As we have studied, signature is a way of authenticating the data coming from a trusted individual. Similarly, digital signature is a way of authenticating a digital data coming from a trusted source.
Digital Signature Standard (DSS) is a Federal Information Processing Standard(FIPS) which defines algorithms that are used to generate digital signatures with the help of Secure Hash Algorithm(SHA) for the authentication of electronic documents. DSS only provides us with the digital signature function and not with any encryption or key exchanging strategies.
Sender Side :
In DSS Approach, a hash code is generated out of the message and following inputs are given to the signature function –
- The hash code.
- The random number ‘k’ generated for that particular signature.
- The private key of the sender i.e., PR(a).
- A global public key(which is a set of parameters for the communicating principles) i.e., PU(g).
These input to the function will provide us with the output signature containing two components – ‘s’ and ‘r’. Therefore, the original message concatenated with the signature is sent to the receiver.
Receiver Side :
At the receiver end, verification of the sender is done. The hash code of the sent message is generated. There is a verification function which takes the following inputs –
- The hash code generated by the receiver.
- Signature components ‘s’ and ‘r’.
- Public key of the sender.
- Global public key.
The output of the verification function is compared with the signature component ‘r’. Both the values will match if the sent signature is valid because only the sender with the help of it private key can generate a valid signature.
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- Schnorr Digital Signature
- Types of Digital Signature Attacks
- Difference between Direct and Arbitrated Digital Signature
- Winternitz One Time Signature Scheme
- Lamport One Time Signature Scheme
- Interim Standard (IS) 95
- Data encryption standard (DES) | Set 1
- Standard Access-List
- Strength of Data encryption standard (DES)
- Digital Signatures and Certificates
- Digital Subscriber Line (DSL)
- What is DSU(Digital Service Unit)?
- Specification of Digital System
- Digital Certificate Creation
- Digital Design Process
- What is DAT(Digital Audio Tape)?
- Introduction to Digital Systems
- Implementation of Digital System
- Digital Watermarking and its Types
- Redundancy in Digital Image Processing
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.