0% found this document useful (0 votes)
162 views

PR 10

This document outlines a practical for creating and verifying digital signatures using a tool like Cryptool. It discusses the importance of digital signatures for message authentication and non-repudiation. The procedure describes how to generate a key pair, hash a document, encrypt the hash with the private key to create a digital signature, and verify the signature by decrypting it with the public key. Students will work in groups to generate and verify digital signatures using Cryptool in order to understand the process of digitally signing documents.

Uploaded by

jivanlad22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views

PR 10

This document outlines a practical for creating and verifying digital signatures using a tool like Cryptool. It discusses the importance of digital signatures for message authentication and non-repudiation. The procedure describes how to generate a key pair, hash a document, encrypt the hash with the private key to create a digital signature, and verify the signature by decrypting it with the public key. Students will work in groups to generate and verify digital signatures using Cryptool in order to understand the process of digitally signing documents.

Uploaded by

jivanlad22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Network and Information Security (22620)

Practical No. 10 Create and verify digital signature using tool (e.g. Cryptool).

I Practical significance
Digital signatures are the public-key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed messages.
They are used to bind signatory to the message. Similarly, a digital signature is a technique
that binds a person/entity to the digital data. This binding can be independently verified by
receiver as well as any third party. Digital signature is a cryptographic value that is calculated
from the data and a secret key known only by the signer. In real world, the receiver of message
needs assurance that the message belongs to the sender and he should not be able to repudiate
the origination of that message. This requirement is very crucial in business applications,
since likelihood of a dispute over exchanged data is very high.

II Relevant Program Outcome (POs)


PO1 – Basic knowledge
PO2 – Discipline knowledge
PO3 – Experiments and practice
PO4 – Life-long learning

III Competency and practical Skills


“Understand about to Create and verify digital signature.”
This practical is expected to develop the following skills:
1. We have to gain knowledge about Create and verify digital signature.
2. We have to learn how to generate digital signature.
3. We have to learn how to digital signature added to a document.
4. We have to learn how to verify digital signature.

IV Relevant Course Outcome(s)


Analyze Create and verify digital signature using tool.

V Practical outcomes
Given information about generate digital signature.

VI Relevant Affective Domain Related Outcomes


a. Follow precautionary measures
b. Demonstrate working as a leader / a team member
c. Follow ethical practices
Page No : 1

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

VII Minimum Theoretical Background


Out of all cryptographic primitives, the digital signature using public key cryptography
is considered as very important and useful tool to achieve information security. Apart from
ability to provide non-repudiation of message, the digital signature also provides message
authentication and data integrity. A digital signature added to a document shows the sender’s
identity. It can also provide non-repudiation. The sender cannot deny sending the document,
only the sender has that digital signature. Digital signatures are created through multiple
steps. We need to understand all the steps that must be performed before a digital signature
can be generated.
Digital signatures are the public-key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed messages.
They are used to bind signatory to the message. Similarly, a digital signature is a technique
that binds a person/entity to the digital data. This binding can be independently verified by
receiver as well as any third party. Digital signature is a cryptographic value that is calculated
from the data and a secret key known only by the signer. In real world, the receiver of message
needs assurance that the message belongs to the sender and he should not be able to repudiate
the origination of that message. This requirement is very crucial in business applications,
since likelihood of a dispute over exchanged data is very high.

VIII Work situation


a. Faculty must form a group of students.
b. Faculty will demonstrate the use of network cable.
c. Students group will use the tools and piece of Cat6 cables to configure peer-to-peer
network.

IX Resources required (Additional)

SN Instrument/Object Specification Quantity Remarks

01 Desktop PC Processor i3/i5 1 / group Yes

02 Software Cryptool 1 / group Yes

X Precaution to be followed
1. Handle computer system and peripherals with care
2. Handle cat6 crossover cable carefully
3. Follow safety precautions
4. Disconnect PCs from these cables and shut down properly

Page No : 2

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

XI Procedure

 Digital Signature Creation:

 First we need to generate a hash value of the document. To generate it, we need to select a hashing
algorithm. We’ll use the MD5 algorithm.

Page No : 3

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

 Next, generate a key pair. We’ll generate RSA keys. For RSA key generation, two large prime
numbers and a mathematical function are required.

 After successfully generating keys, encrypt the hash value generated earlier.

Page No : 4

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

 We need to create a certificate associated with the RSA key. Provide the following details and
click on “create certificate.” It’ll be used for communication between the sender and recipient.

 Click on generate signature to create a digital signature.

Page No : 5

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

 Click on “store signature.”

Page No : 6

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

 Verifying the Digital signature

 Click on “Digital Signatures” > Verify signature.


 Select the Digital Signature created above

 This message confirms a correct signature.

Page No : 7

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

XII Resources used (Additional)

XIII Observations

List of student Team Members

1.
2.
3.
4.

Signature ofTeacher

Page No : 8

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati


Network and Information Security (22620)

Page No : 9

By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati

You might also like