Professional Documents
Culture Documents
CNS M5 Rsa DS
CNS M5 Rsa DS
CNS M5 Rsa DS
Security
RSA based digital signature
RSA
RSA digital signature
algorithm is based on RSA Asymmetric Algorithm
the RSA Asymmetric
Algorithm
Key Generation
Encryption
Decryption
RSA Digital Signature
1. Key Generation
2. Signature Generation
3. Signature Verification
4
RSA Digital Signature
1. Key Generation
5
RSA Digital Signature
2. Signature Generation
• Use Private key for Signing message M
• M must verify 0 < M < n
• Use private key (d)
Compute S = Md mod n
6
RSA Digital Signature
3. Signature Verification
• Use Public key for verifying the Signature
• Use public key (e,n)
Compute Se mod n = (Md mod n)e mod n = M
Note: in practice, a hash of the message is signed and not the message itself.
7
RSA Digital Signature
1. Key Generation
2. Signature Generation
3. Signature Verification
8
RSA Digital Signature
Example:
1. Key Generation
2. Signature Generation
3. Signature Verification
10
Example
1. Key Generation
11
2. Signature Generation
M= 35 0<35<91
Signature S = Md mod n
= 3529 mod 91
S = 42
12
2. Signature Verification
13
RSA Digital Signature
Example:
14