Sie sind auf Seite 1von 7

2012 International Conference on Computing Sciences

DIGITAL SIGNATURE

Ravneet Kaur , Amandeep Kaur


Assistant Professor in Department of Computer Science
SDSPM College For Women, Rayya(Asr)
Guru Nanak Dev University, India
Email: neet3105@gmail.com
Email: amanishan.kang@yahoo.com

Abstract
There are different types of encryption techniques are Conventional signatures are not able to
being used to ensure the privacy of data transmitted change this situation because they are
over internet. Digital Signature is a mathematical included in the document as a part of the
scheme which ensures the privacy of conversation,
integrity of data, authenticity of digital document.
message/sender and non-repudiation of sender. The solution of all these security issues is
Digital Signature is embedded in some hardware Digital Signature. When we sign a document
device or also exits as a file on a storage device. digitally, we send the signature as a separate
Digital Signature are signed by third party some document. For a Digital Signature, the
certifying authority. This paper describe the different
key factor of digital signature with the working of recipient receives the message and the
digital signature, through various methods and signature. The recipient needs to apply a
procedures involved in signing the data or message verification technique to the combination of
by using digital signature. It introduces algorithms the message and the signature to verify the
used in digital signatures. authenticity. Digital Signature ensure the
Keywords: Encryption, Hashing, Public Key privacy if data and prevent it from
Encryption, Authentication, Privacy, Information unauthorized access.
Security
Digital Signature is currently used in various
application domains that include: i)
Government: Filing tax returns online by
I. INTRODUCTION taxpayers, citizen ID card, issuing forms and
With the revolution of digital data storage licenses, reservations & ticketing, ii)
and communication technologies, digital Banking: Inter/ Intra bank messaging
systems, corporate Internet banking
information can be easily stored, copied,
applications, iii) Financial Services/Broking:
changed and transported. These desirable Online trading, electronic contract notes, iv)
properties are very useful as well as having B2B: Online tendering, e-Procurement, v)
some security issues; therefore digital is Healthcare: healthcare management system,
regarded as unreliable in areas where electronic medical recording, electronic
privacy, authentication and integrity of data prescriptions and many others.
are of big concern unless some security This paper is organized as follows: section 2
briefly describes privacy, authentication,
procedures attached to it. There are some
integrity and non-repudiation. Section 3
areas like receipt, contracts, and similar introduces encryption and in section 4
others where users have concerns of illustrates steps involved in Digital
unauthorized access, and stealing of data. Signatures.

978-0-7695-4817-3/12 $26.00 © 2012 IEEE 295


DOI 10.1109/ICCS.2012.25
II. KEY FACTORS OF which involved in the communication or
having participation in the communication.
DIGITAL SIGNATURE [1] Thus when the message is send to the
Privacy, Authentication, Integrity and Non- receiver, then receiver can prove that the
repudiation are four key factors to achieve alleged sender in fact sent the message.
information security. Privacy also called
confidentiality, guarantees protection of III. ENCRYPTION
information from unauthorized persons.
Encryption is the conversion of the data into
a form, called a cipher text that cannot be
A. Privacy easily understood by unauthorized people.
Privacy guarantees the security of data from Decryption is the process of converting
unauthorized access and manipulation of encrypted data back into its original form, so
data. It means that a transaction between it can be understood.
businesses cannot be viewed or interfered For recovering the contents of the encrypted
with by third party. message, we require correct decryption key.
Decryption key is an algorithm which
B. Authentication decrypts the encrypted message. If the
Authentication serves as proof that you are encryption algorithm is more complex then
the real person not the third party intruder. more difficult it becomes to eavesdrop on
Authentication is very critical in case of any the communications without access to the
trust between different parties. key. Any computed system which
Authentication is critical if there is to be any implements one or more specific algorithms
trust between parties. Authentication is also is called Cryptosystem.
needed when user communicate over the
network and login to network in order to A. Symmetric encryption
prevent data from alteration. Symmetric encryption or private key
encryption is a form of cryptosystem in
C. Integrity which encryption and decryption are
Integrity refers to the ability to protect performed by using the same key. It is also
information, data, or transmissions from known as the conventional encryption. It
unauthorized, uncontrolled, or accidental transforms plaintext into cipher text using a
alterations. We can also use the term secret key and an encryption algorithm.
integrity in reference to the Traditional symmetric ciphers use
working/functioning of system, network and substitution and /or transposition techniques.
application. By preventing unauthorized or Substitution techniques map plain text
undesirable changes to data, data integrity elements into cipher text elements.
can be achieved, which ensures the internal Transposition techniques systematically
and external consistency and other data replace the positions of plaintext elements.
attributes such as accuracy, completeness An algorithm that implements Secret Key
etc. Encryption is called Symmetric Algorithm.
Classic symmetric encryption [3] can be
D. Non-Repudiation achieved using following techniques:
Non-Repudiation provides the security Caesar, Vigenère, Hill, Monoalphabetic
against denial by third unauthorized party substitution, Playfair, ADFGVX, Byte
Addition, Exclusive-OR, Vernam,

296
homophonic substitution, permutation, and authentication should be performed
Solitaire. Modern Symmetric Encryption [3] automatically without user intervention [4].
can be achieved using following techniques:
IDEA, RC2, RC4, DES in ECB mode, and IV. DIGITAL SIGNATURE
DES in CBC mode, Triple-DES in ECB
Digital Signature is an authentication
mode and Triple-DES in CBC mode,
mechanism that enables the sender of a
Rijndael, and AES. Secret Key Encryption
message to attach a unique code that act as a
techniques require secure and sophisticated
signature typically the signature is formed
mechanism to securely distribute key to all
by taking the hash of the message and
parties.
encrypting the message with the senders
private key. The signature guarantees the
B. Asymmetric encryption
source and integrity of the message. The
Asymmetric encryption is a form of Digital Signature standard is an NIST
cryptosystem in which encryption and standard that uses the secure hash algorithm.
decryption are performed using the different The plain message, the message signature
keys-one a public key and one private key. and the Public Key of the sender are packed
This is also known as public key encryption. together which is transformed into signed
It transforms plaintext into cipher text using and encrypted message using the Public Key
a one of two keys and encryption algorithm. of the recipient. The recipient unpacks
Symmetric encryption offers confidentiality, received message which is the signed and
authentication or both. RSA is the most encrypted message after which same
widely used public key cryptosystem. hashing function is used to compute
Some Asymmetric Encryption algorithms message digest of the received message
are: RSA, DSA, and ECDSA. It offers key which is compared to the decrypted
advantages like simplified key distribution, signature.
Digital Signature and long-term encryption.
Public key authentication is often used when

Figure1. Functioning of Digital Signature


1. Signing and encryption
Digital Signature can be classified into two 2. Decryption and verification
processes:

297
Steps followed in these processes are 3 Hashing: In this Step, plain text message
describes as follow: which is obtained after decrypting and
unpacking the received message is input to
Process 1: Signing and Encryption hash function that was used by sender is
used to compute message digest.
1 Hashing: In this step small message digest
4 Decryption: In this step, the received
is computed which is unique representation
message signature is decrypted by using the
of the message. This evaluation ensures the
received public key of the sender. By
message integrity. The digital signature is
decryption, message digest is obtained
applied to this smaller message digest. This
computed before the transmitting the
evaluation generates a unique code.
message.
2 Encryption: In this step message digest is
5 Comparison: At last in this step, message
encrypted using private key of the sender. It
digest obtained after decrypting the received
is used to sign the message digest. The
message signature and message digest
original message can be recovered by
computed from the plain message received
decrypting the message signature using
by the recipient.
corresponding public key of sender. To
Signed and encrypted data or message can
obtain non-repudiation, Signing is
only be decrypted using the correct Private
performed.
Key of the recipient thus ensuring the
3 Packing: The plain message, message
privacy. Hashing and Signature verification
signature and the Public Key of the sender
offer the integrity, authenticity and non-
are packed together into a single packed
repudiation.
unit.
4 Encryption: The single packed unit of
message which contains plain message and
A. Digital Signature (using
message signature along with the public of symmetric key)
the sender is encrypted using receipt’s Encryption and decryption algorithms using
public key to form signed and encrypted asymmetric keys are too slow to be used for
message. long messages, thus a symmetric key is
Process2: Decryption and Verification generated and is used in Digital Signatures
to encrypt the packed unit containing plain
1 Decryption: In these steps the received message, the message signature and Public
message which is signed and encrypted is Key of sender. The Symmetric Key is
decrypted using the receiver’s private key to encrypted using the Public Key of the
form a packed unit of message containing recipient so that it can only be decoded by
plain message, the signature and the public the intended receiver who can use it to
key of the sender. decrypt the packed unit before unpacking it
2 Unpack: The decrypted message in last and drawing semantics. The functioning of
step is unpacked into plain text message, signing and verification is illustrated in
message signature and the public key of the figure 2.
sender.

298
Figure2. Functioning of Digital Signature (using Symmetric Key)

Steps followed in each process are describes 7 Packing: The encrypted and signed
as follow: message and encrypted Symmetric Key are
packed into a single unit called encrypted
Process1: Signing and Encryption and signed message with encrypted
1 Hashing: This step is same as that for symmetric key.
Digital Signature detailed in signed and
encryption step 1 of section 4. Process: Decryption and Verification
2 Encryption: This step is same as that for 1 Unpack: The received encrypted and
Digital Signature detailed in signed and signed message with encrypted symmetric
encryption step 2 of section 4. key is unpacked in this step.
3 Symmetric Key Evaluation: A 2 Decryption: The encrypted symmetric
Symmetric Key is calculated using some key is decrypted using the Private Key of the
algorithm based on plain message, message recipient to get the Symmetric Key used for
signature and the public key of the sender. encryption in step 5 of signing and
Any algorithm may be used for calculating encryption.
the Symmetric Key. 3 Decryption: Decryption: In this step the
4 Packing: The plain message, message received message which is signed and
signature and the Public Key of the sender encrypted is decrypted using the Symmetric
are packed together to form a single packed Key decrypted in step 2 to form a packed
unit. message containing plain message, the
5 Encryption: The packed message signature and the public key of the sender.
containing the plain message and the 4 Unpack: This step is same as for Digital
signature of the message in the form of Signature detailed in step 2 of decryption
encrypted digest along with the Public Key and verification of section 4.
of the sender is encrypted using the 5 Hashing: This step is same as for Digital
Symmetric Key calculated in step 3 to form Signature detailed in step 3 of decryption
signed and encrypted message. and verification of section 4.
6 Encryption: The Symmetric Key is 6 Decrypt: This step is same as for Digital
encrypted to form encrypted Symmetric Key Signature detailed in step 4 of decryption
using Public Key of the recipient and verification of section 4.

299
7 Comparison: This step is same as for B. Digital Signature Algorithm
Digital Signature detailed in step 5 of
Digital Signature Algorithm (DSA), Rivest-
decryption and verification of section 4.
Shamir-Adleman (RSA) , and Elliptic Curve
The process of this scheme is similar to that DSA (ECDSA) which are captured in FIPS
of Digital Signature without use of PUB 186-2 (with change notice 1 dated 5
Symmetric Key and offers privacy, integrity, October 2001) are three Digital Signature
authentication and non- repudiation and also algorithms. These algorithms used for digital
offers additional advantage of faster signature along with their characteristics and
encryption and decryption. However, minimum key size are listed in table 2
addional algorithm is still required to Table 2: Digital Signature Algorithms
evaluate symmetric key.
Name of Type and Min. Key Size
Algorithm Characteristics
V. ALGORITHMS USED Digital FIPS 186-2 digital 1024bits
Signature signature
IN DIGITAL Standard (DSS) Digital signature based
[5] on SHA1 hash,
SIGNATURE unencumbered (no
patents, no licenses)
RSA Digital RSA digital signature 1024 bits
A. Hash Algorithms Signature [6] (FIPS approved)
Previously patented
Hash function H maps a variable length digital signature
message M as input and produce a fixed Elliptic Curve Digital signature based 160 bits
Digital on elliptic curve key
sized hash values. Signature technology uses
(ECDSA) smaller keys than other
h= H (M) (1) [7] public key technologies
Various hash algorithms, their but may be
encumbered by various
characteristics and hash size are listed in
table 1.
Table 1: Hash Algorithms
VI. CONCLUSION
Name of Type and Characteristics Hash Size Various encryption techniques are being
Algorithm
Secure Hash FIPS approved; other 160 bits
used to ensure privacy and authentication of
Algorithm 1 versions (SHA256, SHA384, digital information. Digital Signatures
(SHA1) [8] SHA512) employs encryption, hashing and Digital
provide longer outputs
Message Digest Potential weaknesses is that 128bits Signature algorithms to ease its users attain
5(MD5) [9] it can be used as a keyed all four desired properties privacy, integrity,
hash authentication and non-repudiation for
RACE Integrity Developed as part of the 160 bit
Primitives EC‘s Research and information security. There are several
Evaluation Development in Advanced possible ways to use Digital Signatures each
Message Digest Communications
160 Technologies in Europe
having its pros and cons.
(RIPEMD-160) (RACE)
[10]
TIGER Hash Designed for efficient
VII. REFERENCES
192 bits
[11] operation on 64-bit platforms [1] Cryptography and Network Security Principles and
practices, William Stallings, Pearson Education, Fifth
Edition.
[2] Fundamentals of Network Security, Artech House,
London, ISBN 1-58053-176-8, John E. Canava
(2001).

300
[3] Applied Cryptography: Protocols, Algorithms and
Source Code in C, Second Edition, John Willey&
Sons, Inc.ISBN:0-471-12845-7, Schneier B (1996).
[4] Public Key Encryption and Digital Signature: How do
they work? CGI Group Inc. (2004).
[5] Digital Signature Standard(DSS),FIPS PUBS 186-
3,Information Technology Laboratory, National
Institute of Standards and Technology, Gathers burg,
MD 20899-890,FIPS (1996).
[6] RSA Cryptography Standard, RSA Security Inc. RSA
(2002).
[7] Public Key Cryptography for the Financial Services
Industry: The Elliptic Curve Digital Signature
Algorithm (ECDSA), ANSI X9.62 (1999).
[8] Federal Information Processing Standards Publication,
SHA(1995).
[9] The MD5 Message-Digest Algorithm, IEFTF RFC
1321, R. Rivest (1992).
[10] Integrity Primitivies for Secure Information Systems.
Final report of RACE Integrity Primitives Evaluation
(RIPE-RACE 1040), LNCS 1007, Springer-Verlage,
RIPE 1995.
[11] A Fast New Hash Function ,Fast Software Encryption,
Third International Workshop Proceedings, Springer-
Verlage, Ross Anderson and Eli Biham (1996).

301

Das könnte Ihnen auch gefallen