Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Cryptography and Network Security Chapter 14
Cryptography and Network Security
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Cryptography and Network Security (CS435) Part Eleven (Digital Signatures and Authentication Protocols)
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Chapter3 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 13
Computer Science Public Key Management Lecture 5.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Applied Cryptography (Public Key) RSA. Public Key Cryptography Every Egyptian received two names, which were known respectively as the true name and the.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Data Security and Encryption (CSE348) 1. Lecture # 20 2.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
Cryptography and Network Security Chapter 10
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Scott CH Huang COM 5336 Lecture 7 Other Public-Key Cryptosystems Scott CH Huang COM 5336 Cryptography Lecture 7.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Prepared by Dr. Lamiaa Elshenawy
Cryptography and Network Security Chapter 14
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Authentication Protocols
Subject Name: NETWORK SECURITY Subject Code: 10EC832
Chapter 10: Key Management (Again) and other Public Key Systems
Key Management Network Systems Security
CSCE 715: Network Systems Security
Cryptography and Network Security Chapter 13
Presentation transcript:

Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1

BK TP.HCM Content  Digital Signatures  Distribution of public keys 2

BK TP.HCM Digital Signatures  have looked at message authentication ▫ but does not address issues of lack of trust  digital signatures provide the ability to: ▫ verify author, date & time of signature ▫ authenticate message contents ▫ be verified by third parties to resolve disputes  hence include authentication function with additional capabilities 3

BK TP.HCM Practical Signature Schemes  Sender: ▫ Signer computes h = H(M) (for example SHA-1 hash) ▫ h is encrypted with the private key to get the signature S.  Signer sends M || S  Receiver: ▫ Extract M. Calculate h = H(M). ▫ S is decrypted with public key to get h’. ▫ Verify h’ = h 4

BK TP.HCM Practical Signature Schemes 5

BK TP.HCM RSA Signature Scheme  Alice's public keys are n a and e a.  Alice wishes to sign a message M ▫ Compute h = h(M) ▫ The signature S is computes as S = h d a mod n a.  Any verfier with access to Alice's public keys e a and n a can verify that: h’ = S e a ≡ h e a d a ≡ h k  (n a )+1 ≡ h mod n a. 6

BK TP.HCM Digital Signature Standard (DSS)  US Govt approved signature scheme  designed by NIST & NSA in early 90's  published as FIPS-186 in 1991  revised in 1993, 1996 & then 2000  uses the SHA hash algorithm  DSS is the standard, DSA is the algorithm  FIPS (2000) includes alternative RSA & elliptic curve signature variants 7

BK TP.HCM Digital Signature Algorithm (DSA)  creates a 320 bit signature  with bit security  smaller and faster than RSA  a digital signature scheme only  security depends on difficulty of computing discrete logarithms 8

BK TP.HCM DSA Key Generation  have shared global public key values (p,q,g): ▫ choose q, a 160 bit ▫ choose a large prime 2 L-1 ≤ p ≤ 2 L  where L= 512 to 1024 bits and is a multiple of 64  and q is a prime factor of (p-1), < q < ▫ choose g = h (p-1)/q  where 1 1  users choose private & compute public key: ▫ choose private key: x < q ▫ compute public key: y = g x (mod p) 9

BK TP.HCM DSA Signature Creation  to sign a message M the sender: ▫ generates a random signature key k, k < q ▫ k must be random, be destroyed after use, and never be reused  then computes signature pair: r = (g k (mod p))(mod q) s = (k -1.H(M)+ x.r)(mod q)  signature is r || s (r, s are 160-bit quantities)  sends signature (r,s) with message M 10

BK TP.HCM DSA Signature Verification  having received M & signature (r,s)  to verify a signature, recipient computes: w = s -1 (mod q) u1= (H(M).w)(mod q) u2= (r.w)(mod q) v = (g u1.y u2 (mod p)) (mod q)  if v=r then signature is verified  A proof is provided at this book's Web site. 11

BK TP.HCM Advantages of DSA  The signature size is small (equivalent to 2 hashes)  All computations (for signing and verication) use smaller modulus q 12

BK TP.HCM Distribution of Public Keys  can be considered as using one of: ▫ public announcement ▫ publicly available directory ▫ public-key authority ▫ public-key certificates

BK TP.HCM Public Announcement  users distribute public keys to recipients or broadcast to community at large ▫ eg. append PGP keys to messages or post to news groups or list  major weakness is forgery ▫ anyone can create a key claiming to be someone else and broadcast it ▫ until forgery is discovered can masquerade as claimed user

BK TP.HCM Publicly Available Directory  can obtain greater security by registering keys with a public directory  directory must be trusted with properties: ▫ contains {name,public-key} entries ▫ participants register securely with directory ▫ participants can replace key at any time ▫ directory is periodically published ▫ directory can be accessed electronically  still vulnerable to tampering or forgery

BK TP.HCM Public-Key Authority  improve security by tightening control over distribution of keys from directory  has properties of directory  and requires users to know public key for the directory  then users interact with directory to obtain any desired public key securely ▫ does require real-time access to directory when keys are needed

BK TP.HCM Public-Key Authority

BK TP.HCM Public-Key Certificates  certificates allow key exchange without real- time access to public-key authority  a certificate binds identity to public key ▫ usually with other info such as period of validity, rights of use etc  with all contents signed by a trusted Public-Key or Certificate Authority (CA)  can be verified by anyone who knows the public-key authorities public-key

BK TP.HCM Public-Key Certificates

BK TP.HCM Public Key Infrastructure  CA signs the public key of all entities  which can be verified by any entity who has acess to the public key of the CA  The public key of the CA is widely distributed ▫ advertized in newspapers ▫ preloaded in all computers  X format for public key certificates

BK TP.HCM Public Key Infrastructure  (Step 1) Key generation: Every entity generates a public-private key pair ▫ choose a random private key ▫ compute the public key  (Step 2) Registration: Every entity should ▫ provide proof of their identity (to the CA)  (Step 3) Obtain certificate from the CA ▫ CA signs a certificate which binds the identity of A to A’s public key

BK TP.HCM X.509 Formats

BK TP.HCM Summary  have discussed: ▫ digital signatures ▫ distribution of public keys 23