As we have studied, signature is a way of authenticating the data coming from a trusted individual. Similarly, digital signature is a way of authenticating a digital data coming from a trusted source.
Digital Signature Standard (DSS) is a Federal Information Processing Standard(FIPS) which defines algorithms that are used to generate digital signatures with the help of Secure Hash Algorithm(SHA) for the authentication of electronic documents. DSS only provides us with the digital signature function and not with any encryption or key exchanging strategies.
Sender Side :
In DSS Approach, a hash code is generated out of the message and following inputs are given to the signature function –
- The hash code.
- The random number ‘k’ generated for that particular signature.
- The private key of the sender i.e., PR(a).
- A global public key(which is a set of parameters for the communicating principles) i.e., PU(g).
These input to the function will provide us with the output signature containing two components – ‘s’ and ‘r’. Therefore, the original message concatenated with the signature is sent to the receiver.
Receiver Side :
At the receiver end, verification of the sender is done. The hash code of the sent message is generated. There is a verification function which takes the following inputs –
- The hash code generated by the receiver.
- Signature components ‘s’ and ‘r’.
- Public key of the sender.
- Global public key.
The output of the verification function is compared with the signature component ‘r’. Both the values will match if the sent signature is valid because only the sender with the help of it private key can generate a valid signature.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Direct and Arbitrated Digital Signature
- Types of Digital Signature Attacks
- Schnorr Digital Signature
- Difference between DSS and ESS
- Winternitz One Time Signature Scheme
- Lamport One Time Signature Scheme
- Standard Access-List
- Data encryption standard (DES) | Set 1
- Interim Standard (IS) 95
- Strength of Data encryption standard (DES)
- Difference between 802.16 and 802.11 standard
- Digital Signatures and Certificates
- Digital Subscriber Line (DSL)
- Integrated Services Digital Network (ISDN)
- Digital Forensics in Information Security
- Digital Certificate Creation
- Specification of Digital System
- Introduction to Digital Systems
- Implementation of Digital System
- Digital Design Process
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.