Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Public Key Management and X.509 Certificates
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Chapter 3 Encryption Algorithms & Systems (Part C)
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Diffie-Hellman Key Exchange
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
Introduction to Public Key Cryptography
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Attacks on Public Key Encryption Algorithms
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Chapter 13 Digital Signature
Presentation transcript:

Authentication and Digital Signatures CSCI 5857: Encoding and Encryption

Outline Authentication Digital signature concepts RSA digital signature scheme Attacks on digital signatures The Digital Signature Standard

3 Need for Authentication Authentication Problem: How can recipient be sure that message was sent by particular person? Masquerading as Alice “Give Darth a $10,000 raise -- Alice” E

4 Authentication Terminology: –Claimant: Entity desiring to prove their identity (real or fraudulent ) –Verifier: Entity checking identity of claimant

5 Digital Signatures Based on some signing algorithm –Algorithm applied to message (like message digest) –Message and signature sent to recipient –Recipient uses related algorithm to verify signature Must involve “secret knowledge” known only to signer –Otherwise, adversary could “forge” signature “I can’t create this”

6 Public Keys and Digital Signatures Signing algorithm involves private key –Public/private key pair generated by sender Opposite of public key encryption –Sender stores private key, gives public key to recipient Private key used to sign message Public key used to verify signature

7 Digital Signatures and Confidentiality Sender: –Signs message with sender private key –Encrypts message with recipient public key Recipient –Decrypts message with recipient private key –Verifies signature with sender public key Authentication Confidentiality

8 RSA Digital Signature Scheme Encryption/Decryption: –Encryption by sender: C = P e mod n –Decryption by recipient: P = C d mod n = P d  e mod n Digital signature just reverses order –Key pair generated in same way Public key: n, e Private key: d –Signature by sender: S = M d mod n –Verification by recipient: M = S e mod n = M d  e mod n –Works since d  e = e  d

9 RSA Digital Signature Scheme Recipient has sender’s public key Sent message M and signature S generated from M Uses key to “decrypt” signature S and compare to M

10 Attacks on Digital Signatures Known Message Attack –Adversary has intercepted several messages and their corresponding signatures. –Goal: Create fake message M´ and legitimate corresponding signature from those previous messages Chosen Message Attack –Adversary has ability to make sender sign messages that adversary chooses (“We like kittens”) –Goal: Choose those messages to make it possible to create fake message M´ and legitimate corresponding signature

11 Known Message Attack on RSA Based on multiplicative property of RSA –Darth intercepts message pairs (M 1, S 1 ) and (M 2, S 2 ) Computes M´ = M 1  M 2 Corresponding signature: S´ = S 1  S 2 –Idea: S´ = S 1  S 2 = (M 1 d  M 2 d ) mod n = (M 1  M 2 ) d mod n = M´ d mod n Darth now has fake message M´ and matching signature S´ without having to know Alice’s private key!

12 Known Message Attack on RSA Problem for Darth: Fake message M´ = M 1  M 2 almost certain to be meaningless –Darth can’t control messages M 1, M 2 –Bob will treat as noise and ignore M1M1 “Buy low” M2M2 “Sell high” M1  M2M1  M2 “9485h1342nf” ???

13 Chosen Message Attack on RSA Darth chooses messages M 1, M 2 such that: –M 1, M 2 appear harmless (and can convince sender to sign) –M 1  M 2 has advantage to Darth M1M1 “We like kittens” S1S1 M2M2 “YSU rules!” S2S2 M1  M2M1  M2 “Give Darth a raise” S1  S2S1  S2 Darth asks Alice to sign these Alice creates signatures using her private key Darth sends fake message and signature to Bob

14 Signing Message Digests Sender creates message digest Sender creates signature from digest –Much more efficient than signing entire message Recipient creates same message digest from received message Recipient verifies signature based on message digest

15 Chosen Message Attack on RSA Signing message digest h(M ) instead of message M provides resistance to multiplicative attacks –h(M ) must be preimage resistant hash function Why is this effective? Darth has a fake message M´ Can compute its digest h(M´ ) Can find digests h(M 1 ), h(M 2 ) such that h(M´ ) = h(M 1 )  h(M 2 ) Darth cannot find messages M 1, M 2 with the desired digests h(M 1 ), h(M 2 ) !

16 Digital Signature Standard NIST standard (FIPS 186) Algorithms: –SHA-512 hashing –Schnorr public key encryption scheme (similar to ElGamal)

17 DSS Components Global public key components (PU G ) –p : Large prime (between 512 and 1024 bits) –q : prime divisor of p -1 (approx. 160 bits) –g = h (p-1)/q mod p where h is some integer 1 Sender’s private key (PR a ) –Random integer < q Sender’s public key (PU a ) –PU a = g PRa mod p

18 Signing a Message Generate random one-time key k < q Compute components of message: –r = (g k mod p) mod q –s = [k -1 (H(M) + PU a )] mod q Signature = (r, s) Efficiency: only modular exponentiation is g k mod p which can be computed in advance

19 Verifying a Message w = s -1 mod q u 1 = [H(M) w] mod q u 2 = (r w) mod q v = [(g u1 PU a u2 ) mod p) mod q Verified if v = r