Nerd Tutorials

With the help of a block diagram explain the RSA algorithm for digital signature ?

Digital signatures are like electronic “fingerprints.” In the form of a coded message, the digital signature securely associates a signer with a document in a recorded transaction

Where public & private key uses to verify the data integrity and authenticity ,

RSA Principle

Uses of digital signatures

  1. Authentication: Digital signatures can be used to authenticate the  source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user.
  2. Integrity: Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. However, if a message is digitally signed, any change in the message after signature will invalidate the signature.
  3. Non-repudiation: Non-repudiation of origin, is an important aspect of digital signatures. By this property an entity that has signed some information cannot at a later time deny having signed it.

Digital Signature Properties

Digital Signature Requirements

RSA digital signature scheme

Key generation in RSA

Key generation in RSA digital signature scheme is exactly the same as key generation in RSA cryptosystem.

Working of RSA digital signature scheme:

Sender A wants to send a message M to the receiver B along with the digital signature S calculated over the message M

Step1: The sender A uses the message digest algorithm to calculate the message digest MD1 over the original message M

Step 2: The sender A now encrypts the message digest with her private key. The output of this process is called the digital signature.

Step 3: Now the sender A sends the original message M along with digital signature DS to receiver B

Step 4: After the receiver B receives the original message M and the sender A’s digital signature, B uses the same message digest algorithm which was used by A and calculate its own message digest MD2 as shown below.

Step 5: The receiver B now uses the sender’s A’s public key to decrypt the digital signature. Note that A had used his private key to decrypt the message digest MD1 to form the digital signature. Therefore only A’s public key can be used to decrypt it. The output of this process is the original message digest which was calculated by A (MD1) in step 1.

Step 6: B now compare the following two message digests.

  1. MD2, which it had calculated in step 4
  2. MD1, which is retrieved from A’s digital signature in step 5If MD1 = MD2 the following facts are established:

a. B accepts the original message (M) as the correct, unaltered message from A

b. B is also assured that the message came from A and not from someone else attached, posing as A

Exit mobile version