K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
EXPERIMENT NO.: 3
AIM: Implementation of digital signature using Virtual lab.
LEARNING OBJECTIVES:
To verify the working of digital signature scheme and to observe how a receiver can
verify integrity of the message in public key setting.
Link:
https://cse29-iiith.vlabs.ac.in/exp/digital-signatures/index.html
REQUIREMENTS: Desktop Computer/Laptop
THEORY:
Digital Signatures Scheme
A Digital Signature is an authentication mechanism that enables the creator of the
message to attack a code that acts as a signature. The signature is formed by taking
the hash of the message and encrypting the message with the creator's private key.
The signature guarantees the source and integrity of the message.
About the experiment:
In Public key setting, it becomes difficult to verify for a receiver whether message is
originated from claimed source.
In this experiment, we show how a receiver can verify integrity of the message in
public key setting.
1
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
Digital Signature Process
General idea of DSS
2
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
Key Generation
Before signing a message to any entity, Alice (the signee) must generate keys and
announce the public keys to the public
Choose a prime p, between 512 and 1024 bits in length.
The number of bits in p must be a multiple of 64.
Choose a 160-bit prime q in such a way that q divides (p-1).
Choose a primitive root e0 in Zp .
Create e1 such that : e1 = e0(p-1)/q mod p .
Chose d as private key and calculate e2 = e1d.
Alice’s public key Pk is (e1, e2, p, q); Private key is d.
Signing
3
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
Verifying
4
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
PROCEDURE:
Step 1: Enter the input text to be encrypted in the 'Plaintext' area and generate hash
value for message by clicking on the SHA-1 button
Step 2: Copy content of Hash Output (hex) field and paste it in Input to RSA
(hex) field.
Step 3: Select key size of public key from RSA Public key section by clicking on any
key button.
Step 4: Click on Apply RSA button to generate a digital signature.
SIMULATION:
5
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
6
K. K. Wagh Institute of Engineering Education & Research, Nashik.
Department of Electronics and Telecommunication Engineering
TITLE: Experiment Write-up (EW)
Doc. No.: NS/CL/EW/10(3)
Subject: Elective-II Lab (304198) (E): Network Security Lab
CONCLUSION: