D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any...

8
DIGITAL SIGNATURES By Umair Sadiq

description

P ICTORIAL O VERVIEW

Transcript of D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any...

Page 1: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

DIGITAL SIGNATURESBy Umair Sadiq

Page 2: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

WHAT IS A DIGITAL SIGNATURE? A signature to validate any electronic data.

Its not modified It belongs to signatory Signatory cannot repudiate

Page 3: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

PICTORIAL OVERVIEW

Page 4: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

VARIOUS ALGORITHMS RSA DSA (US Federal Govt Standard) Elliptic Curve DSA ElGamal (based on computing discrete

logarithm), Pointcheval-Stern (a variant of ElGamal) Note: Unlocking the key requires solution to a

mathematically hard problem like factoring the product of large primes or computing discrete logarithms

Page 5: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

A SIMPLIFIED SCENARIO

nmsgcode e mod

msg

nmsg

ncodede

d

)(mod

mod

Encryption, (e,n)

Decryption, (d,n) msg

)(ned

Page 6: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

POTENTIAL THREATS AND SOLUTIONS Man-in-the-middle-attack

a person intercepts and modifies messages in both direction and uses its own generated set of keys

digital certificates are used to authenticate keys

Timing attacks with the knowledge of hardware and decipher

time becomes possible to deduce the key it is rectified by combining decryption with a

random computation

Page 7: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

CONCLUSION Where digital signature provide a safe way to

authenticate electronic piece of information, it is important to use an algorithm that has been put to rigorous testing and has proven its validity over a period of time.

Page 8: D IGITAL S IGNATURES By Umair Sadiq. W HAT IS A D IGITAL S IGNATURE ? A signature to validate any electronic data. Its not modified It belongs to signatory.

REFERENCES http://csrc.nist.gov/publications/fips/fips186-

2/fips186-2-change1.pdf http://www.abanet.org/scitech/ec/isc/dsg-

tutorial.html http://gdp.globus.org/gt4-tutorial/

multiplehtml/ch09s03.html