Professional Documents
Culture Documents
EXPERIMENT NO.: 3
LEARNING OBJECTIVES:
To verify the working of digital signature scheme and to observe how a receiver can
verify integrity of the message in public key setting.
Link:
https://cse29-iiith.vlabs.ac.in/exp/digital-signatures/index.html
THEORY:
In Public key setting, it becomes difficult to verify for a receiver whether message is
originated from claimed source.
In this experiment, we show how a receiver can verify integrity of the message in
public key setting.
1
K. K. Wagh Institute of Engineering Education & Research, Nashik.
2
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Key Generation
Before signing a message to any entity, Alice (the signee) must generate keys and
announce the public keys to the public
Signing
3
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Verifying
4
K. K. Wagh Institute of Engineering Education & Research, Nashik.
PROCEDURE:
Step 1: Enter the input text to be encrypted in the 'Plaintext' area and generate hash
value for message by clicking on the SHA-1 button
Step 2: Copy content of Hash Output (hex) field and paste it in Input to RSA
(hex) field.
Step 3: Select key size of public key from RSA Public key section by clicking on any
key button.
SIMULATION:
5
K. K. Wagh Institute of Engineering Education & Research, Nashik.
6
K. K. Wagh Institute of Engineering Education & Research, Nashik.
CONCLUSION: