Introduction to Signcryption November 22, 2004. 22/11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Attacks on Digital Signature Algorithm: RSA
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptographic Technologies
Public Key Algorithms 4/17/2017 M. Chatterjee.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 13 Digital Signature
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Bob can sign a message using a digital signature generation algorithm
By Abhijith Chandrashekar and Dushyant Maheshwary.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography, Authentication and Digital Signatures
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
COM 5336 Lecture 8 Digital Signatures
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography and Network Security Chapter 13
Key Exchange References: Applied Cryptography, Bruce Schneier
Chapter 13 Digital Signature
Presentation transcript:

Introduction to Signcryption November 22, 2004

22/11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made the communication between people, who have never met before over an open and insecure network in a secure and authenticated way, possible !

22/11/2004 Signcryption Signature-Then-Encryption Before sending a message out, the sender has to do the following:  sign it using a Digital Signature (DS) scheme  encrypt the message and the signature using a private key encryption algorithm under randomly chosen message encryption key  encrypt the random message encryption key using the receiver’s public key  send the message

22/11/2004 Signcryption Signature-Then-Encryption Some Problems with This Approach:  consumes machine cycles  introduces “extended” bits to original messages  requires a comparable amount of time for signature verification and decryption  cost of delivering a message is essentially the sum of the cost for digital signature and that for encryption!

22/11/2004 Signcryption The Question is …. Is it possible to send a message of arbitrary length with cost less than that required by signature-then-encryption?

22/11/2004 Signcryption Discovery In 1997, Yuliang Zheng from Monash University in Australia has discovered a new cryptography primitive called “signcryption”.

22/11/2004 Signcryption What is Signcryption? “Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditional “signature and encryption” approach.” Two Schemes  Digital Signature  Public Key encryption

22/11/2004 Signcryption Why Signcryption?  Based on discrete algorithm problem Signcryption costs 58% less in average computation time 70% less in message expansion  Using RSA cryptosystem Signcryption costs on average 50% less in computation time 91% less in message expansion

22/11/2004 Signcryption Signcryption–Implementation Can be implemented using:  ElGamal’s Shortened Digital Signature Scheme  Schnorr’s Signature Scheme  Any other digital signature schemes in conjunction with a public key encryption scheme like DES & 3DES This choice would be made based on the level of security desired by the users.

22/11/2004 Signcryption Signcryption – Implementation Using ElGamal’s Shortened Digital Signature Scheme (SDSS)

22/11/2004 Signcryption SDSS Proposed by ElGamal  enables one person to send a digitally signed message to another person  the receiver can verify the authenticity of this message  uses the private key of the sender to sign the message  the receiver uses the sender’s public key to verify the signature

22/11/2004 Signcryption SDSS Proposed by ElGamal How it is implemented!

22/11/2004 Signcryption SDSS - Proposed by ElGamal How It is Implemented The variables involved are: m – the message p – a large prime number q – a large prime factor of p [1,…,p-1] g - an integer with order q modulo p [1,..,p-1] x – a number chosen uniformly at random from the range 1,…,q-1 x a – Alice’s private key chosen randomly from the range 1,..,q-1 y a – Alice’s public key y a = gx a mod p

22/11/2004 Signcryption SDSS - Proposed by ElGamal How It is Implemented... Continued  Alice computes the component r by applying a hash function on the message m

22/11/2004 Signcryption SDSS - Proposed by ElGamal How It is Implemented... Continued  She computes the component s, using her private key

22/11/2004 Signcryption SDSS - Proposed by ElGamal How It is Implemented... Continued  The two components r and s are sent to Bob along with the message m  In receiving r and s, Bob uses r, s and Alice’s public key to obtain the value k  He applies a hash of the message using k and verifies that it is equal to r

22/11/2004 Signcryption SDSS - Proposed by ElGamal How It is Implemented... Continued  Bob accepts the message only if the hash of m and k gives him the same message m that he has received from Alice  This will ensure that Alice has digitally signed the message

22/11/2004 Signcryption Public Key Encryption  ciphertext = encrypt( plaintext, PK )  plaintext = decrypt( ciphertext, PK -1 ) PK is the public key PK -1 is the private key

22/11/2004 Signcryption Signcryption – How It Works Using ElGamal’s SDSS and a public key encryption

22/11/2004 Signcryption Signcryption – How It Works Parameters public to all p – a large prime number q – a large prime factor of p-1 g – an integer with order q modulo p chosen randomly from [1,…,p-1] Hash – a one-way hash function whose output has, say, at least 128 bits KH – a keyed one-way hash function (E, D) – the encryption and decryption algorithms of a private key cipher Alice’s keys x a – Alice’s private key, chosen uniformly at random from [1,…,q-1] y a – Alice’s public key (y a = g x a mod p) Bob’s keys x b – Bob’s private key, chosen uniformly at random from [1,…,q-1] y b – Bob’s public key (y b = g x b mod p) Parameters for Signcryption

22/11/2004 Signcryption Signcryption – How It Works Steps to Signcrypt Messages  chooses a value x from the large range 1,…,q-1  uses Bob’s public key and the value x, and computes the hash of it  It gives her a 128 bit string  splits this 128-bit value k into two 64-bit halves (k 1,k 2 )  (key pair)

22/11/2004 Signcryption Signcryption – How It Works Steps to Signcrypt Messages...(Continued)  encrypts the message m using a public key encryption scheme E with the key k 1  the cipher text c  c = Ek 1 ( m )  uses the key k 2 in the one-way keyed hash function KH to get a hash of the message m  128-bit called r  r = KHk 2 ( m )

22/11/2004 Signcryption Signcryption – How It Works Steps to Signcrypt Messages...(Continued)  computes the value of s - like in SDSS She does this using: the value of x her private key x a the value of r s = x/ (r + x a ) mod q

22/11/2004 Signcryption Signcryption – How It Works Steps to Signcrypt Messages...(Continued)  Now Alice has three different values (c, r and s)  She has to send these three values to Bob to complete the transaction  She can do this in a couple of ways: send them all at one time send them separately using secure transmission channels, which would increase security NOW, the message is Signcrypted!

22/11/2004 Signcryption Signcryption – How It Works Steps to Signcrypt Messages...(Continued)

22/11/2004 Signcryption Signcryption – How It Works Steps to Unsigncrypt Messages  receives the 3 values that Alice has sent to him (c, r, s)  to compute a hash, he uses the values of r and s, his private key x b, Alice’s public key y a & p and g  This would give him 128-bit result k = hash((ya * gr)s*x b mod p)

22/11/2004 Signcryption Signcryption – How It Works Steps to Unsigncrypt Messages...(Continued)  This 128-bit hash result is split into two 64- bit halves ( k 1, k 2 )  (key pair)  This key pair would be identical to the key pair that was generated while signcrypting the message  Bob uses the key k 1 to decrypt the cipher text c, which will give him the message m m = Dk 1 ( c )

22/11/2004 Signcryption  Bob does a one-way keyed hash function (KH) on m using the key k 2 and compares the result with the value r he has received from Alice  If match  the message m was signed and sent by Alice  If not match  the message wasn't signed by Alice or was intercepted and modified by an intruder  Bob accepts the message m if and only if KHk 2 (m) = r Signcryption – How It Works Steps to Unsigncrypt Messages...(Continued)

22/11/2004 Signcryption Features of Digital Signcryption  Unique Unsigncryptability message m of arbitrary length is Signcrypted using Signcryption algorithm This gives you a Signcrypted output c The receiver can apply Unsigncryption algorithm on c to verify the message m This Unsigncryption is unique to the message m and the sender

22/11/2004 Signcryption Features of Digital Signcryption  Security Two security schemes - Digital Signature - Public Key encryption - likely to be more secure ensures that the message sent couldn’t be forged ensures the contents of the message are confidential ensures non-repudiation

22/11/2004 Signcryption Features of Digital Signcryption  Efficiency Computation involved when applying the Signcryption, Unsigncryption algorithms and communication overhead is much smaller than signature-then-encryption schemes

22/11/2004 Signcryption Signcryption Security

22/11/2004 Signcryption Signcryption Security  Unforgeability : Bob is in the best position to be able to forge any Signcrypted message from Alice! Bob can only obtain the message m by decrypting it using his private key X b Any changes he makes to the message m will reflect in the next step of Signcryption one-way keyed hash function on the message m will not match the value r! Bob, the prime candidate for this kind of attack, is prevented from forging Alice’s Signcrypted message

22/11/2004 Signcryption Signcryption Security  Confidentiality: An attacker has all three components of the Signcrypted message: c, r and s! He still can not get any partial information of the message m ! The attacker have to also know Bob’s private key, p and q (known only to Alice and Bob) Bad luck Attacker !!

22/11/2004 Signcryption Possible Applications of Signcryption

22/11/2004 Signcryption Possible Applications of Signcryption  Signcryption in WTLS Handshake Protocol Existing security is by Signature-then- Encryption or Encryption-then-Signature User certificate is sent without encryption or another cryptographic method Modified Signcryption is proposed as a solution

22/11/2004 Signcryption Possible Applications of Signcryption  Unforgeable Key establishment over ATM Network Transmitting encrypted keys over an ATM network is critical Existing security relies on key distribution system Modified Signcryption can solve the problem

22/11/2004 Signcryption Advantages and Disadvantages

22/11/2004 Signcryption Advantages of Signcryption  Low computational cost If one person is sending a signcrypted message to another, computational costs doesn’t matter much If signcryption of entire network traffic is considered, then computational power as well as savings in bandwidth are major factors

22/11/2004 Signcryption Advantages of Signcryption  Higher Security “If two security schemes are brought together would it increase or decrease the security?”

22/11/2004 Signcryption Advantages of Signcryption  Higher Security When two security schemes are combined, which by themselves are complex enough to withstand attacks, it can only lead to added security

22/11/2004 Signcryption Advantages of Signcryption  Higher Security X’ = {SDSS1,SDSS2,……} Y’ = {DES, 3DES, …..}

22/11/2004 Signcryption Advantages of Signcryption  Message Recovery To recover a message system of Alice must do one of the following: -keeps a copy of the signed and encrypted message as evidence of transmission -In addition to the above copy, keep a copy of the original message, either in clear or encrypted form

22/11/2004 Signcryption Advantages of Signcryption  Message Recovery A cryptographic algorithm or protocol is said to provide a past recovery ability if Alice can recover the message from the signed and encrypted message using only her private key While both Signcryption and “signature-then- encryption-with-a-static-key" provide past recovery but “signature-then-encryption" does not

22/11/2004 Signcryption Disadvantages of Signcryption

22/11/2004 Signcryption Disadvantages of Signcryption  In broadcasting a single Signcrypted message to multiple recipients  This approach is redundant in terms of bandwidth consumption and computational resource usage

22/11/2004 Signcryption Future Scenario of Signcryption

22/11/2004 Signcryption Conclusion…  Two birds in one stone  Combining two complex mathematical functions, you will increase the complexity and in turn increase security  Signcryption still has a long way to go before it can be implement effectively  Research is still going on to try to come up with a much more effective way of implementing this

22/11/2004 Signcryption