Lesson 4

Digital Signature Schemes and Authentication Protocols


  • All Topics
  • All Topics

    1 Process of Digital Signature

    Digital Signatures:

    An electronic signature that prove the authenticity of a sender of the message is called ‘Digital Signature

    Process of Digital Signature:

    enter image description here

    • The sender uses a signing algorithm to sign the message

    • The message and signature are sent to ...

    Read Full →
    2 RSA Digital Signature Scheme

    RSA digital signature scheme

    • RSA idea is also used for signing and verifying a message it is called RSA digital signature scheme.

    • Digital signature scheme changes the role of the private and public keys

    • Private and public keys of only ...

    Read Full →
    3 El-Gamal Digital Signature Scheme

    El-gamal digital signature scheme:

    • This scheme used the same keys but a different algorithm

    • The algorithm creates two digital signatures, these two signatures, are used in the verification phase.

    • The key generation process is the same as that of EI-gamal ...

    Read Full →
    4 Schnorr Digital Signature Scheme

    Schnorr digital signature scheme:

    • The problem with EI-gamal digital signature is that P needs to be very large to guarantee that the discrete log problem is interactive. The recommendation is a p of at least 1024 bits. This could make ...

    Read Full →
    5 Digital Signature Standard (DSS)

    Digital signature standard (DSS)

    • DSS uses a digital signature algorithm (DSA) based on the EI gamal scheme with some ideas the schnorr sheme

      enter image description here

    Where, $S_1, S_2$: signatures

    D: alices private key

    R: random secret

    M: message

    ($e_1, e_2, p, q ...

    Read Full →
    6 Needham and Schroeder Authentication Protocol

    Needham and Schroeder Authentication Protocol:

    • N-S is a shared-key authentication protocol designed to generate and propagate a session key, i.e., a shared key for subsequent symmetrically encrypted communication. Note that there is no public key infrastructure in place.

    • Needham-Schroeder ...

    Read Full →