Save
Cryptography
Digital Signature
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Lance De Guzman
Visit profile
Cards (11)
Digital Signature (Recap)
Symmetric
: owners of a shared key can decrypt/encrypt with the same key
Asymmetric:
the mathematically related keys used to decrypt/encrypt
View source
Security Services
Data
confidentiality
Data
integrity
Anti-replay
Authentication
Non-repudiation
View source
Data confidentiality
Ensures that
nobody
else except A and B can
view
/read the data
View source
Data integrity
Ensures that the
message
is
not
changed
in the way
View source
Authentication
Ensures the
identity
of
the other
person
View source
Non-repudiation
Proof of
origin
Proof of
delivery
View source
Public Key Cryptography
Sender can use their
private
key or receiver's
public
key to encrypt/decrypt
View source
Digital Signature
Signing:
Encryption
with
Private Key
Verifying:
Decryption
with
Public Key
View source
Key
Generation
Choose
2 prime numbers
p and
q
Choose integer e that is relative
prime
to (p-1)(q-1): Public
Key
PU = {e, pq}
Find d, such that de = 1 mod (p-1)(q-1):
Private
Key PR = {d,
pq
}
View source
Digital Signature Process
Alice Signing
Algorithm
Message and Signature
Verifying Bob
Algorithm
View source
Signing
/Verifying using
key
in digital signature process:
View source