Digital Signatures Network Security.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security
Cryptography and Network Security
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptography and Network Security Chapter 13
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Secure Electronic Transaction (SET)
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
X. Digital Signatures and Authentication Protocols We begin this chapter with an overview of digital signatures, authentication protocol and Digital Signature.
Fall 2006CS 395: Computer Security1 Key Management.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
e-Health Platform End 2 End encryption
B. R. Chandavarkar CSE Dept., NITK Surathkal
Information and Network Security
Digital signatures.
NET 311 Information Security
Subject Name: NETWORK SECURITY Subject Code: 10EC832
Cryptography and Network Security
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
NETW4005 COMPUTER SECURITY - A
Bishop: Chapter 10 Key Management: Digital Signature
NET 311 Information Security
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Public-Key, Digital Signatures, Management, Security
Chapter -8 Digital Signatures
Chapter 3 - Public-Key Cryptography & Authentication
Basic of Modern Cryptography
Cryptanalysis Network Security.
One-way Hash Function Network Security.
Hash Function Requirements
Security Mechanisms Network Security.
Chapter 8 roadmap 8.1 What is network security?
Digital Signature Standard (DSS)
Confidentiality, Integrity, Nonrepudiation
A Model For Network Security
Security Attacks Network Security.
Message Authentication
Definition Of Computer Security
Presentation transcript:

Digital Signatures Network Security

Objectives of the Topic Digital Signatures Objectives of the Topic After completing this topic, a student will be able to explain the use of digital signatures.

Figures and material in this topic have been adapted from Digital Signatures Figures and material in this topic have been adapted from W. Stalling’s “Network Security Essentials ”, 2014. W. Stalling’s “Cryptography and Network Security Principles and Practice”, 2014.

Digital Signatures Data appended to a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient).

Digital Signatures Message authentication protects two parties who exchange messages from any third party. It does not protect the two parties against each other. Several forms of dispute bet. the two are possible.

Digital Signatures Suppose that John sends an authenticated message to Mary. Consider the following disputes that could arise.

Digital Signatures 1. Mary may forge a different message and claim that it came from John. Mary would simply have to create a message and append an authentication code using the key that John and Mary share.

Digital Signatures E.g. an electronic funds transfer takes place, and the receiver increases the amount of funds transferred and claims that the larger amount had arrived from the sender.

Digital Signatures 2. John can deny sending the message. Because it is possible for Mary to forge a message, there is no way to prove that John did in fact send the message.

Digital Signatures E.g. an electronic mail message contains instructions to a stockbroker for a transaction that subsequently turns out badly. The sender pretends that the message was never sent.

Digital Signatures In situations where there is not complete trust between sender and receiver, we use the digital signature.

Digital Signatures

Digital Signatures

Digital Signatures Properties It must verify the author and the date and time of the signature. It must authenticate the contents at the time of the signature. It must be verifiable by third parties, to resolve disputes.

Digital Signatures Attacks and Forgeries Assume that A denotes the user whose signature method is being attacked, and C denotes the attacker.

Digital Signatures Key-only attack: C only knows A’s public key. Known message attack: C is given access to a set of messages and their signatures

Digital Signatures Generic chosen message attack: C chooses a list of messages before attempting to breaks A’s signature scheme, independent of A’s public key. C then obtains from A valid signatures for the chosen messages.

Digital Signatures The attack is generic, because it does not depend on A’s public key; the same attack is used against everyone.

Digital Signatures Directed chosen message attack: Similar to the generic attack, except that the list of messages to be signed is chosen after C knows A’s public key but before any signatures are seen.

Digital Signatures Adaptive chosen message attack: C is allowed to use A as an “oracle.” This means that C may request from A signatures of messages that depend on previously obtained message-signature pairs.

Digital Signature Requirements Digital Signatures Digital Signature Requirements The signature must be a bit pattern that depends on the message being signed. The signature must use some information unique to the sender to prevent both forgery and denial.

Digital Signatures It must be relatively easy to produce the digital signature. It must be relatively easy to recognize and verify the digital signature.

Digital Signatures It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message.

Digital Signatures It must be practical to retain a copy of the digital signature in storage. End