Sei sulla pagina 1di 10

(In the Name of Allah, the Most Gracious, the Most Merciful.

)
Digital Signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of
a message, software or digital document.
Digital Signature

INTRODUCTION HISTORY MODEL HOW DOES DIGITAL ENCRYPTION WITH


SIGNATURE WORKS DIGITAL SIGNATURE

REASONS TO APPLICATIONS OF
CHOOSE DIGITAL DIGITAL
SIGNATURE SIGNATURES
• Digital signature is a cryptographic value that is
Introduction calculated from the data and a secret key
known only by the signer.
• In 1976, Whitfield Diffie and Martin Hellman
first described the notion of a digital signature
scheme.
• Ronald Rivest, Adi Shamir, and Len Adleman
invented the RSA algorithm, which could be
History used to produce primitive digital signatures (not
secure.)
• In 1988, Shafi Goldwasser, Silvio Micali, and
Ronald Rivest became the first to rigorously
define the security requirements of digital
signature schemes
Model of Digital Signature
• Each person adopting this scheme has a public-private key pair.
• The private key used for signing is referred to as the signature key and the
public key as the verification key.
• Signer feeds data to the hash function and generates hash of data.
• Hash value and signature key are then fed to the signature algorithm which
How does produces the digital signature on given hash. Signature is appended to the
data and then both are sent to the verifier.

Digital • Verifier feeds the digital signature and the verification key into the
verification algorithm. The verification algorithm gives some value as output.

Signature • Verifier also runs same hash function on received data to generate hash
value.
• For verification, this hash value and output of verification algorithm are
Works compared. Based on the comparison result, verifier decides whether the
digital signature is valid.
• Since digital signature is created by ‘private’ key of signer and no one else
can have this key; the signer cannot repudiate signing the data in future.
Encryption with
Digital Signature
• There are two possibilities
i. sign-then-encrypt
ii. encrypt-then-sign.
Reasons to choose Digital Signature

Data Integrity Efficiency Compatibility


Applications of Digital Signatures

Message Authentication Integrity Non Repudiation


When the verifier validates the In case an attacker has access to Since it is assumed that only the
digital signature using public key of the data and modifies it, the digital signer has the knowledge of the
a sender, he is assured that signature verification at receiver signature key, he can only create
signature has been created only by end fails. The hash of modified data unique signature on a given data.
sender who possess the and the output provided by the Thus the receiver can present data
corresponding secret private key verification algorithm will not and the digital signature to a third
and no one else. match. Hence, receiver can safely party as evidence if any dispute
deny the message assuming that arises in the future
data integrity has been breached.

Potrebbero piacerti anche