Digital Signature

    Cards (11)

    • Digital Signature (Recap)
      Symmetric: owners of a shared key can decrypt/encrypt with the same key
      Asymmetric: the mathematically related keys used to decrypt/encrypt
    • Security Services
      • Data confidentiality
      • Data integrity
      • Anti-replay
      • Authentication
      • Non-repudiation
    • Data confidentiality
      Ensures that nobody else except A and B can view/read the data
    • Data integrity
      Ensures that the message is not changed in the way
    • Authentication
      Ensures the identity of the other person
    • Non-repudiation
      Proof of origin
      Proof of delivery
    • Public Key Cryptography
      Sender can use their private key or receiver's public key to encrypt/decrypt
    • Digital Signature
      Signing: Encryption with Private Key
      Verifying: Decryption with Public Key
    • Key Generation
      • Choose 2 prime numbers p and q
      Choose integer e that is relative prime to (p-1)(q-1): Public Key PU = {e, pq}
      Find d, such that de = 1 mod (p-1)(q-1): Private Key PR = {d, pq}
    • Digital Signature Process
      Alice Signing Algorithm
      Message and Signature
      Verifying Bob Algorithm
    • Signing/Verifying using key in digital signature process: