Hash Functions and Authentication Applications Essay

Hash Functions and Authentication Applications Essay

Digital Signature or Public-key digital signature is a method of authenticating digital information comparable to common people’s personal signature on paperss. The digital signature procedure is utilizing techniques taken from public-key cryptanalysis. Digital Signature is really the end product of public-key cryptanalysis for sign language and confirmation and is different from ordinary electronic signature like overseas telegram. teletypewriter. and facsimile. Since digital signatures are based cryptanalytic techniques. a digital signature should hold the undermentioned belongingss.

Digital Signature should be: – non forgeable – reliable – can non be modify after directing – non reclaimable – prevent renunciation The simpler belongingss are: – AUTHENTICITY The importance of genuineness is to forestall authorised intercession. Using the public-key cryptosystems. the receiver will be confident that the transmitter is existent and the message is valid. – INTEGRITY Both transmitter and receiving system will be confident that the message sent has non been altered during the transmittal. The encoding ensures that no 3rd party can see or read the message. – NON-REPUDIATION

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Repudiation means the act of denying association with a message as in claming a 3rd party sent it. This is true when a receiver of the message assert that the transmitter attach a signature to avoid any ulterior renunciation. Digital Signature maps possibly possible utilizing Direct or Arbitrated Digital Signature. The Direct attack relies merely on pass oning parties for their security utilizing the public-key cryptosystems. The job with Direct Digital Signature attack is the proof. wherein the security of the communicating depends merely on the sender’s private key.

It means that when sender’s security is breach. the whole dealing fails. Furthermore. the transmitter can besides utilize the renunciation alibi and state that the he ne’er sent a message or state his private keys were forged or stolen. The Arbitrated attack is better. unlike Direct Digital Signature. This attack employ an supreme authority to prove the sender’s messages and signatures to verify its content and beginning. The supreme authority. when to the full satisfied. stomp the message with day of the month and sent it to its concluding finish.

Arbitrated digital signatures can be implemented utilizing conventional and public-key encoding. In a conventional attack. it assumed that transmitter “S” and the assigned supreme authority “A” . Both supreme authority and transmitter will now portion a secret key. state “KSA” and subsequently the receiver “R” will portion secret key as “KRA” . The transmitter creates a message and computing machine it against its hash value M ( H ) so “S” submits the message to “A” . Arbiter will now decode the signature. look into its hash value. formalize the message. and direct the message to “R” .

Recipient decrypts the message and restores the original message ( M ) . An arbitrated digital signature utilizing public-key encoding has a different attack wherein the supreme authority can non see the message. At first. the transmitter “S” encrypts the message with its ain private key and encrypts it once more with the receiver “R private cardinal thereby bring forthing a secret signed message. This signed message will be encrypted once more with the transmitters ID. together the message will be sent to the supreme authority. The interior dual encrypted message is unafraid from the supreme authority and from anybody except the receiver.

The supreme authority can merely see the outer messages to look into the beginning of the message and guarantee that the transmitter private and public key is still valid. A rematch onslaught is a type of web onslaught where valid information transmittal is maliciously or fraudulently repeated or delayed. It can be the conceiver itself or an antagonist who intercepts the informations and re-transmits it. A simple rematch onslaught instantly sends the same message shortly plenty that it will get within the recipients’ window.

A suppress rematch onslaught is when an aggressor breach security by originating a message interception and keep back it for future rematch. The aggressor will wait for the proper clip to efficaciously play back the message without sensing from the receiver.


Data Security 2003. “Digital Signatures” . [ on-line ] . hypertext transfer protocol: //www. Cs. uku. fi/~junolain/secu2003/secu2003. html # digital Wikipedia. “Digital Signatures” . [ on-line ] . hypertext transfer protocol: //en. wikipedia. org/wiki/Digital_signature Wikipedia. “Replay Attack” . [ on-line ] . hypertext transfer protocol: //en. wikipedia. org/wiki/Replay_attack

Leave a Reply

Your email address will not be published.



I'm Beba

Would you like to get such a paper? How about receiving a customized one?

Check it out