25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Digital Signature St<strong>and</strong>ard (DSS)<br />

As mentioned previously, a hash value encrypted with the private key is called a<br />

digital signature <strong>and</strong> is illustrated in Figure 22-9.<br />

Message<br />

Figure 22-9 Generating a digital signature<br />

One authentication method that can be used with ISAKMP/Oakley is DSS, which<br />

was selected by NIST <strong>and</strong> NSA to be the digital authentication st<strong>and</strong>ard of the<br />

U.S. government. The st<strong>and</strong>ard describes the Digital Signature Algorithm (DSA)<br />

used to sign <strong>and</strong> verify signatures of message digests produced with SHA-1.<br />

The following steps provide a brief description of DSA:<br />

1. Choose a large prime number, p, usually between 512 <strong>and</strong> 1024 bits long.<br />

2. Find a prime factor q of (p-1), 160 bits long.<br />

3. Compute:<br />

g=h (p-1)/q mod p<br />

Where h is a number less than (p-1) <strong>and</strong> the following is true:<br />

h (p-1)/q >1<br />

4. Choose another number x, less than q, as the sender's private key.<br />

5. Compute:<br />

y=gx mod p<br />

And use that as the sender's public key. The pair (x,y) is sometimes referred<br />

to as the long-term key pair.<br />

790 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

Private key<br />

Hash<br />

Encryption<br />

Message<br />

function Digital<br />

digest<br />

signature<br />

(hash)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!