Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
18 views31 pages

Digital Signature

The document discusses the differences between conventional and digital signatures, highlighting the processes of signature generation and verification. It explains the need for public-key systems in digital signatures and outlines the security services they provide, including message authentication and integrity. Additionally, it covers various digital signature schemes such as RSA, DSS, and Elliptic Curve, along with potential attack types and forgery methods.

Uploaded by

Amisha Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views31 pages

Digital Signature

The document discusses the differences between conventional and digital signatures, highlighting the processes of signature generation and verification. It explains the need for public-key systems in digital signatures and outlines the security services they provide, including message authentication and integrity. Additionally, it covers various digital signature schemes such as RSA, DSS, and Elliptic Curve, along with potential attack types and forgery methods.

Uploaded by

Amisha Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Digital Signature

(Book: Cryptography and Network


Security by Forouzan)

1 3/18/2024
Introduction
 Differences between conventional signatures
and digital signatures.
 Signature Generation
 A conventional signature is included in the
document; it is part of the document.
 But when we sign a document digitally, we send
the signature as a separate document.

2 3/18/2024
Introduction…
 Signature Verification
 For a conventional signature, when the recipient
receives a document, she compares the signature
on the document with the signature on file.
 For a digital signature, the recipient receives the
message and the signature. The recipient needs to
apply a verification technique to the combination
of the message and the signature to verify the
authenticity.

3 3/18/2024
Introduction…
 Relationship
 For a conventional signature, there is normally a one-
to-many relationship between a signature and
documents.
 For a digital signature, there is a one-to-one
relationship between a signature and a message.
 Duplicity
 In conventional signature, a copy of the signed
document can be distinguished from the original one
on file.
 In digital signature, there is no such distinction unless
there is a factor of time on the document.

4 3/18/2024
Digital Signature: Process

5 3/18/2024
Need for Keys

A digital signature needs a public-key system.


The signer signs with her private key; the verifier
verifies with the signer’s public key.

6 3/18/2024
Need for Keys…

A cryptosystem uses the private and public keys of the


receiver: a digital signature uses
the private and public keys of the sender.

7 3/18/2024
Signing the digest

8 3/18/2024
Security Services offered by digital
signature
 Message confidentiality
 Message authentication,
 Message integrity
 Nonrepudiation
 A digital signature can directly provide the last
three;
 for message confidentiality we still need
encryption/decryption.

9 3/18/2024
Message Authentication
 A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.

A digital signature provides message authentication.

10 3/18/2024
Message Integrity
 The integrity of the message is preserved even
if we sign the whole message because we
cannot get the same signature if the message is
changed.

A digital signature provides message integrity.

11 3/18/2024
Nonrepudiation

Nonrepudiation can be provided using a trusted party.


12 3/18/2024
Confidentiality

A digital signature does not provide confidentiality.


If there is a need for confidentiality, another layer of
encryption/decryption must be applied.
13 3/18/2024
Attack types
 Key-Only Attack
 the attacker is only given the public verification key.
 Known-Message Attack
 the attacker is given valid signatures for a variety of
messages known by the attacker but not chosen by
the attacker.
 Chosen-Message Attack
 the attacker first learns signatures on arbitrary
messages of the attacker's choice.

14 3/18/2024
Forgery Types
 Existential Forgery
 Existential forgery is the creation (by an adversary)
of any message/signature pair (m,σ), where σ was
not produced by the legitimate signer.
 Selective Forgery
 Selective forgery is the creation (by an adversary)
of a message/signature pair (m,σ) where m has been
chosen by the adversary prior to the attack.

15 3/18/2024
Digital Signature Schemes

16 3/18/2024
Digital Signature Schemes
 RSA Digital Signature Scheme
 Digital Signature Standard (DSS)
 Elliptic Curve Digital Signature Scheme

17 3/18/2024
RSA Digital Signature Scheme
 Key Generation
 Key generation in the RSA digital signature scheme
is exactly the same as key generation in the RSA

In the RSA digital signature scheme, d is private;


e and n are public.

18 3/18/2024
RSA Digital Signature Scheme…

19 3/18/2024
RSA Digital Signature Scheme…
As a trivial example, suppose that Alice chooses p = 823 and q =
953, and calculates n = 784319. The value of f (n) is 782544.
Now she chooses e = 313 and calculates d = 160009. At this
point key generation is complete. Now imagine that Alice wants
to send a message with the value of M = 19070 to Bob. She uses
her private exponent, 160009, to sign the message:

Alice sends the message and the signature to Bob. Bob receives the
message and the signature. He calculates

Bob accepts the message because he has verified Alice’s signature.


20 3/18/2024
RSA Digital Signature Scheme…
 Key only attack:
 Eve has access only to Alice’s public key. Eve intercepts
the pair (M,S) and tries to create another message M’
such that it generates the same S
 Known-message attack:
 Eve intercepts two message signature pairs (M1, S1) and
(M2, S2) that have been created using same private key.
Can Eve find Signature on the message M1xM2?
 Chosen-message attack:
 What if Eve convince Alice to sign M1 and M2 chosen by
her? Is this selective forgery or existential ?

21 3/18/2024
RSA Digital Signature Scheme…

RSA Signature on the Message Digest

22 3/18/2024
RSA Digital Signature Scheme…

When the digest is signed instead of the message itself,


the susceptibility of the RSA digital signature scheme
depends on the strength of the hash algorithm.

Can you justify the above statement?

23 3/18/2024
RSA Digital Signature Scheme…
 Key only attack:
 Eve intercepts the pair (M,S) and tries to create another
message M’ such that it creates the same digest !!!
 Eve finds two messages M1 and M2 such that they hash to
same value !!!
 Known-message attack:
 Eve intercepts two message signature pairs (M1, S1) and (M2,
S2) that have been created using same private key. Can Eve
find Signature on the message M1xM2?
 Can Eve calculate the message M = M1xM2 and its signature
?
 Chosen-message attack:
 What if Eve convince Alice to sign M1 and M2 chosen by her?
 Can Eve calculate the message M = M1xM2 and its signature ?

24 3/18/2024
Digital Signature Standard (DSS)

31 3/18/2024
Digital Signature Standard (DSS)…
Key Generation.
1) Alice chooses primes p and q.

2) Alice uses <Zp*, × > and <Zq*, ×>.

3) Alice creates e1 to be the qth root of 1 modulo p.

4) Alice chooses d and calculates e2 = e1d.

5) Alice’s public key is (e1, e2, p, q); her private key is


(d).
32 3/18/2024
Digital Signature Standard (DSS)…

33 3/18/2024
Elliptic Curve Digital Signature
Scheme

34 3/18/2024
Elliptic Curve Digital Signature
Scheme…
Key Generation
Key generation follows these steps:

1) Alice chooses an elliptic curve Ep(a, b).

2) Alice chooses another prime q the private key d.

3) Alice chooses e1(…, …), a point on the curve.

4) Alice calculates e2(…, …) = d × e1(…, …).

5) Alice’s public key is (a, b, p, q, e1, e2); her private key


is d.
35 3/18/2024
Elliptic Curve Digital Signature
Scheme…

36 3/18/2024
Variations
 Time Stamped Signatures
 Sometimes a signed document needs to be time
stamped to prevent it from being replayed by an
adversary. This is called time-stamped digital
signature scheme.
 Blind Signatures
 Sometimes we have a document that we want to
get signed without revealing the contents of the
document to the signer.

37 3/18/2024

You might also like