Digital Signatures Scheme
Digital signature cannot provide __ for the message
- (a) Integrity
- (b) Confidentiality
- (c) Non-repudiation
- (d) Authentication
Digital signature uses __ for generating valid signature
- (a) Private key ()
- (b) Public key ()
- (c) Secret key ()
- (d) None of the above
Verification Algorithm uses __ for validating digital signature
- (a) Private key ()
- (b) Public key ()
- (c) Secret key ()
- (d) None of the above
Is digital signature scheme possible without public key cryptography?
- (a) Yes
- (b) No
- (c) May exist
- (d) None of the above
Explain the importance of Hashing (using experiment) and explain why Hashing is needed
Consider the digital signature process:
Where:
- = Original message
- = Hash of the message
- = Private key
- = Public key
- = Digital signature
Suggest a scheme that does not use any hashing scheme
Propose an alternative digital signature scheme and discuss:
- Security implications
- Performance considerations
- Practical limitations
Mathematical representation:
Explain why digital signature schemes work
Discuss the mathematical foundations including:
- Asymmetric Key Properties: How and are mathematically related
- One-way Functions: The computational difficulty of deriving from
- Hash Function Properties:
- Collision resistance:
- Preimage resistance: Given , finding such that is computationally infeasible
- Digital Signature Algorithm (DSA) security proof outline