tailieunhanh - Lecture Data security and encryption - Lecture 20: Digital Signatures
The contents of this chapter include all of the following: Digital signatures, ElGamal & Schnorr signature schemes, digital signature algorithm and standard, digital signature model, attacks and forgeries, digital signature requirements, direct digital signatures, ElGamal digital signature. | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 20 Review have considered: Message authentication requirements Message authentication using encryption MACs HMAC authentication using a hash function CMAC authentication using a block cipher Pseudorandom Number Generation (PRNG) using Hash Functions and MACs Chapter 12 summary. Chapter 13 – Digital Signatures Opening quote. To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence. Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical powers, or of disinfecting, so to speak, the tainted atmosphere by which they are supposed to be surrounded. —The Golden Bough, Sir James George Frazer Opening quote. Digital Signatures The most important development from the work on public-key cryptography is the digital signature Message authentication protects two parties who exchange messages from any third party However, it does not protect the two parties against each other either fraudulently creating, or denying creation, of a message The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who exchange messages from any third party. However, it does not protect the two parties against each other either fraudulently creating, or denying creation, of a message. A digital signature is analogous to the handwritten signature, and provides a set of security capabilities that would be difficult to implement in any other way. It must have . | Data Security and Encryption (CSE348) Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, by William Stallings, briefly reviewing the text outline from Ch 0, and then presenting the content from Chapter 1 – “Introduction”. Lecture # 20 Review have considered: Message authentication requirements Message authentication using encryption MACs HMAC authentication using a hash function CMAC authentication using a block cipher Pseudorandom Number Generation (PRNG) using Hash Functions and MACs Chapter 12 summary. Chapter 13 – Digital Signatures Opening quote. To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence. Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical .
đang nạp các trang xem trước