Professional Documents
Culture Documents
Digital Signature
Digital Signature
Computer Security
1.ALGORITHMS
Two algorithms are used in digital signature: RSA ,in which the production of the key is obtained by
an algorithm (deterministic) and ElGamal, in which the key is randomly obtain (random)
1.1 RSA
RSA can be used with and without generating a hash function, when using a hash function the
message results in a fixed length. Moreover, any change produced in the input will result in a
completely different output. For that reason RSA is always used for digital signature with appendix
using a hash function.
2.Alice encrypts M with her private key F=D RSA (M, d) (signature
generation)
4.Bob gets M from Alice’s public key M=E RSA (M, e) (signature
verification)
1.2 DSA
DSA, which combines ElGamal and Schnoor algorithms, was proposed by the NIST in 1991 and in
1994 its standard was established.
When signing with ElGamal you have to previously select a prime p with 300 digits and a primitive
generator g of it. In addition, the signer chooses a private key XA, 1< XA<p-1 and publishes y A
≡g XA (mod. p).
Signature Generation (by A)
Once B has received M and (r, s), it will accept the signature if
the following expressions match:
r =g k (mod. p) V 1 = y Ar r s (mod. p)
r =g k (mod. p) V 2 =g H(M) (mod. p)
3. International recommendations
eCRYPT I and eCRYPT II in Europe, CRYPTREC in Japan and the NIST in the United States are
responsible to determine are the best and research for new methods in their respective zones.