D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any...
-
Upload
paulina-griffith -
Category
Documents
-
view
212 -
download
0
description
Transcript of D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any...
![Page 1: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/1.jpg)
DIGITAL SIGNATURESBy Umair Sadiq
![Page 2: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/2.jpg)
WHAT IS A DIGITAL SIGNATURE? A signature to validate any electronic data.
Its not modified It belongs to signatory Signatory cannot repudiate
![Page 3: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/3.jpg)
PICTORIAL OVERVIEW
![Page 4: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/4.jpg)
VARIOUS ALGORITHMS RSA DSA (US Federal Govt Standard) Elliptic Curve DSA ElGamal (based on computing discrete
logarithm), Pointcheval-Stern (a variant of ElGamal) Note: Unlocking the key requires solution to a
mathematically hard problem like factoring the product of large primes or computing discrete logarithms
![Page 5: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/5.jpg)
A SIMPLIFIED SCENARIO
nmsgcode e mod
msg
nmsg
ncodede
d
)(mod
mod
Encryption, (e,n)
Decryption, (d,n) msg
)(ned
![Page 6: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/6.jpg)
POTENTIAL THREATS AND SOLUTIONS Man-in-the-middle-attack
a person intercepts and modifies messages in both direction and uses its own generated set of keys
digital certificates are used to authenticate keys
Timing attacks with the knowledge of hardware and decipher
time becomes possible to deduce the key it is rectified by combining decryption with a
random computation
![Page 7: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/7.jpg)
CONCLUSION Where digital signature provide a safe way to
authenticate electronic piece of information, it is important to use an algorithm that has been put to rigorous testing and has proven its validity over a period of time.
![Page 8: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.](https://reader036.fdocuments.us/reader036/viewer/2022083119/5a4d1aef7f8b9ab05997d071/html5/thumbnails/8.jpg)
REFERENCES http://csrc.nist.gov/publications/fips/fips186-
2/fips186-2-change1.pdf http://www.abanet.org/scitech/ec/isc/dsg-
tutorial.html http://gdp.globus.org/gt4-tutorial/
multiplehtml/ch09s03.html