110 likes | 138 Views
Digital Signatures. Ajaykumar Poondla CSC 692. Objective. The goal is to present the idea of digital signatures and the two commonly used digital signature algorithms RSA Signature scheme Elgamal Signature scheme. Digital Signatures.
E N D
Digital Signatures Ajaykumar Poondla CSC 692
Objective • The goal is to present the idea of digital signatures and the two commonly used digital signature algorithms • RSA Signature scheme • Elgamal Signature scheme
Digital Signatures • Digital signature is a way of signing an electronic document in much the similar way that we sign conventional documents today.
Advantages • Data Integrity. • Authentication. • Non-Repudiation. • Date-Time stamping. • Confidentiality.
Digital signature Schemes • RSA signature scheme. • Elgamal signature scheme.
RSA signature scheme • R.L.Rivest, A.Shamir and L.Adleman proposed this method. • Bob computes C = Me mod n. • Bob sends C,M to Alice • Alice computes Cdmod n. • e.d = 1 mod(ø(n)).
Scope of RSA signature Scheme • Used in VISA and Master cards. • Can be broken using the iteration attack. • The difficulty of breaking RSA signature scheme depends on solving the factorization of a large integer into two large prime factors.
Proposed in 1985. • Non-Deterministic scheme. • Based on Discrete Logarithms. Elgamal signature scheme
Details of the Elgamal Scheme • Calculate y = gx mod p • public key is (p, g, y), and the private key is x. • To sign a message, M choose k, such that k is relatively prime to p-1. • Compute a = gkmod p. • Find b in the following equation M = (xa + kb)mod(p –1). To verify the signature, confirm that Yaabmod p = gMmod p.
Scope of Elgamal scheme • The difficulty of breaking Elgamal signature scheme depends on solving the discrete logarithm problem.
References • An Introduction to cryptography and digital signatures. • R.L.Rivest, A.Shamir and L.Adleman A method for obtaining digital signatures and public-key cryptosystem. • ElGamal, T. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms IEEE Transactions on Information Theory, Vol.31, Nr.4, July 1985. • Md5 algorithm. http://rfc.sunsite.dk/rfc/rfc1321.html