CH 13 Digital Signature
CH 13 Digital Signature
[Part 3]
Integrity, Authenticity, and Key
Management
Chapter 13
Digital Signature
Forouzan, B.A. Cryptography and Network Security (International Edition). United States: McGraw Hill, 2008. 1.1
Chapter 13 Objectives
13.2
m @ 2015/2016-1 1
SCSR3443 Cryptography 10-Dec-15
Chapter 13 Contents
13.1 Introduction
13.2 Digital Signature Schemes
13.3 Summary
13.3
Chapter 13 Contents
13.1 Introduction
• Comparison
• Process
• Services
• Attacks on Digital Signature
13.2 Digital Signature Schemes
13.3 Summary
13.4
m @ 2015/2016-1 2
SCSR3443 Cryptography 10-Dec-15
13.5
m @ 2015/2016-1 3
SCSR3443 Cryptography 10-Dec-15
13.7
m @ 2015/2016-1 4
SCSR3443 Cryptography 10-Dec-15
• Solution:
• To sign a digest of the message, which is shorter than
a message.
m @ 2015/2016-1 5
SCSR3443 Cryptography 10-Dec-15
13.11
Note
https://glynrob.com/wp-content/uploads/000_keys.jpg.png 13.12
m @ 2015/2016-1 6
SCSR3443 Cryptography 10-Dec-15
Message authentication :
• A secure digital signature scheme, like a secure
conventional signature can provide message
authentication.
Message integrity :
• The integrity of the message is preserved even if we sign
the whole message because we cannot get the same
signature if the message is changed.
13.14
m @ 2015/2016-1 7
SCSR3443 Cryptography 10-Dec-15
m @ 2015/2016-1 8
SCSR3443 Cryptography 10-Dec-15
13.17
Types of Forgery
13.18
m @ 2015/2016-1 9
SCSR3443 Cryptography 10-Dec-15
Chapter 13 Contents
13.1 Introduction
13.2 Digital Signature Schemes
• RSA Digital Signature
13.3 Summary
13.19
m @ 2015/2016-1 10
SCSR3443 Cryptography 10-Dec-15
• The signing and verifying sites use the same function, but
with different parameters.
• The verifier compares the message and the output of the
function for congruence; If the result is true, the message
accepted.
Figure 13.6: General idea behind the RSA digital signature scheme
13.22
m @ 2015/2016-1 11
SCSR3443 Cryptography 10-Dec-15
Key Generation:
• Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA.
Note
13.23
m @ 2015/2016-1 12
SCSR3443 Cryptography 10-Dec-15
(continued)
• He calculates:
13.26
m @ 2015/2016-1 13
SCSR3443 Cryptography 10-Dec-15
Note
13.28
m @ 2015/2016-1 14
SCSR3443 Cryptography 10-Dec-15
Chapter 13 Contents
13.1 Introduction
13.2 Digital Signature Schemes
13.3 Summary
13.29
13.30
m @ 2015/2016-1 15
SCSR3443 Cryptography 10-Dec-15
13.31
13.32
m @ 2015/2016-1 16
SCSR3443 Cryptography 10-Dec-15
Chapter 13 Exercises
Forouzan,B.A. Cryptography and Network Security (International Edition). Singapore: McGraw-Hill, 2008. (page 413) 13.33
Chapter 13 Exercises
Exercise 13.1: Using the RSA scheme, let p = 809, q = 751, and d = 23.
Calculate the public key e. Then,
Forouzan,B.A. Cryptography and Network Security (International Edition). Singapore: McGraw-Hill, 2008. (page 413) 13.34
m @ 2015/2016-1 17