You are on page 1of 7

K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

EXPERIMENT NO.: 3

AIM: Implementation of digital signature using Virtual lab.

LEARNING OBJECTIVES:
To verify the working of digital signature scheme and to observe how a receiver can
verify integrity of the message in public key setting.

Link:
https://cse29-iiith.vlabs.ac.in/exp/digital-signatures/index.html

REQUIREMENTS: Desktop Computer/Laptop

THEORY:

Digital Signatures Scheme

A Digital Signature is an authentication mechanism that enables the creator of the


message to attack a code that acts as a signature. The signature is formed by taking
the hash of the message and encrypting the message with the creator's private key.
The signature guarantees the source and integrity of the message.

About the experiment:

In Public key setting, it becomes difficult to verify for a receiver whether message is
originated from claimed source.

In this experiment, we show how a receiver can verify integrity of the message in
public key setting.

1
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

Digital Signature Process

General idea of DSS

2
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

Key Generation

Before signing a message to any entity, Alice (the signee) must generate keys and
announce the public keys to the public

 Choose a prime p, between 512 and 1024 bits in length.


 The number of bits in p must be a multiple of 64.
 Choose a 160-bit prime q in such a way that q divides (p-1).
 Choose a primitive root e0 in Zp .
 Create e1 such that : e1 = e0(p-1)/q mod p .
 Chose d as private key and calculate e2 = e1d.
 Alice’s public key Pk is (e1, e2, p, q); Private key is d.

Signing

3
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

Verifying

4
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

PROCEDURE:

Step 1: Enter the input text to be encrypted in the 'Plaintext' area and generate hash
value for message by clicking on the SHA-1 button

Step 2: Copy content of Hash Output (hex) field and paste it in Input to RSA
(hex) field.

Step 3: Select key size of public key from RSA Public key section by clicking on any
key button.

Step 4: Click on Apply RSA button to generate a digital signature.

SIMULATION:

5
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

6
K. K. Wagh Institute of Engineering Education & Research, Nashik.

Department of Electronics and Telecommunication Engineering

TITLE: Experiment Write-up (EW)


Doc. No.: NS/CL/EW/10(3)

Subject: Elective-II Lab (304198) (E): Network Security Lab

CONCLUSION:

You might also like