Cryptography von Sou Jana
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Sou Jana34 views
Mathematics of Asymmetric cryptography von Sou Jana
Mathematics of Asymmetric cryptographyMathematics of Asymmetric cryptography
Mathematics of Asymmetric cryptography
Sou Jana351 views
Security Model von Sou Jana
Security ModelSecurity Model
Security Model
Sou Jana48 views
Classical Encryption Techniques von Sou Jana
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
Sou Jana9 views
Perfect Security von Sou Jana
Perfect SecurityPerfect Security
Perfect Security
Sou Jana24 views
Cryptanalysis von Sou Jana
CryptanalysisCryptanalysis
Cryptanalysis
Sou Jana401 views
Information Theory von Sou Jana
Information TheoryInformation Theory
Information Theory
Sou Jana28 views
Product Cipher von Sou Jana
Product CipherProduct Cipher
Product Cipher
Sou Jana65 views
Multicore and shared multi processor von Sou Jana
Multicore and shared multi processorMulticore and shared multi processor
Multicore and shared multi processor
Sou Jana68 views

Último

SUMIT SQL PROJECT SUPERSTORE 1.pptx von
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
11 views26 Folien
Machine Element II Course outline.pdf von
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdfodatadese1
8 views2 Folien
Quality Manual Chaity Group.pdf von
Quality Manual Chaity Group.pdfQuality Manual Chaity Group.pdf
Quality Manual Chaity Group.pdfMizan Rahman
5 views61 Folien
Thermal aware task assignment for multicore processors using genetic algorithm von
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm IJECEIAES
31 views12 Folien
Activated sludge process .pdf von
Activated sludge process .pdfActivated sludge process .pdf
Activated sludge process .pdf8832RafiyaAltaf
8 views32 Folien
zincalume water storage tank design.pdf von
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf3D LABS
5 views1 Folie

Último(20)

SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 11 views
Machine Element II Course outline.pdf von odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese18 views
Quality Manual Chaity Group.pdf von Mizan Rahman
Quality Manual Chaity Group.pdfQuality Manual Chaity Group.pdf
Quality Manual Chaity Group.pdf
Mizan Rahman5 views
Thermal aware task assignment for multicore processors using genetic algorithm von IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 views
zincalume water storage tank design.pdf von 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 views
Machine learning in drug supply chain management during disease outbreaks: a ... von IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES10 views
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... von Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain12 views
Effect of deep chemical mixing columns on properties of surrounding soft clay... von AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 views
Instrumentation & Control Lab Manual.pdf von NTU Faisalabad
Instrumentation & Control Lab Manual.pdfInstrumentation & Control Lab Manual.pdf
Instrumentation & Control Lab Manual.pdf
NTU Faisalabad 5 views

Elgamal Digital Signature

  • 1. CS8792 - Cryptography and Network Security Digital Signature – Elgamal DS ~ S. Janani, AP/CSE KCET
  • 2. Contents  Why DS  DS Model  Attacks and Forgeries  Direct Vs Arbitrary DS  Elgamal DS
  • 4. Digital Signatures  have looked at message authentication  but does not address issues of lack of trust  digital signatures provide the ability to:  verify author, date & time of signature  authenticate message contents  be verified by third parties to resolve disputes  hence include authentication function with additional capabilities
  • 7. Attacks and Forgeries  attacks  key-only attack  known message attack  generic chosen message attack  directed chosen message attack  adaptive chosen message attack  break success levels  total break  Universal forgery  selective forgery  existential forgery
  • 8. Digital Signature Requirements  must depend on the message signed  must use information unique to sender  to prevent both forgery and denial  must be relatively easy to produce  must be relatively easy to recognize & verify  be computationally infeasible to forge  with new message for existing digital signature  with fraudulent digital signature for given message  be practical save digital signature in storage
  • 9. Direct Digital Signatures  involve only sender & receiver  assumed receiver has sender’s public-key  digital signature made by sender signing entire message or hash with private-key  can encrypt using receivers public-key  important that sign first then encrypt message & signature  security depends on sender’s private-key
  • 10. ElGamal Digital Signatures  signature variant of ElGamal, related to D-H  so uses exponentiation in a finite (Galois)  with security based difficulty of computing discrete logarithms, as in D-H  use private key for encryption (signing)  uses public key for decryption (verification)  each user (eg. A) generates their key  chooses a secret key (number): 1 < xA < q-1  compute their public key: yA = a xA mod q
  • 11. ElGamal Digital Signature  Alice signs a message M to Bob by computing  the hash m = H(M), 0 <= m <= (q-1)  chose random integer K with 1 <= K <= (q-1) and gcd(K,q- 1)=1  compute temporary key: S1 = a k mod q  compute K-1 the inverse of K mod (q-1)  compute the value: S2 = K-1(m-xAS1) mod (q-1)  signature is:(S1,S2)  any user B can verify the signature by computing  V1 = a m mod q  V2 = yA S1 S1 S2 mod q  signature is valid if V1 = V2
  • 12. ElGamal Signature Example  use field GF(19) q=19 and a=10  Alice computes her key:  A chooses xA=16 & computes yA=10 16 mod 19 = 4  Alice signs message with hash m=14 as (3,4):  choosing random K=5 which has gcd(18,5)=1  computing S1 = 10 5 mod 19 = 3  finding K-1 mod (q-1) = 5-1 mod 18 = 11  computing S2 = 11(14-16.3) mod 18 = 4  any user B can verify the signature by computing  V1 = 10 14 mod 19 = 16  V2 = 43.34 = 5184 = 16 mod 19  since 16 = 16 signature is valid
  • 13. Summary  have discussed:  digital signatures - requirements  ElGamal signature scheme