Topic > The study on digital signature in cryptography

IndexIntroductionImportance of digital signatureThe RSAL approachThe DSSV approachAdvantages and disadvantages of digital signatureConclusionThe digital signature methodology provides cryptographic services such as entity authentication, authenticated key transmission and agreement on the authenticated key. A digital signature is used to provide authentication, non-repudiation, and digital data integrity in exchanged data and to validate the authorized identity of the recipient over an open network. The goal of a digital signature algorithm is to provide security for messages or data. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Introduction Information is highly secret and requires great security, so extensive security measures must be taken. Many algorithms and techniques can be used to protect our data or information from threats. These types of technologies and algorithms are collectively known as encryption. The encryption system can be broadly classified into two parts: the first is the symmetric key encryption (single key system) owned by both the sender and the recipient, and the other is the public key system (asymmetric system). key cryptography) where the uses of two keys are given, the first is the public key which is common to both the sender and the recipient and the other is the private key known only to the individual. The authenticity of many legal, financial and other documents occurs through the presence or absence of an authorized handwritten signature. The “Digital Signature” is the best solution for authenticity in various fields. A. A digital signature is an authentication mechanism that allows the author of a message to attach a code that acts as a signature. The signature is formed by taking the hash of the message and encrypting the message with the creator's private key. The signature guarantees the origin and integrity of the message. It must have the following properties: It must verify the author and the date and time of the signature. Must authenticate content upon signing. It must be verifiable by third parties to resolve disputes. Importance of Digital Signature Among all cryptographic primitives, digital signature using public key cryptography is considered to be a very important and useful tool for obtaining information security. In addition to the ability to ensure message non-repudiation, the digital signature also provides message authentication and data integrity. Let's briefly see how this is achieved with the digital signature – Authentication of the message minus; When the verifier validates the digital signature using a sender's public key, he or she is assured that the signature was created only by the sender who possesses the corresponding secret private key and by no one else. Data integrity – In case an attacker has access to the data and modifies it, the digital signature verification on the recipient side fails. The hash of the modified data and the output provided by the verification algorithm will not match. Therefore, the recipient can safely deny the message assuming that the data integrity has been violated. Non-repudiation - Since only the signer is assumed to know the signature key, they can only create a unique signature on a given piece of data. This way the recipient can present the data and digital signature to third parties as evidence in case of a dispute in the future. APPROACHES The Digital Signature Algorithm (DSA) is part of the Digital Signature Standard (DSS) approach, developed by the United States National Security Agency (NSA).DSA is a federal information processing standard for digital signatures. In August 1991 DSA comes.