Академический Документы
Профессиональный Документы
Культура Документы
Signature
Process of Digital
Signature
Key Generation
Random Numbers
RSA Key Pair [Private/Public Key]
Digital Signature
Generate Message Digest [SHA1]
Encrypting Digest using Private
Key [Signatures]
Attaching the Signatures to the
message.
Verification of Signatures
Run the test for Authentication,
Integrity and Non repudiation.
Signed Messages
Calculated
Calculated
Hash
Hash
Message
Message
Message
Message
++
signature
signature
Hash
Hash
Message
Message
++
Signature
Signature
COMPARE
COMPARE
Sign
e
Mess d
age
SIGN
SIGNhash
hash
With
Senders
With Senders
Private
Privatekey
key
Sender
if
Hash
Hash
Receiver
Decrypt
Decrypt
Signature
Signature
With
WithSenders
Senders
Public
PublicKey
Key
OK
Signatur
es
verified
Literature
Survey
Research Paper 1
Ravi Shankar Dhakar, Amit Kumar Gupta, Prashant
Sharma Modified RSA Encryption Algorithm
(MREA), 2012 Second International Conference
on Advanced Computing & Communication
Technologies
Performance:
MREA increases the complexity but security is
increased manifold.
Conclusion:
MREA is secure compared to RSA as it is based on
factoring problem as well as decisional composite
assumptions
Research Paper 2
B R Ambedkar, Ashwani Gupta, Pratiksha Gautam, SS
Bedi An Efficient Method to Factorize the RSA Public
Key Encryption, 2011 International Conference on
Communication Systems and Network Technologies
Performance:
Elapsed time for prime factorization are decreasing as
compare to the Fermat and trial division method.
Conclusion:
If we find prime factor of RSA Modulo N, then we can
generate private key and decrypt to the secret
message. Also elapsed time for prime factorization are
decreasing as compare to the Fermat and trial division
method
Research Paper 3
Kashif Latif, Kashif Latif, Arshad Aziz High
Throughput Hardware Implementation of Secure
Hash Algorithm (SHA-3) Finalist: BLAKE, 2011
Frontiers of Information Technology
Performance: Most of previously reported results
are for 10 rounds of the algorithm. BLAKE-256 has
been tweaked from 10 to 14 rounds.
Conclusion: this paper represented the
implementation in terms of area, throughput and
throughput per area and compared it with
previously reported implementation results.
Results achieved in this work are exceeding the
performance for implementations reported so far.
PROPOSED SYSTEM
Concepts
Digital Signatures
I agree
efcc61c1c03db8d8ea8569545c073c814a0ed755
My place of birth is at Gwalior.
fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25
I am 62 years old.
0e6d7d56c4520756f59235b6ae981cdb5f9820a0
I am an Engineer.
ea0ae29b3b2c20fc018aaca45c3746a057b893e7
I am a Engineer.
01f1d8abd9c2e6130870842055d97d315dff1ea3
These are digital signatures of same person on different documents
ENCRYPTION
DECRYPTION
Message 1
Encrypted Message 1
Encrypted Message 1
Message 1
Central to the growth of e-commerce and egovernance is the issue of trust in electronic
environment.
9a46894335be49f0b9cab28d755aaa9cd
98571b275bbb0adb405e6931e856ca3e
5e569edd135285482
9a46894335be49f0b9cab28d755aaa9cd985
71b275bbb0adb405e6931e856ca3e5e569ed
d135285482
Central to the growth of e-commerce and egovernance is the issue of trust in electronic
environment.
Message 2
Same Key
SYMMETRIC
Encrypted Message 2
a520eecb61a770f947ca856cd675463f1c95a
9a2b8d4e6a71f80830c87f5715f5f59334978
dd7e97da0707b48a1138d77ced56feba2b46
7c398683c7dbeb86b854f120606a7ae1ed93
4f5703672adab0d7be66dccde1a763c736cb
9001d0731d541106f50bb7e54240c40ba780
[Keys of a pair Public and Private]
b7a553bea570b99c9ab3df13d75f8ccfdddea
af3a749fd1411
Different Keys
ASYMMETRIC
[PKI]
Encrypted Message 2
a520eecb61a770f947ca856cd675463f1
c95a9a2b8d4e6a71f80830c87f5715f5f5
9334978dd7e97da0707b48a1138d77ce
d56feba2b467c398683c7dbeb86b854f1
20606a7ae1ed934f5703672adab0d7be
66dccde1a763c736cb9001d0731d5411
06f50bb7e54240c40ba780b7a553bea5
70b99c9ab3df13d75f8ccfdddeaaf3a749
fd1411
Message 2
Encryption
Caesar Cipher
The shift is linear and equidistributed
I agree
lcdjuhh
i+3=l
Space=c [+3]
Key Cipher
The shift is linear (cyclic)
k.n.gupta 62
k+2=m
(dot)=e [+6]
n=w [+9]
269
3 changes
Char
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
. (Dot)
Space
mewam3rzjba
1
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
2
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
3
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
4
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
a b
b c
c d
5
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
c
d
e
6
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
c
d
e
f
7
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
c
d
e
f
g
8
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
c
d
e
f
g
h
9
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
.
a
b
c
d
e
f
g
h
i
[2048 bit]
Private Key
3082
06d3
d854
463d
b35f
cf42
6c89
b4f8
04e3
010a
0d59
0aa5
1ef0
5a22
b2f0
2aca
cdf9
459e
0282
bd3e
2586
b92c
97ec
1cd5
da33
f400
a146
0101
c1ce
94ed
345f
199b
5ffb
1379
84b6
2840
00b1
4367
6356
8c7c
c105
6bed
c255
5742
8102
d311
018a
ff70
4c08
68fd
6856
8ced
859d
0301
e079
21a8
6ca3
299d
e6b7
7b39
9cbb
32a8
0001
5543
efbc
a119
4055
a991
2c72
f2cb
f92a
0708
ccd0
d278
eb3c
942c
38b0
5b10
54fb
4ccb
a2cc
be68
7d83
e478
ee93
f82e
ff78
0542
b055
2a44
deb5
4824
a9d3
6135
41bc
00e2
9653
5e2f
f0f7
1a25
7b77
c629
bd71
0d83
8466
cfcc
8a83
193a
3ceb
4c2a
28f4
Public Key
3082
0673
d8b4
463d
b35f
cf42
6c89
b4f8
04de
01e4
0d59
0aa5
1df0
5a22
b250
2aca
cdf9
45de
f267
bf3e
2586
b92c
97ec
1cd5
da33
f400
af46
0142
c1ce
94ed
345f
199b
5ffb
1379
84b6
2240
0f61
4367
6356
8c7c
c105
6bed
c255
5742
8410
dd12
012a
ff70
4c08
68fd
6856
8ced
859d
02f1
e089
11a8
6ca3
299d
e6b7
7b39
9cbb
32a8
0001
5547
efbc
a119
4055
a991
2c72
f2cb
f92a
0f08
ccd0
d278
eb3c
942c
38b0
5b10
54fb
4ccb
a2cc
be68
7d83
e478
ee93
f82e
ff78
0542
b055
2a44
deb5
4824
a9d3
6135
41bc
00e2
9653
5e2f
f0f7
1a25
7b77
c629
bd71
0d83
8466
cfcc
8a83
193a
3ceb
4c2a
28f4
463d
0500
185e
0ea1
eb95
7103
d02a
bb90
e493
da44
47bc
4cb4
9c39
a938
63d1
bcff
bab6
4980
3ab1
3aa5
0a8a
4a16
6559
9634
463d
0500
185e
0ea1
eb95
7103
d02a
bb90
e493
da44
47bc
4cb4
9c39
a938
63d1
bcff
bab6
4980
3ab1
3aa5
0a8a
4a16
6559
9634
ALGORITHMS USED
SHA Algorithm
A hash value of plaintext is generated by a hash
function of the form
H=h(M)
The output of compression function is a new chain
Value h=h0..=h7 . We can write compression function
as
h=compress(h,m,s,t)
To calculate hash of a message greater than 512-bits
(16 32-bit words), BLAKE-256 compression function is
used iteratively as follows:
h0IV
For i=0,..,N-1
h (i+1) compress(hi ,mi ,s, li)
Return hN
FUTURE SCOPE
Bibliography
http://
ieeexplore.ieee.org/xpl/abstractAuthors.jsp?arnumber
=5966415
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&
arnumber=6137143&url=http%3A%2F%2Fieeexplore.ieee
.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6137143
1)http://ieeexplore.ieee.org/xpl/articleDetails.jsp?t
p=&arnumber=6021216&queryText%3DRSA+Algorithm
http
://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arn
umber=4659731&queryText%3DRSA+Algorithm
http
://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arn
umber=6516389&queryText%3DRSA+Algorithm
http
://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnu
mber=6027423&queryText%3Ddigital+signature
http