@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Infrastructure and Applications
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Topic 22: Digital Schemes (2)
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
DIGITAL SIGNATURE IMPLEMENTATION
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Information Security and Management 10. Other Public-key Cryptosystems Chih-Hung Wang Fall
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Cryptography and Network Security Chapter 13
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Digital Signatures.
Symmetric and Asymmetric Encryption
Key Exchange References: Applied Cryptography, Bruce Schneier
Network Security Unit-III
e-Health Platform End 2 End encryption
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Digital Signatures Last Updated: Oct 14, 2017.
Asymmetric Cryptography
The Application of Elliptic Curves Cryptography in Embedded Systems
Key Management Network Systems Security
El Gamal and Diffie Hellman
Lecture 6: Digital Signature
El Gamal and Diffie Hellman
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 13 Digital Signature
Cryptography and Network Security Chapter 13
Chapter 3 - Public-Key Cryptography & Authentication
Asymmetric Cryptographic Algorithms
Digital Signature Standard (DSS)
Diffie-Hellman Algorithm
LAB 3: Digital Signature
Presentation transcript:

@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012

@Yuan Xue 285 Network Security Digital Signature Overview Message Authentication Code Data integrity Source authentication Issue  Source can successfully claim they did not create a message Reason  Source and destination share the same key (same knowledge) Digital Signature Message authentication + non-repudiation Solution  Use of asymmetric key

@Yuan Xue 285 Network Security Digital Signature Two approaches Encryption of hash value via private key provides digital signature Any asymmetric encryption algorithm could be used  E.g. RSA Many asymmetric encryption algorithms have export restriction DSA (digital signature algorithm)-based approach

@Yuan Xue 285 Network Security Primitives for Digital Signature Algorithm Elgamal Digital Signature Based on discrete log operation  primitive root Signature has two components a is a primitive root of prime number p then a mod p, a 2 mod p, …, a p-1 mod p are distinct and consist of the integers from 1 through p-1 For any b and a primitive root a of p, unique exponent I can be found such that b = a i mod p (0<=i <= p-1)

@Yuan Xue 285 Network Security Digital Signature Algorithm An asymmetric key algorithm Can not be used for encryption Can ONLY be used for digital signature Algorithm Based on discrete log operation Global variables  p, q, g  Private key x  Public key y = g x mod p User per-msg secret num k Generate a random per-message value k where 0 < k < q Calculate r = (g k mod p) mod q Calculate s = (k −1 (H(m) + x·r)) mod q The signature is (r, s) Calculate w = s −1 mod q Calculate u1 = H(m)·w mod q Calculate u2 = r·w mod q Calculate v = ((g u1 ·y u2 ) mod p) mod q The signature is valid if v = r

@Yuan Xue 285 Network Security Digital Signature Algorithm

@Yuan Xue 285 Network Security Public-Key Algorithm Summary Encryption/ Decryption Digital Signature Key Exchange RSAYYY Diffie- Hellman NNY DSSNYN

@Yuan Xue 285 Network Security MAC and DS Summary Message Authentication Code CBC-based Hash-based  Encrypt the hash code  Hash the message + key HMAC CMAC and more.. Digital Signature Encrypt the hash code Digital signature standard Symmetric Key Encryption Asymmetric Key Encryption

@Yuan Xue 285 Network Security Comparison Computation efficiency Hash > symmetric encryption > asymmetric encryption Message Authentication Code CBC-based Hash-based  Encrypt the hash code  Hash the message + key HMAC Digital Signature Encrypt the hash code Digital signature standard faster