Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Jens Groth BRICS, University of Aarhus Cryptomathic
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Attacks on Digital Signature Algorithm: RSA
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Årskonference 2003 Theory and Practice of Personal Digital Signatures - The ITSCI project Ivan Damgård, University of Aarhus.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
8. Data Integrity Techniques
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Topic 22: Digital Schemes (2)
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Password Mistyping in Two-Factor Authenticated Key Exchange Vladimir KolesnikovCharles Rackoff Bell LabsU. Toronto ICALP 2008.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
Computer and Network Security - Message Digests, Kerberos, PKI –
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
COM 5336 Lecture 8 Digital Signatures
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Cryptography and Network Security Chapter 13
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 13 Digital Signature
One Time Signature.
Presentation transcript:

Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.

Outline Motivation Revised Definition of Security Protocol Securely Realizing our definition Proof of Security Proactive Security

Motivation for better security Hi Bob SignatureHi Bob

Motivation for mobility We want Alice to be able to use any computer. No or low trust in the computer used. No key material on the computer used.

Outline Motivation Revised Definition of Security Protocol Securely Realizing our definition Proof of Security Proactive Security

Definition of Security Using the Universal Composability framework Ideal world: Definition of the security Real world: Our protocol Prove by simulation some equavalense between the two worlds

Ideal Functionality for digital signatures Ran Canetti [C05]

Intuition behind F SIG The simulator generates keys –This makes F SIG general and not related to the specific algorithms. F SIG is acting like a storage: –Signing: Messages get recorded. –Verification: If the message has been recorded then it is accepted. If the signer (Alices computer) is corrupted everything can be verified.

F M-SIG : Revised Edition of F SIG We want the human user “U” to decide if a message should be signed and thereby verified.

Outline Motivation Revised Definition of Security Protocol Securely Realizing F M-SIG Proof of Security Proactive Security

Idear behind our protocol

1’st approach Assume that the adversary at most controls one of {MD,T,S} Use RSA signatures Additive secret share the users private exponent: d = d 1 + d 2 Assume that keys are set up beforehand.

2’nd approach Why 2’nd: –We implemented it. –It was a bit slow. Assume that the mobile device has limited computational power (No exponentiation) We want to give privacy back to the user. –This one is easy: RSA signatures already use hashing, so just send the has to the server.

mUmU m d MD dSdS K K m pwd m m ok δ MD δ MD = d MD + F K (H(m)) σ MD, H(m), pwd σSσS σ MD = H(m) mod N δ MD σ S = H(m) mod N d S -F K (H(m)) σ = σ MD × σ S mod N = H(m) mod N d MD + F K (H(m)) + d S - F K (H(m))

Outline Motivation Revised Definition of Security Protocol Securely Realizing our definition Proof of Security Proactive Security

Sketch of security proof Reduction R: If an adversary A can break our protocol, then R can use A to break standard RSA signatures. Given: –a RSA-oracle O, which provide a public key, and will sign message. –an Adversary, that can break the security of our protocol. R produces a signature on a message, never sent to O.

Sketch of reduction Flip coin c: –0: Guess A will corrupt S d S = random number mod n Simulate: σ MD from σ, m and d S –Calculate σ S –σ MD = σ × σ S -1 mod n –1: Guess A will corrupt MD or T d MD = random number mod n Simulate: σ S from σ, m and d MD –Calculate δ MD and σ MD –σ S = σ × σ MD -1 mod n If the guess was wrong: “Bad luck”, but only polynomial “bad luck”

Outline Motivation Revised Definition of Security Protocol Securely Realizing our definition Proof of Security Proactive Security

Proactive security Corrupted parties, can recover Nice property in our protocol. Changes to the protocol: –Assume deletion is possible on MD and S. –Assume all parties are honest during recovery –User U has a Paillier secret key. –The server S has d encrypted under the Paillier public key.

Proactive security (Sketch) Recover the computer T: –Make a new password pwd Recover MD or S: –MD and S, deletes d MD and d S –S selects random d S and uses the homomorphic property of Paillier to make an encryption of a new d MD –Send the encryption of d MD to MD.

Sketch of security proof We cannot just make a guess, like in the non-proactive case. –Not a polynomial reduction Solution: Rewind A –But: m, that A can sign by itself may have been send to O before rewinding. Solution: A is polynomial => m would be send to O at polynomial time after a rewind, and A would be rewinded in this particular run. Try to guess and rewind before m would have been send to O Similar to proof by [ADN06] Tighter reduction is possible, requires more complex protocol.

Conclusion etc. We proposed a revised definition of security for digital signatures We proposed a proactive protocol in this revised security definition. Part of the ITSCI project. Prototype.