Sunday, November 7, 2021

Digital Signature Algorithm (DSA) | Digital Signature Standards (DSS) | RSA Approach

 

Digital Signature Algorithm & Digital Signature Standards

The National Institute of Standards and Technology (NIST) has published Federal Information Processing Standard FIPS 186, known as the Digital Signature Standard (DSS). The DSS makes use of the SHA and presents a new digital signature technique, the Digital Signature Algorithm (DSA). Latest version also incorporates digital signature algorithms based on RSA and on elliptic curve cryptography. Let us discuss RSA and DSS Approach….

 

The RSA Approach

In the RSA approach, the message to be signed is input to a hash function that produces a secure hash code of fixed length. This hash code is then encrypted using the sender’s private key to form the signature. Both the message and the signature are then transmitted. The recipient takes the message and produces a hash code. The recipient also decrypts the signature using the sender’s public key. If the calculated hash code matches the decrypted signature, the signature is accepted as valid.

 

Figure: RSA Approach

The DSS Approach

The DSS approach also makes use of a hash function. The hash code is provided as input to a signature function along with a random number k, generated for this particular signature. The signature function also depends on the sender’s private key (PRa), and a set of parameters known to a group of communicating principle. We can consider this set to constitute a global public key (PUG). The result is a signature consisting of two components, labelled s and r. At the receiving end, the hash code of the incoming message is generated. The signature is input to a verification function. The verification function also depends on the global public key as well as the sender’s public key (PUa), which is paired with the sender’s private key. The output of the verification function is a value that is equal to the signature component r, if the signature is valid. The signature function is such that only the sender, with knowledge of the private key, could have produced the valid signature.

Figure: DSS Approach

Digital Signature Algorithm

Key Generation Process


Create digital Signature


Signature Verification



To learn more about Digital Signature Algorithm, Click here

   Watch more videos click here.

No comments:

Post a Comment