Information Security message M one-way hash fingerprint f = H(M)

Slides:



Advertisements
Similar presentations
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
Public Key Management and X.509 Certificates
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Chapter 31 Network Security
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Networks Management and Security Lecture 3.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer and Network Security - Message Digests, Kerberos, PKI –
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 10: Certificates and Hashes.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Security Outline Encryption Algorithms Authentication Protocols
Public-Key Cryptography and Message Authentication
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Message Security, User Authentication, and Key Management
ICS 454 Principles of Cryptography
Public Key Infrastructure
Secure Electronic Transaction (SET) University of Windsor
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Intro to Cryptography Some slides have been taken from:
Protocol ap1.0: Alice says “I am Alice”
ICS 454 Principles of Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Encryption INST 346, Section 0201 April 3, 2018.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Bishop: Chapter 10 Key Management: Digital Signature
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 3 - Public-Key Cryptography & Authentication
Introduction to Modern Cryptography
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 8 roadmap 8.1 What is network security?
Cryptography Lecture 26.
Presentation transcript:

Information Security message M one-way hash fingerprint f = H(M) 9/19/2018 6:53 AM Information Security message M one-way hash fingerprint f = H(M) 9/19/2018 6:53 AM Information Security

Outline and Reading Digital signatures One-way hash functions Definition (§10.2.2) RSA signature and verification (§10.2.3) One-way hash functions Definition (§10.3.1) Applications (§10.3.2) Key distribution Certificates (§10.3.5) Revocation (§10.3.5) 9/19/2018 6:53 AM Information Security

Digital Signature A digital signature is a string S associated with a message M and the author A of M that has the following properties Integrity: S establishes that M has not been altered Nonrepudiation: S unequivocally identifies the author A of M and proves that A did indeed sign M A digital signature scheme provides algorithms for Signing a message by the author Verifying the signature of a message by the reader A recently passed law in the US gives digital signatures the same validity of handwritten signatures A public-key cryptosystem yields a digital signature scheme provided encrypt(KE, decrypt(KD, M)) = M Signature: Alice (author) computes S = decrypt(KD,M) using her private key KD and sends the pair (M,S) to Bob Verification: Bob (reader) computes M´ = encrypt(KE, S) using Alice’s public key KE and checks that M´ = M 9/19/2018 6:53 AM Information Security

RSA Digital Signature Setup: Keys: Signature: Verification: Setup: n = pq, with p and q primes e relatively prime to f(n) = (p - 1) (q - 1) d inverse of e in Zf(n) Keys: Public key: KE = (n, e) Private key: KD = d Signature: Message M in Zn Signature S = Md mod n Verification: Check that M = Se mod n Setup: p = 5, q = 11 n = 511 = 55 f(n) = 410 = 40 e = 3 d = 27 (327 = 81 = 240 + 1) Keys: Public key: KE = (55, 3) Private key: KD = 27 Signature: M = 51 S = 5127 mod 55 = 6 Verification: S = 63 mod 55 = 216 mod 55 = 51 9/19/2018 6:53 AM Information Security

One-Way Hash Function A one-way hash function is a function H with the following properties M maps a string M of arbitrary length into an integer f = H(M) with a fixed number of bits, called the fingerprint or digest of M H can be computed efficiently Given an integer f, it is computationally infeasible to find a string M such that that H(M) = d Given a string M , it is computationally infeasible to find another string M´ such that H(M) = H(M´) (collision resistance) It is computationally infeasible to find two strings M and M´ such that H(M) = H(M´) (strong collision resistance) Two widely used one-way hash functions are MD5 (Message Digest 5, 1992), which uses a 128-bit (16 bytes) fingerprint SHA-1 (Secure Hash Algorithm 1, 1995), which uses a 160-bit (20 bytes) fingerprint 9/19/2018 6:53 AM Information Security

Coin Flipping Over the Net Alice and Bob want to flip a random coin by communicating over the internet The following protocol, based on a one-way hash function H, ensures the fairness of the outcome Alice picks a random integer x, computes the fingerprint f = H(x) and sends f to Bob Bob sends to Alice his guess of whether x is odd or even Alice announces the result of the coin flip: heads if Bob has guessed correctly and tails otherwise Alice sends to Bob integer x as a proof of the outcome of the flip Bob verifies that f = H(x) Because of the strong-collision resistance property, it is computationally infeasible for Alice to cheat 9/19/2018 6:53 AM Information Security

Digitally Signed Fingerprints In the RSA digital signature scheme with modulus n, the message to be signed must be an integer in Zn , i.e., the message should have at most b = log n bits To overcome the above restriction on the message length, we can use the fingerprint f = H(M) of the message instead of the message itself, where H is a one-way hash function Alice computes first f = H(M) and then the signature S of f Bob first computes f = H(M) and then verifies S Since the one-way hash function H has the collision-resistance property, it is computationally infeasible to modify the message M while preserving the signature of the fingerprint f = H(M) message M one-way hash fingerprint f = H(M) sign signature S = f d mod n 9/19/2018 6:53 AM Information Security

Certificates Public-key cryptography is based on the knowledge by each participant of the public key of the other participants It is complicated to securely distribute the public keys of all the participants A certificate is a message of the type (name, public key) signed by a third-party Public-key infrastructure (PKI) An entity trusted by all the participants, called certification authority (CA), issues to each participant a certificate (Name, KE) that authoritatively binds the participants to their public keys Only the CA’s public key needs to be distributed securely Before sending an encrypted message to Bob or verifying a message digitally signed by Bob, Alice determines Bob’s public key KE by using Bob’s certificate (Bob, KE) 9/19/2018 6:53 AM Information Security

Web Server Certificates A Web server certificate is used to authenticate the public key of a Web server Fields of a Web server certificate Serial number Hash and signature schemes (e.g., MD5 and RSA) Issuer (certification authority) Period of validity (from, to) Subject (URL and organization) Public key The SSL (secure socket layer) protocol uses Web server certificates to provide encryption and authentication in a secure Web connection (https) 9/19/2018 6:53 AM Information Security

Certificate Revocation In certain circumstances, a certificate may have to be revoked before its expiration date The private key of the subject has been compromised The certificate was incorrectly issued by the CA Certificate Revocation List (CRL) Time-stamped list of all the unexpired certificates that have been revoked by the CA Periodically published and signed by the CA When presented with a certificate, one should Verify the CA’s signature on the certificate Check that the certificate has non been revoked by searching in the latest available CRL By default, Web browsers do not check the revocation status of a Web server certificate, which poses a security risk 9/19/2018 6:53 AM Information Security