Sunday, October 7, 2007

Digital Signature Algorithm (DSA)

The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS), specified in FIPS 186 [1], adopted in 1993. A minor revision was issued in 1996 as FIPS 186-1 [2], and the standard was expanded further in 2000 as FIPS 186-2 [3].DSA is covered by U.S. Patent 5,231,668 , filed July 26, 1991, and attributed to David W. Kravitz, a former NSA employee. This patent was given to "The United States of America as represented by the Secretary of Commerce, Washington, D.C." and the NIST has made this patent available world-wide royalty-free. [4] Dr. Claus P. Schnorr claims that his U.S. Patent 4,995,082 covers DSA; this claim is disputed.Key generationKey generation has two phases. The first phase is a choice of algorithm parameters which may be shared between different users of the system:Choose a cryptographic hash function H. In the original DSS, H was always SHA-1, but stronger hash functions from the SHA family are also in use. Sometimes the output of a newer hash function is truncated to the size of an older one for compatibility with existing key pairs.Decide on a key length L. This is the primary measure of the cryptographic strength of the key. The original DSS constrained L to be a multiple of 64 between 512 and 1024 (inclusive). Later, FIPS-186-2, change notice 1 specifies that L should always be 1024. Later yet, NIST 800-57 recommends lengths of 2048 (or 3072) for keys with security lifetimes extending beyond 2010 (or 2030).Choose a prime q with the same number of bits as the output of H.Choose a L-bit prime p such that p–1 is a multiple of q.Choose g, a number whose multiplicative order modulo p is q. This may be done by setting g = h(p–1)/q mod p for some arbitrary h (1 < h="2" y =" gx" r =" (gk" s =" (k-1(H(m)" r="0" s="0The" w =" (s)-1" u1 =" (H(m)*w)" u2 =" (r*w)" v =" ((gu1*yu2)" v =" rDSA" g =" h(p–1)/q">1 and q is prime, g must have order q.The signer computesThusSince g has order q we haveFinally, the correctness of DSA follows from

1 comment:

Tee Chess said...

Thanks for the short description about this popular encryption algorithm which is used in the creation of digital signatures. This article quiet confused me as I am not a technical person.
electronic signatures