0% found this document useful (0 votes)
21 views

Lec 7

The document discusses digital signatures and how they differ from conventional signatures. It describes the digital signature process, the need for keys, signing the digest, security services provided by digital signatures like message authentication and integrity. It also covers the RSA digital signature scheme, key generation, signing and verifying process and provides an example.

Uploaded by

am8465821
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Lec 7

The document discusses digital signatures and how they differ from conventional signatures. It describes the digital signature process, the need for keys, signing the digest, security services provided by digital signatures like message authentication and integrity. It also covers the RSA digital signature scheme, key generation, signing and verifying process and provides an example.

Uploaded by

am8465821
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Lecture 7

Data Security :
Digital Signature

Dr. Khaled Saada


Introduction
Let us begin by looking at the differences
between conventional signatures and digital
signatures.

A conventional signature is included in the


document; it is part of the document.
But at a digital signature , we send the
signature
2
as a separate document.
Conventional Signature Digital Signature

The recipient receives the message


When the recipient
and the signature. The recipient needs
Verification receives a document, she
to apply a verification technique to
Method compares the signature
the combination of the message and
on the document with
the signature to verify the
the signature on file.
authenticity

There is normally a one-


There is no such distinction unless
to-many relationship
Relationship there is a factor of time on the
between a signature and
3 document (such as a timestamp).
documents.

A copy of the signed


there is no such distinction unless
Duplicity document can be
there is a factor of time on the
distinguished from the
document (such as a timestamp).
original one on file.
PROCESS
Figure shows the digital signature process. The sender uses a
signing algorithm to sign the message. The message and the
signature are sent to the receiver. The receiver receives the
message and the signature and applies the verifying algorithm to
the combination. If the result is true, the message is accepted;
otherwise, it is rejected

Digital signature process

4
Need for Keys

Adding key to the digital signature process

Note
A digital signature needs a public-key system.
The signer signs with her private key; the verifier
verifies with the signer’s public key.
5
Signing the Digest

Signing the digest

6
SERVICES

We discussed several security services including message


confidentiality, message authentication, message integrity,
and non-repudiation. A digital signature can directly
provide the last three; for message confidentiality we still
need encryption/decryption.

7
Message Authentication

A secure digital signature scheme, like a secure


conventional signature can provide message
authentication.

Note
A digital signature provides message authentication.

8
Message Integrity

The integrity of the message is preserved even if we sign


the whole message because we cannot get the same
signature if the message is changed.

Note

A digital signature provides message integrity.

9
Non-repudiation

Using a trusted center for nonrepudiation

Note

Nonrepudiation can be provided using a trusted party.


10
Confidentiality

Adding confidentiality to a digital signature scheme

Note

A digital signature does not provide privacy.


If there is a need for privacy, another layer of
encryption/decryption must be applied.
11
Digital Signature

12
RSA Digital Signature Scheme

General idea behind the RSA digital signature scheme

13
Continued

Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA

Note
In the RSA digital signature scheme, d is private;
e and n are public.

14
Continued

Signing and Verifying

RSA digital signature scheme

15
Continued

Example 13.1
As a trivial example, suppose that Alice chooses p = 823 and q = 953,
and calculates n = 784319. The value of f(n) is 782544. Now she
chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:

Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates

Bob accepts the message because he has verified Alice’s signature.


16
Continued

RSA Signature on the Message Digest


The RSA signature on the message digest

17
Continued

Note
When the digest is signed instead of the message itself,
the susceptibility of the RSA digital signature scheme
depends on the strength of the hash algorithm.

18

You might also like