13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.

Slides:



Advertisements
Similar presentations
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
Asymmetric-Key Cryptography
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Chapter 13 Digital Signature
8. Data Integrity Techniques
Chapter 31 Network Security
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Rachana Y. Patil 1 1.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
11 Digital Signature.  Efficiency  Unforgeability : only signer can generate  Not reusable : not to use for other message  Unalterable : No modification.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
1 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
COM 5336 Lecture 8 Digital Signatures
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Cryptography and Network Security Chapter 13
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Asymmetric-Key Cryptography
Asymmetric-Key Cryptography
Computer Communication & Networks
NET 311 Information Security
Symmetric-Key Cryptography
Digital Signatures…!.
Chapter 13 Digital Signature
Chapter 29 Cryptography and Network Security
Symmetric-Key Cryptography
Presentation transcript:

13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature

13.2 Objectives  To define a digital signature  To define security services provided by a digital signature  To define attacks on digital signatures  To discuss some digital signature schemes, including RSA, ElGamal,  Schnorr, DSS, and elliptic curve  To describe some applications of digital signatures Chapter 13

COMPARISON Let us begin by looking at the differences between conventional signatures and digital signatures Inclusion Verification Method Relationship Duplicity 390 Topics discussed in this section:

13.4 A conventional signature is included in the document; it is part of the document. But when we sign a document digitally, we send the signature as a separate document Inclusion

13.5 For a conventional signature, when the recipient receives a document, she compares the signature on the document with the signature on file. For a digital signature, the recipient receives the message and the signature. The recipient needs to apply a verification technique to the combination of the message and the signature to verify the authenticity Verification Method

13.6 For a conventional signature, there is normally a one-to- many relationship between a signature and documents. For a digital signature, there is a one-to-one relationship between a signature and a message Relationship

13.7 In conventional signature, a copy of the signed document can be distinguished from the original one on file. In digital signature, there is no such distinction unless there is a factor of time on the document Duplicity

PROCESS Figure 13.1 shows the digital signature process. The sender uses a signing algorithm to sign the message. The message and the signature are sent to the receiver. The receiver receives the message and the signature and applies the verifying algorithm to the combination. If the result is true, the message is accepted; otherwise, it is rejected Need for Keys Signing the Digest Topics discussed in this section:

Continued Figure 13.1 Digital signature process

Need for Keys Figure 13.2 Adding key to the digital signature process A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key. Note

Continued A cryptosystem uses the private and public keys of the receiver: a digital signature uses the private and public keys of the sender. Note

Signing the Digest Figure 13.3 Signing the digest

SERVICES We discussed several security services in Chapter 1 including message confidentiality, message authentication, message integrity, and nonrepudiation. A digital signature can directly provide the last three; for message confidentiality we still need encryption/decryption Message Authentication Message Integrity Nonrepudiation Confidentiality Topics discussed in this section:

13.14 A secure digital signature scheme, like a secure conventional signature can provide message authentication Message Authentication A digital signature provides message authentication. Note

13.15 The integrity of the message is preserved even if we sign the whole message because we cannot get the same signature if the message is changed Message Integrity A digital signature provides message integrity. Note

Nonrepudiation Figure 13.4 Using a trusted center for nonrepudiation Nonrepudiation can be provided using a trusted party. Note

Confidentiality A digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. Figure 13.5 Adding confidentiality to a digital signature scheme Note

ATTACKS ON DIGITAL SIGNATURE This section describes some attacks on digital signatures and defines the types of forgery Attack Types Forgery Types Topics discussed in this section:

Attack Types Key-Only Attack Known-Message Attack Chosen-Message Attack

Forgery Types Existential Forgery Selective Forgery

DIGITAL SIGNATURE SCHEMES Several digital signature schemes have evolved during the last few decades. Some of them have been implemented RSA Digital Signature Scheme ElGamal Digital Signature Scheme Schnorr Digital Signature Scheme Digital Signature Standard (DSS) Elliptic Curve Digital Signature Scheme Topics discussed in this section:

RSA Digital Signature Scheme Figure 13.6 General idea behind the RSA digital signature scheme

13.23 Key Generation Key generation in the RSA digital signature scheme is exactly the same as key generation in the RSA Continued In the RSA digital signature scheme, d is private; e and n are public. Note

13.24 Signing and Verifying Continued Figure 13.7 RSA digital signature scheme

Continued As a trivial example, suppose that Alice chooses p = 823 and q = 953, and calculates n = The value of  (n) is Now she chooses e = 313 and calculates d = At this point key generation is complete. Now imagine that Alice wants to send a message with the value of M = to Bob. She uses her private exponent, , to sign the message: Example 13.1 Alice sends the message and the signature to Bob. Bob receives the message and the signature. He calculates Bob accepts the message because he has verified Alice’s signature.

13.26 RSA Signature on the Message Digest Continued Figure 13.8 The RSA signature on the message digest

Continued When the digest is signed instead of the message itself, the susceptibility of the RSA digital signature scheme depends on the strength of the hash algorithm. Note

ElGamal Digital Signature Scheme Figure 13.9 General idea behind the ElGamal digital signature scheme

13.29 Key Generation The key generation procedure here is exactly the same as the one used in the cryptosystem Continued In ElGamal digital signature scheme, (e 1, e 2, p) is Alice’s public key; d is her private key. Note

13.30 Verifying and Signing Continued Figure ElGamal digital signature scheme

Continued Here is a trivial example. Alice chooses p = 3119, e 1 = 2, d = 127 and calculates e 2 = mod 3119 = She also chooses r to be 307. She announces e1, e2, and p publicly; she keeps d secret. The following shows how Alice can sign a message. Example 13.2 Alice sends M, S 1, and S 2 to Bob. Bob uses the public key to calculate V 1 and V 2.

Continued Now imagine that Alice wants to send another message, M = 3000, to Ted. She chooses a new r, 107. Alice sends M, S 1, and S 2 to Ted. Ted uses the public keys to calculate V 1 and V 2. Example 13.3

Schnorr Digital Signature Scheme Figure General idea behind the Schnorr digital signature scheme

13.34 Key Generation Continued 1)Alice selects a prime p, which is usually 1024 bits in length. 2)Alice selects another prime q. 3)Alice chooses e 1 to be the qth root of 1 modulo p. 4)Alice chooses an integer, d, as her private key. 5)Alice calculates e 2 = e 1 d mod p. 6)Alice’s public key is (e 1, e 2, p, q); her private key is (d). In the Schnorr digital signature scheme, Alice’s public key is (e 1, e 2, p, q); her private key (d). Note

13.35 Signing and Verifying Continued Figure Schnorr digital signature scheme

13.36 Signing 1. Alice chooses a random number r. 2. Alice calculates S 1 = h(M|e 1 r mod p). 3. Alice calculates S 2 = r + d × S 1 mod q. 4. Alice sends M, S 1, and S Continued Verifying Message 1. Bob calculates V = h (M | e 1 S2 e 2 −S1 mod p). 2. If S 1 is congruent to V modulo p, the message is accepted;

Continued Here is a trivial example. Suppose we choose q = 103 and p = Note that p = 22 × q + 1. We choose e 0 = 2, which is a primitive in Z 2267 *. Then (p −1) / q = 22, so we have e 1 = 2 22 mod 2267 = 354. We choose d = 30, so e 2 = mod 2267 = Alice’s private key is now (d); her public key is (e 1, e 2, p, q). Example 13.4 Alice wants to send a message M. She chooses r = 11 and calculates e 2 r = = 630 mod Assume that the message is 1000 and concatenation means Also assume that the hash of this value gives the digest h( ) = 200. This means S1 = 200. Alice calculates S2 = r + d × S 1 mod q = × 200 mod 103 = 35. Alice sends the message M =1000, S 1 = 200, and S 2 = 35. The verification is left as an exercise.

Digital Signature Standard (DSS) Figure General idea behind DSS scheme

13.39 Key Generation. 1)Alice chooses primes p and q. 2)Alice uses and. 3)Alice creates e 1 to be the qth root of 1 modulo p. 4)Alice chooses d and calculates e 2 = e 1 d. 5)Alice’s public key is (e 1, e 2, p, q); her private key is (d) Continued

13.40 Verifying and Signing Continued Figure DSS scheme

Continued Alice chooses q = 101 and p = Alice selects e 0 = 3 and calculates e 1 = e 0 (p−1)/q mod p = Alice chooses d = 61 as the private key and calculates e 2 = e 1 d mod p = Now Alice can send a message to Bob. Assume that h(M) = 5000 and Alice chooses r = 61: Example 13.5 Alice sends M, S 1, and S 2 to Bob. Bob uses the public keys to calculate V.

13.42 DSS Versus RSA Computation of DSS signatures is faster than computation of RSA signatures when using the same p. DSS Versus ElGamal DSS signatures are smaller than ElGamal signatures because q is smaller than p Continued

Elliptic Curve Digital Signature Scheme Figure General idea behind the ECDSS scheme

13.44 Key Generation Key generation follows these steps: Continued 1)Alice chooses an elliptic curve E p (a, b). 2)Alice chooses another prime q the private key d. 3)Alice chooses e 1 (…, …), a point on the curve. 4)Alice calculates e 2 (…, …) = d × e 1 (…, …). 5)Alice’s public key is (a, b, p, q, e1, e2); her private key is d.

13.45 Signing and Verifying Continued Figure The ECDSS scheme

VARIATIONS AND APPLICATIONS This section briefly discusses variations and applications for digital signatures Variations Applications Topics discussed in this section:

Variations Time Stamped Signatures Sometimes a signed document needs to be time stamped to prevent it from being replayed by an adversary. This is called time-stamped digital signature scheme. Blind Signatures Sometimes we have a document that we want to get signed without revealing the contents of the document to the signer.