Escolar Documentos
Profissional Documentos
Cultura Documentos
Presented by
Sandeep kr. Vishwakarma
M.Tech. (Computer Sc.&Engg.)
NITTTR, Chandigarh
April 7, April
2015
7, 2015
11
Contents
Introduction
What is digital signature ?
Message digest
Digital signature standard
Digital signature algorithm
References
April 7, April
2015
7, 2015
22
Introduction
Digital signature is a sort of Cryptography.
Cryptography is known as Secret Writing.
April 7, 2015
Introduction cont
Let us discuss the security measures applied to each
single message. We can say that security provides four
services:
Message
security
Privacy
April 7, April
2015
7, 2015
Authentication
Integrity
Non-repudiation
44
Introduction cont
Privacy:- Means that the sender and receiver expect
confidentiality.
Privacy with Symmetric-Key Cryptography
Shared key
Bob
Alice
Plain
text
Encryption
network
Decryption
Plain
text
cipher text
April 7, April
2015
7, 2015
55
Introduction cont
Privacy with public-key cryptography
Bob
Public key
Bob Private
key
Bob
Alice
plain
text
Encryption
network
Decryption
plain
text
cipher text
April 7, April
2015
7, 2015
66
Introduction cont
Message authentication: It means that the receiver needs
to be sure the senders identity.
April 7, April
2015
7, 2015
77
7, 2015
88
Bob
Alice
plain
text
Encryption
Network
Decryption
plain
text
Ciphertext
April 7, April
2015
7, 2015
99
Message digest
( fixed length)
The two most common hash function are called MD5 and SHA-1.
April 7, April
2015
7, 2015
10
10
Message
message
Send to bob
Message +digest
Hash
Digest
Encryption
Sign
digest
April 7, April
2015
7, 2015
11
11
From Alice
Message
Hash
Decrypt
Digest
April 7, April
2015
7, 2015
compare
Digest
12
12
Message digest
A message digest is a fingerprint or the summary of
message. It is similar to the concept of Longitudinal
Redundancy Check (LRC) or Cyclic Redundancy Check
(CRC). That is used to verify the integrity of data.
April 7, April
2015
7, 2015
13
13
MD5:
7, 2015
14
14
Original message
Padding
The total length of this should be 64 bits less than a multiple of 512.
For example, it can be 448 bits (448=512-64), or 960 bits (960=2*512-64)
or 1472=(3*512-64)
April 7, 2015
15
April 7, April
2015
7, 2015
16
16
April 7, April
2015
7, 2015
17
17
block1
April 7, April
2015
7, 2015
block2
block3
block4
Block n
18
18
hex
hex
hex
hex
hex
7, 2015
01
89
FE
76
C3
23
AB
DC
54
D2
45
CD
BA
32
E1
67
EF
98
10
F0
32*5=
160
bits
19
19
7, 2015
20
20
Abstracted view
Internal view
April 7, April
2015
7, 2015
21
21
32 bit
32 bit
Sub-block16
32 bit
April 7, April
2015
7, 2015
22
22
K[t]
One round
a
April 7, April
2015
7, 2015
23
23
April 7, 2015
24
S^30
April 7, April
2015
7, 2015
25
25
26
26
Process p
1
BXORcXORd
April 7, April
2015
7, 2015
27
27
April 7, April
2015
7, 2015
28
28
7, 2015
29
29
April 7, April
2015
7, 2015
30
30
April 7, April
2015
7, 2015
31
31
7, 2015
32
32
7, 2015
33
33
April 7, April
2015
7, 2015
34
34
References
1.Cryptography and network security By Atul Kahate .
2.Data Communication and Networking by B.A. Forouzen.
3.Federal Information Processing Standards Publication: (Digital
Signature Standard) IEEE paper.
April 7, 2015
35
April 7, 2015
36