Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
This paper aims toprovide a broadreviewof networksecurity
are discussed.
INTRODUCTION
insight intorecent
(privatekey).
function.
Informationsecurityandcryptography
deliveredbyanacceptedmail service.
Randomized
Message
recovery Deterministi
c
Digital
signature
schemes
Randomized
Appendix
Deterministi
c
ATTACKSONDIGITALSIGNATURES
onlythesigner’s public
key.
classes:
chosenbyhim.
encryptionschemes .
messages.
Signingprocedure
bydoingthefollowing:
1. Computes =S A (m).
2. Transmit thepair (m, s). s is calledthe signature for
message m.
Verificationprocedure
1. ObtaintheverificationfunctionV A of A.
The message space and cipher text space for the RSApublic-
andis publicKnowledge.
correspondingprivatekey.
EachentityAshoulddothe following:
roughlythesamesize.
2. Computen=pqandΦ=(p-1)(q- 1).
=1.
4. Use theextendedEuclideanalgorithm(Algorithm2.107) to
Φ).
Algorithm: RSAsignaturegenerationandverification
signature.
message m, Bshould:
k
wayhashfunctionh:{0, 1}* {0,1} for somefixedpositive
k
integer k. Here {0, 1} denotes theset of bit strings of bit
arbitrarybit lengths).
signaturescheme
correspondingprivatekey.
EachentityAshoulddothe following:
pq.
s2 , ... ,sk€Z* n
2
3. Computev j =s‾ j modn, 1≤j ≤k.
verification
SUMMARY : entityassigns a binarymessagemof arbitrary
publickey.
dothe following:
TheDigital SignatureAlgorithm(DSA)
InformationProcessingStandard(FIPS186) calledthe
signatureschemerecognizedbyanygovernment The
for someinteger q.
Algorithm: Key generationfor theDSA
correspondingprivatekey.
EachentityAshoulddothe following:
159 160.
1. Select a primenumber qsuchthat 2 <q<2
inZ* p.)
(p-1)/q
3.1Select anelement g€Z* p andcomputeα=g modp.
3.2If α=1thengotostep3.1.
5. Computey= αa modp.
Algorithm: DSAsignaturegenerationandverification
publickey.
following:
(a) Select arandomsecret integer k; 0<k<q.
k
(b) Computer =(α modp) modq
(c) Computek‾1modq.
shoulddothefollowing:
signature.
(c) Computew=s‾1modqandh(m).
APPLICATIONS:
assistancefromatrustedthirdparty.
CONCLUSION:
determinedbyakeykAandAis onlyrequiredtokeepkA
determinedbyakeylAwhichis madepublic.
of digital signatures.
onamessagepurportedlysignedbyAis sA
REFERENCES:
http:// Cacr.math.uwaterloo.com
www.prenticehall.com
2.NetworkSecurityandCryptographybyWilliamStallings