Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
crypto15

crypto15

Ratings: (0)|Views: 48 |Likes:
Published by haji hira

More info:

Published by: haji hira on May 15, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

07/03/2010

pdf

text

original

 
Digital Signatures
The private-key signs (create) signatures, and the public-key verifies signaturesOnly the owner can create the digital signature,hence it can be used to verify who created amessageGenerally don't sign the whole message (doublingthe size of information exchanged), but just a
digest
or 
hash
of the message,
 
Digital Signatures
A
hash function
takes the message, and produces a fixed size (typically 64 to 512 bits) value dependent on the messageIt must be hard to create another messagewith the same hash value (otherwise someforgeries are possible)Developing good hash functions is another non-trivial problem
 
El Gamal
El Gamal algorithm can also be used (with a smallchange) in signing messagesAs in the encryption scheme, the public key will be a y = g
x
mod p, together with g and pTo sign a message:
 – Bob first chooses a random number k relative prime to p-1 – Bob computes a = g
mod p – Bob can solve the equation M = x*a + k*b (mod p-1)for b. – The signature is the pair a and b

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->