Chapter 13 Digital Signature Schemes Pages 463-468, 485, 488 Digital Signatures
Chapter 13 Digital Signature Schemes Pages 463-468, 485, 488 Digital Signatures
Chapter 13 Digital Signature Schemes Pages 463-468, 485, 488 Digital Signatures
Module 13.1
Ravi Sandhu
© Ravi Sandhu
World-Leading Research with Real-World Impact!
1
Private-Key vs Public-Key
Encryption
slide 3, module 12.1
© Ravi Sandhu
World-Leading Research with Real-World Impact!
2
Private-Key MAC vs Public-
Key Digital Signature
© Ravi Sandhu
World-Leading Research with Real-World Impact!
3
Private-Key MAC vs Public-
Key Digital Signature
© Ravi Sandhu
World-Leading Research with Real-World Impact!
4
Public-Key Encryption vs
Public-Key Digital Signature
Public-key encryption
Sender uses receiver's public key to encrypt
Receiver uses their own private (secret) key to decrypt
Public-key signature
Sender uses their own private (secret) key to sign
Receiver uses sender’s public key to verify
© Ravi Sandhu
World-Leading Research with Real-World Impact!
5
Public-Key Digital Signature
© Ravi Sandhu
World-Leading Research with Real-World Impact!
6
Public-Key Digital Signature
© Ravi Sandhu
World-Leading Research with Real-World Impact!
7
Hash and Sign Paradigm
© Ravi Sandhu
World-Leading Research with Real-World Impact!
8
Hash and Sign Paradigm
© Ravi Sandhu
World-Leading Research with Real-World Impact!
9
Digital Certificates and
Public-Key Infrastructure
page 485
© Ravi Sandhu
World-Leading Research with Real-World Impact!
10
Certificate Chains
© Ravi Sandhu
World-Leading Research with Real-World Impact!
11
Certificate Expiry
and Revocation
© Ravi Sandhu
World-Leading Research with Real-World Impact!
12