Lec 7
Lec 7
Data Security :
Digital Signature
4
Need for Keys
Note
A digital signature needs a public-key system.
The signer signs with her private key; the verifier
verifies with the signer’s public key.
5
Signing the Digest
6
SERVICES
7
Message Authentication
Note
A digital signature provides message authentication.
8
Message Integrity
Note
9
Non-repudiation
Note
Note
12
RSA Digital Signature Scheme
13
Continued
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
Note
In the RSA digital signature scheme, d is private;
e and n are public.
14
Continued
15
Continued
Example 13.1
As a trivial example, suppose that Alice chooses p = 823 and q = 953,
and calculates n = 784319. The value of f(n) is 782544. Now she
chooses e = 313 and calculates d = 160009. At this point key
generation is complete. Now imagine that Alice wants to send a
message with the value of M = 19070 to Bob. She uses her private
exponent, 160009, to sign the message:
Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates
17
Continued
Note
When the digest is signed instead of the message itself,
the susceptibility of the RSA digital signature scheme
depends on the strength of the hash algorithm.
18