Digital Signature Seminar Report

download Digital Signature Seminar Report

of 20

Transcript of Digital Signature Seminar Report

  • 7/28/2019 Digital Signature Seminar Report

    1/20

    CONTENTS

    1. Introduction. ..5

    2. Basic Requirements. ..6

    2.1. Private Key.2.2. Public Key.

    2.3. Digital Signature Certificate.

    3. Digital Signature Algorithm. ..8

    3.1. Signature Generation.

    3.2. Signature Verification.

    3.3. Secure Hash Algorithm.

    4. DSA parameters. .114.1. Specification of parameters.

    4.2. Generation of parameters.

    4.3. Signature Generation.

    4.4. Signature Verification.

    5. Example. .13

    6. Applications of Digital Signature. .16

    7. Drawbacks of using digital signature. .17

    8. Legal Aspects of Digital Signature. .18

    8.1. Secure Digital Signature.

    8.2. Rules for Certifying Authority.

    9. Appendix. .209.1. Proof for Signature Verification.

    10. Bibliography. .22

    1

  • 7/28/2019 Digital Signature Seminar Report

    2/20

    1. INTRODUCTION

    The authenticity of many legal, financial, and other documents is determined by the

    presence or absence of an authorized handwritten signature. The recipient of the signed

    document can verify the claimed identity of the sender using the signature. Also, if the sender

    later repudiates the contents of the document, then recipient can use the signature to prove the

    validity of the document.

    With the computerized message systems replacing the physical transport of paper and

    ink documents, an effective solution for authentication of the electronic data is necessary.

    Various methods have been devised to solve this problem, but the use of digital signature is

    definitely the best solution amongst them.

    A digital signature is nothing but an attachment to any piece of electronic information,

    which represents the content of the document and the identity of the originator of thatdocument uniquely. The digital signature is intended for use in electronic mail, electronic funds

    transfer, electronic data interchange, software distribution, data storage, and other applications

    which require data integrity assurance and data origin authentication.

    When a message is received, the recipient may desire to verify that the message has not

    been altered in transit. Furthermore, the recipient may wish to be certain of the originator's

    identity. Both of these services can be provided by the digital signature. A digital signature is

    an electronic analogue of a written signature in that the digital signature can be used in proving

    to the recipient or a third party that the message was, in fact, signed by the originator. Digital

    signatures may also be generated for stored data and programs so that the integrity of the data

    and programs may be verified at any later time.

    Although there are various approaches to implement the digital signature, this report

    discusses the Digital Signature Standard. It specifies the Digital Signature Algorithm (DSA)

    which is appropriate for applications requiring a digital rather than written signature. The DSA

    is considered as the standard procedure to generate and verify digital signatures. A DSA digital

    signature is a pair of large numbers represented in a computer as strings of binary digits.

    The first section of this report deals with the basic requirements for using the digitalsignature. The next sections contain detailed explanation of the process of generation and

    verification of the digital signature. In addition to this the applications of the digital Signature

    are also discussed. The report also focuses on some legal aspects of digital signature, with

    reference to the Information Technology Act. The use of digital signature has been illustrated

    with an example in a practical scenario.

    2

  • 7/28/2019 Digital Signature Seminar Report

    3/20

    This report is an attempt to make the readers familiar with the concepts related to the

    digital signature and give them an idea of usefulness of a digital signature in the world of

    electronic information exchange.

    2. BASIC REQUIREMENTS

    Any individual who wishes to use the digital signature must have a unique private key

    for generation of the signature. The recipients who receive digitally signed messages must havethe public key, corresponding to the private key used for the generation of the digital signature,

    for verification of the signature. Also the recipients must obtain the digital signature certificate

    which acts as a proof of the association between the public key and the private key. Once all

    these requirements are satisfied, then only the subscriber can use the digital signature.

    Figure 2.1

    2.1. Private Key.The private key is one which is accessible only to the signer. It is used to generate the

    digital signature which is then attached to the message. It is very important to have a unique

    private key for each user, so that the signature generated by that key for a given message can

    not be duplicated by any other key.

    The security of a digital signature system is dependent on maintaining the secrecy of

    users' private keys. Users must therefore guard against the unauthorized acquisition of their

    private keys.

    2.2. Public Key.The public key is made available to all those who receive the signed messages from the

    sender. It is used for verification of the received message. Although the public key is uniquely

    associated with the private key, there is no recognizable similarity between them. This is done

    purposefully to avoid discovery of the private key from the public key. Thus the holder of a

    3

  • 7/28/2019 Digital Signature Seminar Report

    4/20

    public key can just verify the message received from the sender. Any person who digitally

    signs his messages must distribute the public key to the recipients of his messages, so that they

    can verify the validity of these messages.

    2.3. Digital Signature Certificate.

    A subscriber of the private key and public key pair makes the public key available to all

    those who are intended to receive the signed messages from the subscriber. But in case of anydispute between the two sides, there must be some entity with the receiver which will allow the

    receiver of the message to prove that the message was indeed sent by the subscriber of the key

    pair. This can be done with the Digital Signature Certificate. This certificate lists the

    subscribers public key. So, it acts as a binding between the private and public keys. Any

    message verified by the public key listed on the certificate is implicitly assumed to be signed

    and sent by the corresponding subscriber.

    A digital signature certificate is issued by the Certifying Authority to the applicants. For

    obtaining this certificate the applicant must produce the private key and public key pair before

    the certifying authority. After checking the functioning of the key pair the certifying authorityissues a certificate to the applicant.

    Figure 2.3.1

    4

  • 7/28/2019 Digital Signature Seminar Report

    5/20

    3. DIGITAL SIGNATURE ALGORITHM

    The digital signature algorithm specifies the procedure to generate and verify the digital

    signature.

    3.1. Digital Signature Generation.

    Figure 3.1.1

    The above diagram shows the process of Digital Signature Generation. It

    consists of following steps:-

    1. The user of Digital Signature can use this facility optionally. So if he chooses to send the

    message without a signature, then the message is directly send to the other end. But, if he

    wishes to digitally sign the message, then he is asked for the Private Key by the digital

    signature Generation system.

    2. A Secure Hash Algorithm (SHA) is used in the signature generation process to obtain a

    condensed version of message, called a message digest. The SHA is such that itgenerates different message digest for each different message. In other words, no two

    messages have the same message digest.

    3. The DSA sign unit accepts the message digest from the SHA and the private key from

    the user. Then a digital signature is generated as a function of both, the private key and

    the message digest. Number of other parameters called as DSA parameters, are also used

    in this process. These parameters are discussed in details in the next section.

    5

  • 7/28/2019 Digital Signature Seminar Report

    6/20

    4. Once a signature is generated, it is attached to the original message. Then this message is

    send to the other end.

    3.2. Digital Signature Verification.

    Figure 3.2.1

    The above diagram shows the process of Digital Signature Verification. It consists of

    following steps:-

    1. A user can receive messages from different senders. Some of them may be using a digital

    signature and some may not. If a message is not digitally signed then the user accepts it without

    any verification. But in case of digitally signed message, he can verify the message with the

    help of public key corresponding to the sender.

    2. The received message is fed to the SHA for generation of the message digest. The SHA used

    by the receiver must be same as that used by the sender. So, if the message content remains

    unaltered during the transport, then SHA will generate the same message digest.

    3. The DSA verify unit accepts the message digest from the SHA and the public key from thereceiver. Using the DSA parameters, public key, message digest the received digital signature

    is verified. If the signature gets verified, then integrity of the message as well as the identity of

    sender is confirmed. But if it doesnt get verified, then either the message has been corrupted

    during the transport or the private key used is not matching with the public key. In either case

    the message is considered invalid and should be rejected by the receiver.

    6

  • 7/28/2019 Digital Signature Seminar Report

    7/20

    3.3. Secure Hash Algorithm.

    This Standard specifies a Secure Hash Algorithm (SHA), for computing a condensed

    representation of a message or a data file. When a message of any length < 264 bits is input, the

    SHA produces a 160-bit output called a message digest. The message digest can then be input

    to the Digital Signature Algorithm (DSA) which generates or verifies the signature for themessage. Signing the message digest rather than the message often improves the efficiency of

    the process because the message digest is usually much smaller in size than the message. The

    same hash algorithm must be used by the verifier of a digital signature as was used by the

    creator of the digital signature.

    Figure 3.3.1

    The SHA is called secure because it is computationally infeasible to find a message

    which corresponds to a given message digest, or to find two different messages which produce

    the same message digest. Any change to a message in transit will, with very high probability,

    result in a different message digest, and the signature will fail to verify.

    7

  • 7/28/2019 Digital Signature Seminar Report

    8/20

    4. DSA PARAMETERS

    4.1. Specification of parameters.

    The DSA (Digital Signature Algorithm) makes use of the following parameters:

    1. p is a prime number, where 2L-1 < p < 2L for 512

  • 7/28/2019 Digital Signature Seminar Report

    9/20

    4.3. Signature Verification.

    Prior to verifying the signature in a signed message, p, q and g plus the sender's public key and

    identity are made available to the verifier in an authenticated manner.

    Let M', r' and s' be the received versions of M, r, and s, respectively, and let y be the public keyof the signatory. To verifier first checks to see that 0 < r' < q and 0 < s' < q; if either condition

    is violated the signature shall be rejected. If these two conditions are satisfied, the verifier

    computes

    w = (s')-1 mod q

    u1 = ((SHA (M') w) mod q

    u2 = ((r') w) mod q

    v = (((g)u1 (y)u2 ) mod p) mod q.

    If v = r', then the signature is verified and the verifier can have high confidence that the

    received message was sent by the party holding the secret key x corresponding to y. For a proof

    that v = r' when M' = M, r' = r, and s' = s, see Appendix1.

    If v does not equal r', then the message may have been modified, the message may have been

    incorrectly signed by the signatory, or the message may have been signed by an impostor. The

    message should be considered invalid.

    .

    9

  • 7/28/2019 Digital Signature Seminar Report

    10/20

    5. EXAMPLE

    In order to integrate all the above concepts related to the digital signature, we consider apractical scenario as an example.

    Suppose there is a XYZ company, which is a client of ABC consultancy. XYZ seeks

    advice from ABC in the company matters. They used to communicate with each other through

    letters for many years. Now, with the computerization of XYZ, they decide to use electronic

    media for information exchange. Since the information exchanged by the two parties is of

    professional importance, they decide to use some authentication protocol, so that reliable

    communication is possible. The representatives from ABC and XYZ conduct a meeting and

    decide the use of digital signature, as a means of authentic message transport. To establish the

    digital signature system they perform the following actions,

    1. Each party contacts the authority responsible for allocating the private and public key.

    By paying the required amount, each of them gets a unique key pair.

    2. Then each of them makes an application to the Certifying Authority for getting the

    Digital Signature Certificate for the public key of other party.

    3. The Certifying authority asks the applicants to produce the private key corresponding to

    the public key, to be listed in the digital signature certificate, i.e. for ABC to obtaincertificate for the public key of XYZ, it should ask XYZ to produce its private key and

    public key before the concerned Certifying Authority.

    4. The Certifying Authority verifies the functioning of the key pair i.e. they are capable of

    generation and verification of digital signature.

    5. On confirming the working of key pair, it issues a Digital Signature Certificate to the

    applicant.

    6. Now the company XYZ has the Certificate, which lists the public key of ABC. While

    ABC has the Certificate, which lists the public key of XYZ.

    7. They install the software necessary for generation and verification of each others digital

    signature. This software must be same for both the parties, so that they use the same

    hashing algorithm.

    10

  • 7/28/2019 Digital Signature Seminar Report

    11/20

    8. With this set-up they are ready to use the digital signature with their messages. Each

    party can sign the messages by using the private key and the recipient party can verify

    these messages using the corresponding public key, listed on the digital signature

    certificate.

    To understand how this system behaves in different circumstances we consider

    number of cases of usage of this system.

    CASE 1:

    Company XYZ needs an advice from ABC consultancy regarding the financial strategy

    of the company. So, it creates a message addressed to ABC and attaches the digital signature to

    the message using the correct private key. ABC receives the message from XYZ, and it applies

    the public key of XYZ to the message. Suppose the message gets verified.

    Conclusion: Since the message got verified, ABC is assured that the message was sent by

    XYZ and the content of that message is intact since it was sent by XYZ.

    CASE 2:On receiving the above message, ABC decides to send an advice to XYZ. So, ABC

    writes a message addressed to XYZ and uses its private key to generate the digital signature.

    On receiving this message XYZ applies the corresponding public key and verifies the message.

    It finds that the signature gets verified.

    Conclusion: Verification of the message is an indication of the authenticity of the sender and

    integrity of the data. Thus XYZ can safely assume that it has an unmodified message from

    ABC only, and no one else.

    CASE 3:

    Suppose company XYZ takes action according the advice given by ABC consultancy

    and XYZ has to suffer a major financial loss due this action. XYZ holds ABC responsible for

    the loss and wants to take legal action against ABC. Thus XYZ files a case in the court,

    accusing ABC for giving wrong advice and demands compensation for the loss suffered. The

    consultancy ABC denies giving such advice to XYZ. The court asks XYZ to prove their claim

    against ABC.

    Then XYZ produces the copy of message received from ABC and the Digital signature

    certificate, which lists the public key of ABC. It shows that the signature on the message getsverified by ABCs public key, so that message was indeed sent by ABC. The court accepts the

    claim of XYZ and orders ABC to give compensation to XYZ.

    Conclusion: A digital signature can be used to prove the identity of the sender to a third party.

    CASE 4:

    11

  • 7/28/2019 Digital Signature Seminar Report

    12/20

    A company LMN is a business rival of XYZ and it knows about the communication of

    XYZ with consultancy ABC. So LMN sends a fake message, containing a false advice, to XYZ

    pretending to be ABC. On receiving this message, XYZ verifies it with the public key of ABC.

    It finds that the signature doesnt get verified. So, it rejects the message considering it as

    invalid. Thus it is saved from getting wrong advice.

    Conclusion: Any message not signed by the proper private key will not get verified by the

    public key corresponding to the correct private key.

    CASE 5:

    Failing to mislead XYZ, LMN now decides to use some different method. By some

    means LMN manages to modify the content of a message send by ABC to XYZ. When XYZ

    receives the message and verifies it with the public key, it finds that message is invalid. Thus it

    rejects the advice. So again XYZ is safeguarded from the attempt to intrude into the

    communication. XYZ immediately informs ABC about the rejection of the message and asks

    them to resend the message.

    Conclusion: Although the proper private key is used to generate message, if the messagecontent gets modified, then the message digest generated at the receiver end is different, due to

    which the signature will never get verified.

    CASE 6:

    With the failure of one more attempt to misinform the company XYZ, LMN decides to

    steal the private key from ABC and somehow it succeeds in obtaining it. LMN writes a

    message to XYZ in the disguise of ABC and digitally signs the message using the stolen key.

    On receiving the message, XYZ verifies the digital signature and finds it to be a valid one.

    Thus it accepts the advice and acts accordingly. Following the wrong advice it suffers loss and

    XYZ accuses ABC for the loss. The court finding the valid signature accepts the claim of XYZ

    and ABC is asked to give compensation.

    Conclusion: Security of the private key is responsibility of the key holder. If the key is lost,

    then the key owner will be responsible for the damage made using the key.

    On the Basis of all the above cases we can conclude that a Digital Signature can protect

    the subscribers from any attempts of forgery, provided that the private key is kept in a securemanner. Also this system is considered valid in the legal matters. So using digital signature is

    definitely an excellent option for preserving the integrity of data and authenticity of the user

    identity.

    12

  • 7/28/2019 Digital Signature Seminar Report

    13/20

    6. APPLICATIONS OF DIGITAL SIGNATURE

    The scope of Digital Signature is not just limited to exchange of messages. The

    handwritten signature is commonly used in all kinds of applications to prove the identity of the

    signer. In the same way, a digital signature can be used for all kinds of electronic records. Any

    field in which the integrity and validity of the data is crucial, can make use of a Digital

    Signature. Here we discuss a few of these applications.

    1. Electronic Mail.

    When we send an e-mail to a mailbox, it is desired that the owner of the mailbox should

    get the e-mail in its original form. If during transport, the content changes either accidentally or

    due to intrusion by a third party, then the receiving end should be able to recognize this change

    in the content. Also no person should be able to send e-mail in the disguise of another person.

    Both these factors are taken care of by the Digital signature. Any change in the e-mail will

    affect the message digest generated by the SHA and thus the digital signature will be marked asunverified. So the recipient will reject that message.

    2. Data storage.

    This is one more interesting application of Digital Signature. Suppose a large amount of

    data is stored on a computer. Only authorized people are allowed to make changes to the data.

    In such case, along with the data, a signature can also be stored as an attachment. This

    signature is generated from the data digest and the private key. So if any changes are made in

    the data by some unauthorized person, then they will get easily recognized at the time of

    signature verification and thus that copy of data will be discarded.

    3. Electronic funds transfer.

    Applications like online banking, e-commerce come under this category. In these

    applications the information being exchanged by the two sides is vital and thus extreme secrecy

    and authenticity must be maintained. A digital signature can ensure the authentication of the

    information but, the secrecy should be maintained by using some encryption techniques. So

    13

  • 7/28/2019 Digital Signature Seminar Report

    14/20

    before generating the message digest, the message should be encrypted. Then the digital

    signature is generated and attached to the message. At the receiving end after verification of

    signature, the message is decrypted to recover the original message.

    5. Software Distribution.

    Software developers often distribute their software using some electronic media, for

    example, the internet. In this case, in order to ensure that the software remains unmodified and

    its source is genuine, Digital Signature can be used. The developer signs the software and the

    users verify the signature before using it. If signature gets verified, then only the users can be

    sure about the validity of that software.

    7. DRAWBACKS OF USING DIGITAL SIGNATURE

    Although the digital signature technique is a very effective method of maintaining

    integrity and authentication of data, there are some drawbacks associated with this method.

    They are discussed in this section.

    1. The private key must be kept in a secured manner. The loss of private key can cause

    severe damage since, anyone who gets the private key can use it to send signed messages

    to the public key holders and the public key will recognize these messages as valid and

    so the receivers will feel that the message was sent by the authentic private key holder.

    2. The process of generation and verification of digital signature requires considerable

    amount of time. So, for frequent exchange of messages the speed of communication willreduce.

    3. When the digital signature is not verified by the public key, then the receiver simply

    marks the message as invalid but he does not know whether the message was corrupted

    or the false private key was used.

    4. For using the digital signature the user has to obtain private and public key, the receiver

    has to obtain the digital signature certificate also. This requires them to pay additional

    amount of money.

    5. If a user changes his private key after every fixed interval of time, then the record of all

    these changes must be kept. If a dispute arises over a previously sent message then the

    old key pair needs to be referred. Thus storage of all the previous keys is another

    overhead.

    14

  • 7/28/2019 Digital Signature Seminar Report

    15/20

    6. Although digital signature provides authenticity, it does not ensure secrecy of the data.

    To provide the secrecy, some other technique such as encryption and decryption needs to

    be used.

    8. LEGAL ASPECTS OF DIGITAL SIGNATURE

    In various countries the complete process of using digital signature has been

    standardized, under the protection of law. The Information Technology Act of India has

    number of sections which define the Digital Signature Standard. The rules for the certifying

    authorities such as, the process of obtaining a license to issue the digital signature certificate,

    have been mentioned under this act. Few of these provisions have been discussed below to get

    an idea of legal recognition of digital signature.

    8.1. Secure digital signature

    If, by application of a security procedure agreed to by the parties concerned, it can

    be verified that a digital signature, at the time it was affixed, was:-

    (a) unique to the subscriber affixing it.

    (b) capable of identifying such subscriber.

    (c) created in a manner or using a means under the exclusive control of the subscriber and is

    linked to the electronic record to which it relates in such a manner that if the electronic recordwas altered the digital signature would be invalidated, then such digital signature shall be

    deemed to be a secure digital signature.

    8.2. Rules for Certifying Authority.

    15

  • 7/28/2019 Digital Signature Seminar Report

    16/20

    8.2.1. Certifying Authority to follow certain procedures.

    Every Certifying Authority shall,

    (a) make use of hardware, software and procedures that are secure from intrusion and misuse.

    (b) provide a reasonable level of reliability in its services which are reasonably suited to the

    performance of intended functions.

    (c) adhere to security procedures to ensure that the secrecy and privacy of the digital signatures

    are assured.

    (d) observe such other standards as may be specified by regulations.

    (e) ensure that every person employed or otherwise engaged by it complies, in the course of his

    employment or engagement, with the provisions of this Act, rules, regulations and orders made

    there under.

    8.2.2. Certifying Authority to issue Digital Signature Certificate.

    (1) Any person may make an application to the Certifying Authority for the issue of a Digital

    Signature Certificate in such form as may be prescribed by the Central Government.

    (2) Every such application shall be accompanied by such fee as may be prescribed by the

    Central Government, to be paid to the Certifying Authority.

    (3) Every such application shall be accompanied by a certification practice statement or where

    there is no such statement, a statement containing such particulars, as may be specified byregulations.

    (4) On receipt of an application the Certifying Authority may, after consideration of the

    Certification practice statement or the other statement and after making such enquiries as it

    may deem fit, grant the Digital Signature Certificate or for reasons to be recorded in writing,

    reject the application.

    Provided that no Digital Certificate shall be granted unless the Certifying Authority is satisfied

    that-

    (a) the application holds the private key corresponding to the public key to be listed in the

    Digital Signature Certificate.

    (b) the applicant holds a private key, which is capable of creating a digital signature.

    (c) the public key to be listed in the certificate can be used to verify a digital signature affixed

    by the private key held by the applicant.16

  • 7/28/2019 Digital Signature Seminar Report

    17/20

    Provided further that, no application shall be rejected unless the applicant has been given a

    reasonable opportunity of showing cause against the proposed rejection.

    9. APPENDIX

    9.1. Proof of Signature Verification.

    The purpose of this appendix is to show that if M' = M, r' = r and s' = s in the signature

    verification, then v = r'. Where, M is the sent message, the pair of numbers r and s is signatureof the message M. M' is the received message, r' and s' is the received signature.

    Before proving the final result, we state and prove following lemma.

    Lemma:

    Let p and q be primes so that q divides p 1, h a positive integer less than p, and

    g = h (p-1)/q mod p.

    Then g q mod p = 1, and if m mod q = n mod q, then g m mod p = g n mod p.

    Proof:

    We have,

    g q mod p = (h (p- 1)/ q mod p) q mod p

    17

  • 7/28/2019 Digital Signature Seminar Report

    18/20

    = h (p-1) mod p

    = 1 by Fermat's Little Theorem.

    Now let m mod q = n mod q, i.e., m = n + k.q for some integer k. Then

    g m mod p = g (n+k.q) mod p

    = (g n .g k.q) mod p

    = ((g n mod p) . (g q mod p) k) mod p

    = g n mod p

    Since, g q mod p = 1.

    We are now ready to prove the main result.

    THEOREM:

    If M' = M, r' = r, and s' = s in the signature verification, then v = r'.

    Proof: We have,

    w = ( s' ) -1 mod q = s-1 mod q

    u1 = ( ( SHA(M') ) w ) mod q = ( (SHA(M) ) w ) mod q

    u2 = ( r' . w ) mod q = ( r . w ) mod q.

    Now y = g x mod p,

    So that by the lemma,

    v = ( ( g u1 y u2 ) mod p ) mod q

    = ( ( g SHA(M) . w . y r . w ) mod p) mod q

    = ( ( g SHA(M) . w . g x .r. w ) mod p) mod q

    = ( ( g ( SHA(M)+x.r ) . w ) mod p ) mod q.

    Also,

    18

  • 7/28/2019 Digital Signature Seminar Report

    19/20

    s = ( k-1( SHA(M) + x.r ) ) mod q.

    Hence,

    w = ( k . ( SHA(M) + x.r ) -1 ) mod q

    ( SHA(M) + x.r ) .w mod q = k mod q.

    Thus by the lemma,

    v = (gk mod p) mod q = r = r'.

    Hence the theorem is proved.

    10. BIBLIOGRAPHY

    10.1. Books.

    1. Computer Networks Third Edition, by Andrew S. Tanenbaum, PHI.

    2. Internet Security Second Edition, by Derek Atkins.

    10.2. Web Sites.

    1. What is a Digital Signature?, http://www.youdzone.com/signature.html .

    2. Digital Signature Literature, http://rechten.kub.nl/simone/ds-lit.html .

    3. Secure Hash Algorithm, http://www.itl.nist.gov/fipspubs/fip180-1.html .

    4. Digital Signature Standard, http://www.itl.nist.gov/fipspubs/fip186.html .

    5. Information Technology Act 2000, India,

    19

    http://www.youdzone.com/signature.htmlhttp://rechten.kub.nl/simone/ds-lit.htmlhttp://www.itl.nist.gov/fipspubs/fip180-1.htmlhttp://www.itl.nist.gov/fipspubs/fip186.htmlhttp://www.youdzone.com/signature.htmlhttp://rechten.kub.nl/simone/ds-lit.htmlhttp://www.itl.nist.gov/fipspubs/fip180-1.htmlhttp://www.itl.nist.gov/fipspubs/fip186.html
  • 7/28/2019 Digital Signature Seminar Report

    20/20

    http://unpan1.un.org/intradoc/groups/public/ documents/apcity/unpan002090.pdf

    6. Digital Signature Tutorial, www.commerce.state.ut.us/digsig/tutorl.html .

    20

    http://www.commerce.state.ut.us/digsig/tutorl.htmlhttp://www.commerce.state.ut.us/digsig/tutorl.html