110 likes | 158 Views
Explore the concepts and differences between RSA and Elgamal digital signature algorithms, their advantages, scope, and applications. Learn how these schemes ensure data integrity, authentication, non-repudiation, confidentiality, and timestamping.
E N D
Digital Signatures Ajaykumar Poondla CSC 692
Objective • The goal is to present the idea of digital signatures and the two commonly used digital signature algorithms • RSA Signature scheme • Elgamal Signature scheme
Digital Signatures • Digital signature is a way of signing an electronic document in much the similar way that we sign conventional documents today.
Advantages • Data Integrity. • Authentication. • Non-Repudiation. • Date-Time stamping. • Confidentiality.
Digital signature Schemes • RSA signature scheme. • Elgamal signature scheme.
RSA signature scheme • R.L.Rivest, A.Shamir and L.Adleman proposed this method. • Bob computes C = Me mod n. • Bob sends C,M to Alice • Alice computes Cdmod n. • e.d = 1 mod(ø(n)).
Scope of RSA signature Scheme • Used in VISA and Master cards. • Can be broken using the iteration attack. • The difficulty of breaking RSA signature scheme depends on solving the factorization of a large integer into two large prime factors.
Proposed in 1985. • Non-Deterministic scheme. • Based on Discrete Logarithms. Elgamal signature scheme
Details of the Elgamal Scheme • Calculate y = gx mod p • public key is (p, g, y), and the private key is x. • To sign a message, M choose k, such that k is relatively prime to p-1. • Compute a = gkmod p. • Find b in the following equation M = (xa + kb)mod(p –1). To verify the signature, confirm that Yaabmod p = gMmod p.
Scope of Elgamal scheme • The difficulty of breaking Elgamal signature scheme depends on solving the discrete logarithm problem.
References • An Introduction to cryptography and digital signatures. • R.L.Rivest, A.Shamir and L.Adleman A method for obtaining digital signatures and public-key cryptosystem. • ElGamal, T. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms IEEE Transactions on Information Theory, Vol.31, Nr.4, July 1985. • Md5 algorithm. http://rfc.sunsite.dk/rfc/rfc1321.html