Digital Signatures Last Updated: Oct 14, 2017.

Slides:



Advertisements
Similar presentations
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Advertisements

Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Public Key Model 8. Cryptography part 2.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
IS 302: Information Security and Trust Week 5: Integrity 2012.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Network Security David Lazăr.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Public Key Encryption ● Diffie and Hellman – 1976 Famous Paper: New Directions In Cryptography New Directions In Cryptography ● First revolutionary.
Security Protecting information data confidentiality
Web Applications Security Cryptography 1
Overview of Cryptography
Basics of Cryptography
VNF Package Integrity and Authenticity – Public key based
Security Outline Encryption Algorithms Authentication Protocols
Symmetric and Asymmetric Encryption
Public-Key Cryptography and Message Authentication
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Cryptographic Hash Function
Asymmetric Cryptography
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Public-Key Cryptography and RSA
Public-key Cryptography
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Cryptography and Security Technologies
Cryptography.
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
Cryptography Lecture 26.
MAC: Message Authentication Code
ICS 454 Principles of Cryptography
Asymmetric Cryptography
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
Information Security message M one-way hash fingerprint f = H(M)
Security.
Cryptography: Basics (2)
Network Security (contd.)
Intro to Cryptography Some slides have been taken from:
ICS 454 Principles of Cryptography
Chapters 14,15 Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Chapter -8 Digital Signatures
Chapter 3 - Public-Key Cryptography & Authentication
Chapter 29 Cryptography and Network Security
Basic Network Encryption
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Cryptography Lecture 22.
Security: Integrity, Authentication, Non-repudiation
Cryptography Fundamentals
Presentation transcript:

Digital Signatures Last Updated: Oct 14, 2017

Digital Signatures Diagram illustrating how to digitally sign a message Why do we use a one-way hash? How does this relate to a collision or 2nd pre-image attack?

Digital Signatures What assurances do we get with a digital signature? Authentication Confidentiality Integrity Non-repudiation MAC vs. Digital Signature MAC does not offer non-repudiation. Why? With a MAC, either Alice or Bob could have generated the mac.

Message Authentication Three approaches Benefits of each? Drawbacks? Third option is broken, use HMAC

HMAC Government standard for HMAC H(K || H(K || M)) Prevents extension attack

Public Key Distribution Problem Symmetric encryption – exponential key distribution problem (n^2 key pairs for group of size n) Public keys – we all distribute our own public key (n keys) How can I trust that I have received your public key? Trusted third party hands out signed documents containing user ID and public key Signed documents are known as certificates

Digital Certificates Who has a digital certificate? Which private key is used to sign a certificate? Whose public key is in the certificate? What are common uses for certificates?

Performance of Crypto Primitives

Performance Test Goal: figure out the relative computing time for algorithms (one block) SHA-1 AES RSA Encrypt RSA Signature Order the above, fastest to slowest

Performance Test Average of 10, 000 iterations SHA-1 – 0.0017 ms AES – 0.0142 ms RSA encrypt – 0.3647 ms 3515x slower than a hash RSA signature – 5.9751 ms 8x slower than a hash 215x slower than a hash 26x slower than AES 421x slower than AES 16x slower than RSA enc.

Or: “How RSA should really be used” RSA Padding Or: “How RSA should really be used” (See PKCS #1)

RSA Primitives RSA Encryption : me = c (mod n) RSA Decryption : cd = m (mod n) Pitfalls of using RSA What if m is very small? Remember that e is usually small. Take the e’th root of c Brute force the domain of m Solution: RSA Padding Before encrypting/signing a key/hash, pad it so that it is a large number and comparable to the modulus n Implementation flaws – timing attacks Insert constant delays or binding RSA Labs publishes the standards for using RSA Public Key Cryptography Standard #1 (PKCS #1)