0% found this document useful (0 votes)
21 views3 pages

Лаб#5

lab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Лаб#5

lab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Лаб#5.

Digital Signatures using RSA


RSA is one of the first practicable public-key (asymmetric) cryptosystems. It involves two
different types of keys: a public key and a private key. The public key can be known by everyone
and is used for encrypting messages. The messages encrypted with the public key can only be
decrypted in a reasonable amount of time using the private key. The RSA key generation
involves prime number manipulation.

Digital signature is a mathematical scheme for demonstrating the authenticity of a digital


message or document. A valid digital signature gives a recipient reason to believe that: 1) the
message was created by a known sender (authentication), and 2) that the message was not altered
in transit (integrity). The second goal is achieved by generating a hash value of the given digital
document, and the first goal by signing the generated hash with the sender’s private key. The
process of producing and verifying a digital signature is shown in the figure below.

In this part of the lab, you will create an RSA key-pair in Cryptool and then use that key-pair to
sign and verify our MisteryText_decrypted.txt (Choose any simple the text).

1. In CrypTool, close all windows but MysteryText_decrypted.txt. Click on Digital


Signatures/PKI -> PKI -> Generate/Import Keys ….
2. Keep the RSA Algorithm option. Under User data, enter the following:
Last name: Smith
First name: Alice
Key identifier: Alice Key
PIN code: cryptool
PIN: cryptool
Click on Generate new key pair … button.

3. The below window will show up. Click OK.

4. Click on Show Key Pair. You will obtain a list of asymmetric key pairs that are available
within CrypTool. Select the key that we have just been created, and click on Show Public
Parameters.

The first 20 digits of Alice’s modulus are:___________________________________

The exponent of Alice’s public key is: _______________________________________

5. Back in the list of available asymmetric key pairs, click on Show Certificate to view
Alice Smith’s certificate.

Alice’s certificate has the following serial number: ____________________________

Alice’s certificate is valid for the following period: ____________________________

6. Close both dialogs – Certificate Data and Available Asymmetric Key Pairs.

7. To sign our MysteryText_decrytpted.txt, select Digital Signature/PKI -> Sign Document.


Choose Alice’s key to be used when signing. Enter the following:
Choose hash function: RIPEMD-160
Choose signature algorithm: RSA
Choose a key/PSE to be used when signing: Smith Alice
PIN code for chosen PSE: cryptool
To sign our MysteryText_decrytpted.txt, select Digital Signature/PKI -> Sign Document.
Click on Sign button. The signed document appears. The signature is placed at the start of
the document, followed by the actual document that has been signed (in this case,
followed by MysteryText_decrypted.txt).
8. To obtain a more clear presentation, with the separation of the signature and the
document, click on Digital Signature/PKI -> Extract Signature. After inspection, close
Extracted Signature window.
9. To check that the signed MysteryText_decripted.txt has not been altered, select Digital
Signature/PKI -> Verify Signature. Select Smith Alice from the list of signatures and
click on the Verify Signature button. The following dialog appears.

10. Now, in the RSA (RIPEMD160) signature of <MysteryText_decrypted> window modify


the message by deleting the word fox. Select Signature/PKI -> Verify Signature. Select
Smith Alice from the list of signatures and click on Verify Signature button. A dialog box
appears.

The message in the dialog box is: __________________________________

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy