Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Outline
• Introduction
• Working
• Common Uses
• Issues and Way forward
Digital Signature
Hash Verify
Public Key
Private Key
Recipient
Originator
Underlying Algorithm
• RSA Algorithm – Key Generation
• Choose 2 large Prime numbers ‘p’ & ‘q’
• Define ‘n’ = pXq
• Define ‘z’ =(p-1) X (q-1) – Euler’s Totient (ɸ)
• Choose ‘e’ (1<e<z) s.t : e and z are
coprime – gcd(e,z) = 1
• Compute ‘d’ s.t. (eXd)mod z = 1
• Private Key (d,n)
Key Pair
• Public Key (e,n)
RSA Algorithm - Signing
• Hash – ‘h’ ; Signature – ‘s’
• Signing (Private Key – d,n)
s = h d mod n
• Verifying (Public Key – e,n)
h = s e mod n
Advantages of Digital Signature
• Integrity
• Authenticity
• Non-Repudiation
• Time stamping
Common Uses
• Secure Mail
• Online Contracts
• Medical Records
• Secure Communication (TLS)
• Encryption
Issues and Way Forward