Digital Signatures Campbell R. Harvey Duke University, NBER and

Slides:



Advertisements
Similar presentations
Cryptography and Network Security
Advertisements

CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
ASYMMETRIC CIPHERS.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Bob can sign a message using a digital signature generation algorithm
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Asymmetric Key Signatures David Evans and Samee Zahur CS4501, Fall 2015.
Topic 22: Digital Schemes (2)
Cryptography Lecture 9 Stefan Dziembowski
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Lecture 2: Introduction to Cryptography
Elliptic curve cryptography ECC is an asymmetric cryptosystem based on the elliptic curve discrete log problem. The ECDLP arises in Abelian groups defined.
Elliptic Curve Cryptography
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Public Key Cryptosystem Introduced in 1976 by Diffie and Hellman [2] In PKC different keys are used for encryption and decryption 1978: First Two Implementations.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Web Security.
Overview Modern public-key cryptosystems: RSA
Public Key Cryptosystem
Cryptography Much of computer security is about keeping secrets
Public Key Encryption and Digital Signatures
What we know … and what we don’t know
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
IS3230 Access Security Unit 9 PKI and Encryption
Keys Campbell R. Harvey Duke University, NBER and
What we know … and what we don’t know
Campbell R. Harvey Duke University and NBER
asymmetric cryptography
Anonymity vs. Privacy Campbell R. Harvey Duke University, NBER and
Why Me? Campbell R. Harvey Duke University, NBER and
Asymmetric Cryptography
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Credit Cards Campbell R. Harvey Duke University, NBER and
The Application of Elliptic Curves Cryptography in Embedded Systems
Addresses Campbell R. Harvey Duke University, NBER and
What we know … and what know we don’t know
Campbell R. Harvey Duke University and NBER
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Addresses Campbell R. Harvey Duke University, NBER and
Lecture 4.1: Hash Functions: Introduction
CS 394B Introduction Marco Canini.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Campbell R. Harvey Duke University and NBER
Zero Knowledge Proofs Campbell R. Harvey Duke University, NBER and
Chapter 13 Digital Signature
One Time Signature.
Introduction to Modern Cryptography
Purpose: how do computers keep our information secret?
Diffie-Hellman Key Exchange
Digital Signature Standard (DSS)
Cryptography Lecture 26.
Campbell R. Harvey Duke University and NBER
Blockchain Tech Big Picture
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Campbell R. Harvey Duke University and NBER
Blockchain Tech Big Picture
How to Use Charm Crypto Lib
Presentation transcript:

Digital Signatures Campbell R. Harvey Duke University, NBER and November 23, 2016 Digital Signatures Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc

Two Keys Private and public keys Private key is sometimes known as the “signing key”. It is secret. Public key is mathematically linked to the private key With the private key (which could be a random number), it is easy to generate a public key With the public key, it is nearly impossible to generate the private key Public key is available for anyone to see Public key sometimes called the “verification key” Campbell R. Harvey 2016

Generating a signature We start with a message, M. I generate a key pair, SK (private or signing key) and VK (public or verification key) Message M and SK pass through a digital signature algorithm (DSA) to generate the digital signature or signed message SM. M DSA SM SK (private key) Campbell R. Harvey 2016

Generating a signature Verification Mathematically determine that I signed the message with my private key, SK, without knowing SK. Three ingredients: Message (M), digital signature (SM), verification or private key (VK) M SM DSA Valid? (Yes/No) VK (public key) Campbell R. Harvey 2016

Generating a signature Notice Proves that the person with the private key (that generated the public key) signed the message. Interestingly, digital signature is different from a usual signature in that it depends on the message, i.e. the signature is different for each different message In practice, we do not sign the message, we sign a cryptographic hash of the message. This means that the size of the input is the same no matter how long the message is. Campbell R. Harvey 2016

References The Math Behind Bitcoin Elliptic Curve Digital Signature Algorithm (Bitcoin) What does the curve used in Bitcoin, secp256k1, look like? Elliptic Curve Digital Signature Algorithm (Wikipedia) Elliptic Curve Cryptography (UCSB) Elliptic Curve Cryptography and Digital Rights Management (Purdue) Zero to ECC in 30 minutes (Entrust) The Elliptic Curve Cryptosystem Campbell R. Harvey 2016