Digital Signatures Scheme

  1. Digital signature cannot provide __ for the message

    • (a) Integrity
    • (b) Confidentiality
    • (c) Non-repudiation
    • (d) Authentication
  2. Digital signature uses __ for generating valid signature

    • (a) Private key (KprivK_{priv})
    • (b) Public key (KpubK_{pub})
    • (c) Secret key (KsecretK_{secret})
    • (d) None of the above
  3. Verification Algorithm uses __ for validating digital signature

    • (a) Private key (KprivK_{priv})
    • (b) Public key (KpubK_{pub})
    • (c) Secret key (KsecretK_{secret})
    • (d) None of the above
  4. Is digital signature scheme possible without public key cryptography?

    • (a) Yes
    • (b) No
    • (c) May exist
    • (d) None of the above
  5. Explain the importance of Hashing (using experiment) and explain why Hashing is needed

    Consider the digital signature process: Signature=Sign(H(M),Kpriv)\text{Signature} = \text{Sign}(H(M), K_{priv}) Verification=Verify(S,H(M),Kpub)\text{Verification} = \text{Verify}(S, H(M), K_{pub})

    Where:

    • MM = Original message
    • H(M)H(M) = Hash of the message
    • KprivK_{priv} = Private key
    • KpubK_{pub} = Public key
    • SS = Digital signature
  6. Suggest a scheme that does not use any hashing scheme

    Propose an alternative digital signature scheme and discuss:

    • Security implications
    • Performance considerations
    • Practical limitations

    Mathematical representation: Signature=Sign(M,Kpriv)\text{Signature} = \text{Sign}(M, K_{priv})

  7. Explain why digital signature schemes work

    Discuss the mathematical foundations including:

    • Asymmetric Key Properties: How KpubK_{pub} and KprivK_{priv} are mathematically related
    • One-way Functions: The computational difficulty of deriving KprivK_{priv} from KpubK_{pub}
    • Hash Function Properties:
      • Collision resistance: H(x)=H(y)x=yH(x) = H(y) \Rightarrow x = y
      • Preimage resistance: Given hh, finding xx such that H(x)=hH(x) = h is computationally infeasible
    • Digital Signature Algorithm (DSA) security proof outline