16
Md. Rafiqul Islam 1 Chapter Four Digital Signature

CHAPTER Digital Signature

Embed Size (px)

DESCRIPTION

Signature

Citation preview

Slide 1signature method.
# unforgivable: means only the originator should be able to produce/ compute the signature value.
*
Md. Rafiqul Islam
creator or originator.
Simple digital signature
the originator.
Signature verification
*
Suppose that A wants to send a signed message to B. Then,
A uses his private key Kp, A to produce signature and sends it to B.
S = E (m, Kp, A ).
2) After receiving the signed message B will verify the signature as follows:
D(S, Kpub, A) = m.
Encryption Algorithm
Decryption algorithm
# A signed m (since A’s public key is matched).
# No one else signed m (since only A must have the private key).
# A signed m and not m' (since S can be produced only from m not from m').
Non-repudiation:
There is no way to deny that A has signed m. In other words A can not say that he does not produce S.
Signature verification
1) A produces signature S:
S = E(Kp, A, m).
2) Now A enciphers (encrypts) S using B’s public key:
C = E(Kpub, B, S).
S = D(Kp, B, C).
m = D(Kpub, A, S).
Encryption algorithm
Encryption algorithm
Decryption algorithm
Decryption algorithm
Sending end
Receiving end
Key generation:
1. Choose a prime p and two integers, c and x, such that c < p and x < p.
2. Calculate y = cx mod p.
3. Compute q that is a prime factor of (p –1), that means p should be chosen so that (p-1) has a large prime factor, q.
4. x is the private key and (p, c, y )is the public key.
Digital Signature Scheme
Md. Rafiqul Islam
Signature Creation:
1. Compute a random integer k, 0 < k < p-1, which is relatively prime to (p-1) and which has not been used before. Suppose z = p – 1, then gcd (k, z) = 1
2. Compute:
ii) s = b (m – xt ) mod z;
where b is the m-inv of k and z, so kb mod z = 1.
The message signature is then (s, t).
Md. Rafiqul Islam
A recipient receives (s, t). He uses the public key
(p, c, y) and compute:
i) v1 = yt.ts mod p and
ii) v2 = Cm mod p
If v1 = v2, the recipient can accept the signature.
El Gamal Algorithm
Md. Rafiqul Islam
Key Generation:
1. Let p = 13, C = 5 and x = 11 ( c < p and x < p )
2 compute:
y = cx mod p = 511 mod 13 = 8
Then 11 is the private key and (13, 5, 8) is the public key.
Md. Rafiqul Islam
Signature Generation: public key (p, c, y) = (13, 5, 8)
1. Choose z = p-1 = 13 – 1 = 12
2. Choose k = 7 ( k < z ) and gcd ( k, z ) = gcd ( 7, 12 ) = 1
3. Compute t = ck mod p = 57 mod 13 = 8;
4. kb mod z = 1, 7b mod 12 = 1, b = 7 [Extended Euclidian algorithm]
5. s = b ( m – xt ) mod z [use of private key x]
6. suppose the message, m = 104
7. s = 7 ( 104 – 11 × 8 ) mod 12 = 4
The message signature is ( s, t ) = ( 4, 8 )
*
In this section and the next, we examine a sampling of what might be called classical encryption
techniques. A study of these techniques enables us to illustrate the basic approaches to
symmetric encryption used today and the types of cryptanalytic attacks that must be anticipated.
The two basic building blocks of all encryption techniques: substitution and transposition.
We examine these in the next two sections. Finally, we discuss a system that combine both
substitution and transposition.
Md. Rafiqul Islam
Since v1 = v2, the signature is verified.