Topic 22: Digital Schemes (2)

Slides:



Advertisements
Similar presentations
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Digital Signatures and Hash Functions. Digital Signatures.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
Announcements: 1. Presentations start Friday 2. Cem Kaner presenting O th block today. Questions? This week: DSA, Digital Cash DSA, Digital Cash.
Introduction to Modern Cryptography Homework assignments.
Digital Signature Algorithm (DSA) Kenan Gençol presented in the course BIL617 Cryptology instructed by Asst.Prof.Dr. Nuray AT Department of Computer Engineering,
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Announcements:Questions? This week: Digital signatures, DSA Digital signatures, DSA DTTF/NB479: DszquphsbqizDay 29.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Cryptography and Network Security Chapter 13
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Topic 18: RSA Implementation and Security
8. Data Integrity Techniques
Applied Cryptography Spring 2015 Digital signatures.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Digital Signatures Applied Handbook of Cryptography: Chapt 11
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
By Abhijith Chandrashekar and Dushyant Maheshwary.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 10 – Digital Signatures.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Chapter 8 Digital Signature Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Prepared by Dr. Lamiaa Elshenawy
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
 Requirement  Security  Classification  RSA Signature  ElGamal Signature  DSS  Other Signature Schemes  Applied Digital Signatures 11.
COM 5336 Lecture 8 Digital Signatures
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
第四章 數位簽章.
第四章 數位簽章.
Information Security message M one-way hash fingerprint f = H(M)
Digital signatures.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Chapter 13 Digital Signature
One Time Signature.
Introduction to Modern Cryptography
Presentation transcript:

Topic 22: Digital Schemes (2) Cryptography CS 555 Topic 22: Digital Schemes (2) CS555 Topic 22

Outline and Readings Outline Readings: The DSA Signature Scheme Lamport’s one-time signature Blind signature Readings: Katz and Lindell: Chapter 12.1-12.4 CS555 Topic 22

Digital Signature Algorithm (DSA) Also known as Digital Signature Standard (DSS) Key generation Select two prime numbers (p,q) such that q | (p-1) Early standard recommended p to be between 512 and 1024 bits, and q to be 160 bits Current recommendation for length: (1024,160), (2048,224), (2048,256), and (3072,256). The size of q must resist exhaustive search The size of p must resist discrete log Choose g to be an element in Zp* with order q Let  be a generator of Zp*, and set g = (p-1)/q mod p Select 1  x  q-1; Compute y = gx mod p Public key: (p, q, g, y) Private key: x CS555 Topic 22

DSA Signing message M: Select a random integer k, 0 < k < q Compute r = (gk mod p) mod q s = k-1 ( h(M) + xr) mod q Signature: (r, s) Signature consists of two 160-bit numbers, when q is 160 bit CS555 Topic 22

DSA Signature: (r, s) r = (gk mod p) mod q s = k-1 ( h(M) + xr) mod q Verification Verify 0 < r < q and 0 < s < q, if not, invalid Compute u1 = h(M)s-1 mod q, u2 = rs-1 mod q Valid iff r = (gu1 yu2 mod p) mod q gu1 yu2 = gh(M)s^{-1} gxr s^{-1} = g(h(M)+xr)s^{-1} = gk (mod p) CS555 Topic 22

DSA Security The value k must be unique and unpredictable. No security proof exists, even assuming that the hash function is a random oracle. No vulnerability known either. Adopted as standard in 1991 Main benefits over RSA, which helps its adoption, are One cannot use the implementation for encryption Signature size (320 bit) is smaller than RSA CS555 Topic 22

One-Time Digital Signatures One-time digital signatures: digital schemes used to sign,at most one message; otherwise signature can be forged. A new public key is required for each signed message. Advantage: signature generation and verification are very efficient and is useful for devices with low computation power. CS555 Topic 22

Lamport One-time Signature To sign one bit: Choose as secret keys x0, x1 x0 represents ‘0’ x1 represents ‘1’ public key (y0,y1): y0 = f(x0), y1 = f(x1). Where f is a one-way function Signature is x0 if the message is 0 or x1 if message is 1. To sign a message m, use hash and sigh each bit of h(m) The signature size is reduced by almost a factor a 2. CS555 Topic 22

Blind Signature Schemes A wants B’s signature on a message m, but doesn’t want B to know the message m or the signature Applications: electronic cash Goal: anonymous spending The bank signs a bank note, but A doesn’t want B to know the note, as then B can associate the spending of B with A’s identity CS555 Topic 22

Chaum’s Bind Signature Protocol Based on RSA Setup: B has public key (n,e) and private key d A has m Actions: (blinding) A picks random kZn-{0} computes m’=mke mod n and sends to B (signing) B computes s’=(m’)d mod n and sends to A (unblinding) A computes s=s’k-1 mod n, which is B’s signature on m CS555 Topic 22

Coming Attractions … In the next two weeks Zero knowledge proof protocols Commitment schemes Secure function evaluation, Oblivious transfer, secret sharing Identity based encryption & quantum cryptography We will be using materials not in the textbook CS555 Topic 22