Public Integrity Auditing -
Digital Signatures
by G Jaya Rao
Roll No:716178,Research Scholar ,NITW&IDRBT,Hyd
Public Integrity Auditing -Digital
Signatures
 Digital Signatures
• MAC
 Security services provided by a digital signature
 Digital signature scheme-RSA
 Attacks on digital signatures
 Some applications of digital signatures
 References
Message Integrity-Message
Authentication Code (MAC)
 MAC algorithm is a symmetric key cryptographic
technique to provide message authentication.
 For establishing MAC process, the sender and
receiver share a symmetric key K.
 Essentially, a MAC is an encrypted checksum
generated on the underlying message that is sent
along with a message to ensure message
authentication.
MAC
30.5
The symmetric (shared) key in the
Diffie-Hellman protocol is
K = gxy mod p.
digital_sign_interview.ppt
Limitations of MAC
 Establishment of Shared Secret. This requires
establishment of shared secret among pre-decided
legitimate users prior to use of MAC.
 Inability to Provide Non-Repudiation: Non-repudiation
is the assurance that a message originator cannot
deny any previously sent messages and
commitments or actions. MAC technique does not
provide a non-repudiation service.
 If the sender and receiver get involved in a dispute
over message origination, MACs cannot provide a
proof that a message was indeed sent by the sender.
Both these limitations can be overcome by using the
public key based digital signatures discussed in
following section.
DIGITAL SIGNATURES
 A person signs a document to show that it
originated from him or was approved by him.
 The signature is proof to the recipient that the
document comes from the correct entity and
nobody else.
 A sign of authentication: A verified signature on a
document.
 A message can be signed electronically.
 The electronic signature can prove the authenticity
of the sender of the message --->digital signature.
DIGITAL SIGNATURES(cont’d)
Digital signature process
Security Services
 Message authentication − When the verifier
validates the digital signature using public key of a
sender, he is assured that signature has been
created only by sender who possess the
corresponding secret private key and no one else.
 Data Integrity − In case an attacker has access to
the data and modifies it, the digital signature
verification at receiver end fails. The hash of
modified data and the output provided by the
verification algorithm will not match. Hence,
receiver can safely deny the message assuming
that data integrity has been breached.
 Non-repudiation − Since it is assumed that only
the signer has the knowledge of the signature
key, he can only create unique signature on a
given data. Thus the receiver can present data
and the digital signature to a third party as
evidence if any dispute arises in the future.
13.13
Key Generation
Key generation in the RSA digital signature scheme is
exactly the same as key generation in the RSA
RSA digital signature scheme
In the RSA digital signature scheme, d is private;
e and n are public.
Note
Key-Generation for RSA
1. Generate two large random distinct primes
p and q, each roughly the same size
2. Compute n = pq and
3. Select random integer e:
4. Compute unique integer d:
5. Public key is (n, e); Private key is d
( ) ( 1)( 1)
n p q
   
1 , such that gcd( , ) 1
e e
 
  
1 , such that 1mod
d ed
 
  
13.15
RSA Signature on the Message Digest
Continued
The RSA signature on the message digest
13.16
ATTACKS ON DIGITAL SIGNATURE
digital_sign_interview.ppt
digital_sign_interview.ppt
digital_sign_interview.ppt
digital_sign_interview.ppt
APPLICATIONS …..
Electronic Mail
Data storage
Electronic funds transfer
Software Distribution
Limitations
 The private key must be kept in a secured
manner.
 The process of generation and verification of
digital signature requires considerable amount of
time.
 For using the digital signature the user has to
obtain private and public key, the receiver has to
obtain the digital signature certificate also.
digital_sign_interview.ppt

More Related Content

PPT
Digital signature
PPTX
Network Security Unit-2 topic Part-1.pptx
PPTX
Digital signature
DOCX
PPT
Introduction to Digital signatures
PPT
Information and data security digital signatures
PDF
Ao318992
PPTX
Digital signature
Digital signature
Network Security Unit-2 topic Part-1.pptx
Digital signature
Introduction to Digital signatures
Information and data security digital signatures
Ao318992
Digital signature

Similar to digital_sign_interview.ppt (20)

PPT
Digital Signature
PPTX
CYBER SECURITY : DIGITAL SIGNATURE,
PPTX
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
PPTX
digital signature ppt
PPTX
Digital Signatdsbuisduifhudosffdosfure.pptx
PPTX
Digital Signature in Indian Evidence act .pptx
PPT
Presentation on digital signatures & digital certificates
PPTX
Digital signatur
PPT
Digital signature
PDF
kasodhan2019.pdf
PPT
Sindhu priya .s
PPT
signyourdoc
PPTX
Digital_signature_ppt.pptx
PPTX
Digital signature by mohsin iftikhar
PDF
Digital signature
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
PPT
ch13.ppt
PPTX
Digital signturue
PPTX
Digital signatures and e-Commerce
Digital Signature
CYBER SECURITY : DIGITAL SIGNATURE,
UNIT III- DIGITAL SIGNATURE AND AUTHENTICATION.pptx
digital signature ppt
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signature in Indian Evidence act .pptx
Presentation on digital signatures & digital certificates
Digital signatur
Digital signature
kasodhan2019.pdf
Sindhu priya .s
signyourdoc
Digital_signature_ppt.pptx
Digital signature by mohsin iftikhar
Digital signature
Computer System Security (UNIT IV) For AKTU Lucknow
ch13.ppt
Digital signturue
Digital signatures and e-Commerce

More from jayarao21 (12)

PPTX
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
PPTX
Unit-3sdmghhkjdhjghjkdshjghnsbnmgbh.pptx
PPTX
Introtodiscteremath123456789qwertyu.pptx
PPT
databasemanagementsystempptforbeginners.ppt
PPT
authentication.ppt
DOCX
6.Lab Syllabus.docx
PPTX
unit5_part2.pptx
PDF
CCCDjango2010.pdf
PPT
ch2_jayarao.ppt
PPTX
introdution-to-html_jayarao27_11_22.pptx
PDF
DFS.pdf
PDF
MFCS PPT.pdf
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
Unit-3sdmghhkjdhjghjkdshjghnsbnmgbh.pptx
Introtodiscteremath123456789qwertyu.pptx
databasemanagementsystempptforbeginners.ppt
authentication.ppt
6.Lab Syllabus.docx
unit5_part2.pptx
CCCDjango2010.pdf
ch2_jayarao.ppt
introdution-to-html_jayarao27_11_22.pptx
DFS.pdf
MFCS PPT.pdf

Recently uploaded (20)

PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
African Communication Research: A review
PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PDF
FAMILY PLANNING (preventative and social medicine pdf)
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
Approach to a child with acute kidney injury
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
DOCX
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
PDF
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
PPT
hemostasis and its significance, physiology
PPTX
Math 2 Quarter 2 Week 1 Matatag Curriculum
PDF
FYJC - Chemistry textbook - standard 11.
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PDF
Physical pharmaceutics two in b pharmacy
PDF
Review of Related Literature & Studies.pdf
PPTX
Neurological complocations of systemic disease
PDF
Health aspects of bilberry: A review on its general benefits
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
PPTX
Copy of ARAL Program Primer_071725(1).pptx
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
African Communication Research: A review
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
FAMILY PLANNING (preventative and social medicine pdf)
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Approach to a child with acute kidney injury
ACFE CERTIFICATION TRAINING ON LAW.pptx
THEORY AND PRACTICE ASSIGNMENT SEMESTER MAY 2025.docx
WHAT NURSES SAY_ COMMUNICATION BEHAVIORS ASSOCIATED WITH THE COMP.pdf
hemostasis and its significance, physiology
Math 2 Quarter 2 Week 1 Matatag Curriculum
FYJC - Chemistry textbook - standard 11.
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
Physical pharmaceutics two in b pharmacy
Review of Related Literature & Studies.pdf
Neurological complocations of systemic disease
Health aspects of bilberry: A review on its general benefits
Diabetes Mellitus , types , clinical picture, investigation and managment
CHROMIUM & Glucose Tolerance Factor.pptx
Copy of ARAL Program Primer_071725(1).pptx

digital_sign_interview.ppt

  • 1. Public Integrity Auditing - Digital Signatures by G Jaya Rao Roll No:716178,Research Scholar ,NITW&IDRBT,Hyd
  • 2. Public Integrity Auditing -Digital Signatures  Digital Signatures • MAC  Security services provided by a digital signature  Digital signature scheme-RSA  Attacks on digital signatures  Some applications of digital signatures  References
  • 3. Message Integrity-Message Authentication Code (MAC)  MAC algorithm is a symmetric key cryptographic technique to provide message authentication.  For establishing MAC process, the sender and receiver share a symmetric key K.  Essentially, a MAC is an encrypted checksum generated on the underlying message that is sent along with a message to ensure message authentication.
  • 4. MAC
  • 5. 30.5 The symmetric (shared) key in the Diffie-Hellman protocol is K = gxy mod p.
  • 7. Limitations of MAC  Establishment of Shared Secret. This requires establishment of shared secret among pre-decided legitimate users prior to use of MAC.  Inability to Provide Non-Repudiation: Non-repudiation is the assurance that a message originator cannot deny any previously sent messages and commitments or actions. MAC technique does not provide a non-repudiation service.  If the sender and receiver get involved in a dispute over message origination, MACs cannot provide a proof that a message was indeed sent by the sender. Both these limitations can be overcome by using the public key based digital signatures discussed in following section.
  • 8. DIGITAL SIGNATURES  A person signs a document to show that it originated from him or was approved by him.  The signature is proof to the recipient that the document comes from the correct entity and nobody else.  A sign of authentication: A verified signature on a document.  A message can be signed electronically.  The electronic signature can prove the authenticity of the sender of the message --->digital signature.
  • 11. Security Services  Message authentication − When the verifier validates the digital signature using public key of a sender, he is assured that signature has been created only by sender who possess the corresponding secret private key and no one else.  Data Integrity − In case an attacker has access to the data and modifies it, the digital signature verification at receiver end fails. The hash of modified data and the output provided by the verification algorithm will not match. Hence, receiver can safely deny the message assuming that data integrity has been breached.
  • 12.  Non-repudiation − Since it is assumed that only the signer has the knowledge of the signature key, he can only create unique signature on a given data. Thus the receiver can present data and the digital signature to a third party as evidence if any dispute arises in the future.
  • 13. 13.13 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA RSA digital signature scheme In the RSA digital signature scheme, d is private; e and n are public. Note
  • 14. Key-Generation for RSA 1. Generate two large random distinct primes p and q, each roughly the same size 2. Compute n = pq and 3. Select random integer e: 4. Compute unique integer d: 5. Public key is (n, e); Private key is d ( ) ( 1)( 1) n p q     1 , such that gcd( , ) 1 e e      1 , such that 1mod d ed     
  • 15. 13.15 RSA Signature on the Message Digest Continued The RSA signature on the message digest
  • 21. APPLICATIONS ….. Electronic Mail Data storage Electronic funds transfer Software Distribution
  • 22. Limitations  The private key must be kept in a secured manner.  The process of generation and verification of digital signature requires considerable amount of time.  For using the digital signature the user has to obtain private and public key, the receiver has to obtain the digital signature certificate also.