DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Information System Security AABFS-Jordan Summer 2006 Digital Signature and Hashing Functions Prepared by: Maher Abu Hamdeh & Adel Hamdan Supervised by:
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings.
Cryptography and Network Security Chapter 13
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
8. Data Integrity Techniques
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Public-Key Cryptography CS110 Fall Conventional Encryption.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Data Security and Encryption (CSE348) 1. Lecture # 20 2.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Digital Signatures and Authentication Protocols Chapter 13.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown & Süleyman KONDAKCI.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Prepared by Dr. Lamiaa Elshenawy
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
X. Digital Signatures and Authentication Protocols We begin this chapter with an overview of digital signatures, authentication protocol and Digital Signature.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography and Network Security Chapter 13
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter -8 Digital Signatures
Chapter 13 Digital Signature
Chapter 3 - Public-Key Cryptography & Authentication
Digital Signatures Network Security.
LAB 3: Digital Signature
Presentation transcript:

DIGITAL SIGNATURE

A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature The signature is formed by taking the hash of the message and encrypting the message with the creator's private key In situations where there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is the digital signature

PROPERTIES OF DS It must verify the author and the date and time of the signature. It must to authenticate the contents at the time of the signature. It must be verifiable by third parties, to resolve disputes.

REQUIREMENTS OF DS The signature must be a bit pattern that depends on the message being signed. The signature must use some information unique to the sender, to prevent both forgery and denial. It must be relatively easy to produce the digital signature. It must be relatively easy to recognize and verify the digital signature. It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message. It must be practical to retain a copy of the digital signature in storage.

EXAMPLE SCENARIO

DS TYPES Direct Digital Signature It involves only the communicating parties (source, destination). It is assumed that the destination knows the public key of the source. A digital signature may be formed by encrypting the entire message with the sender's private key or by encrypting a hash code of the message with the sender's private key

DS TYPES Arbitrated Digital Signature Every signed message from a sender X to a receiver Y goes first to an arbiter A, who subjects the message and its signature to a number of tests to check its origin and content. The message is then dated and sent to Y with an indication that it has been verified to the satisfaction of the arbiter.

ARBITER EXAMPLE (1) X  A: M||E(Kxa, [IDX||H(M)]) (2) A  Y: E(Kay, [IDX||M||E(Kxa, [IDX||H(M)])||T]) (a) Conventional Encryption, Arbiter Sees Message (1) X  A: IDX ||E( Kxy, M )||E( Kxa, [ IDX ||H(E( Kxy, M ))]) (2) A  Y: E( Kay,[ IDX ||E( Kxy, M )])||E( Kxa, [ IDX ||H(E( Kxy, M ))|| T ]) (b) Conventional Encryption, Arbiter Does Not See Message (1) X  A: IDX ||E( PRx, [ IDX ||E( PUy, E( PRx, M ))]) (2) A  Y: E( PRa, [ IDX ||E( PUy, E( PRx, M ))|| T ]) (c) Public-Key Encryption, Arbiter Does Not See Message

ELGAMAL DIGITAL SIGNATURE Choose Prime number q and α, which is a primitive root of q. User Generates Private/Public key pair by, 1. Generate a random integer X A, such that 1< X A < q Compute. Y A = α X A mod q 3. A’s private key is X A ; A’s pubic key is {α,q,Y A }

ELGAMAL DIGITAL SIGNATURE To sign a message M, user A first computes the hash m=H(M) i.e. m is integer value in the range 0≤m≤q-1 A Computes DS as follows, 1.Choose a random integer K such that 1 ≤ K ≤ q -1 And K is relatively prime to q-1 2. Compute S 1 =α K mod q. Note that this is the same as the computation of C1. 3. Compute K -1 mod q-1.That is, compute the inverse of K modulo q-1 4.Compute S 2 = K -1 (m - X A S1)mod (q - 1) 5. The signature consists of the pair.(S 1,S 2 )

ELGAMAL DIGITAL SIGNATURE Any user B can verify the signature as follows. 1. Compute V 1 =α m mod q 2.Compute V 2 =(YA) S1 (S 1 ) S2 mod q Signature is valid if V1=V2 Example Choose q=19, it’s primitive roots are {2,3,10,13,14,15} Choose prime integer α=10

EXAMPLE q=19 and α=10 Alice chooses X A =16 Y A = α XA mod q = mod 19 = 4 Alice’s private key is 16 ; Alice’s pubic key is {19,10,4} Suppose Alice wants to sign a message with hash value m= Alice chooses K=5, which is relatively prime to S1 = α K mod q = 10 5 mod 19 = 3 3. K -1 mod q-1 = 5 -1 mod 18 = S 2 = K -1 ( m - X A S 1 )mod ( q - 1) = 11 (14 - (16)(3))mod 18 = mod 18 = 4

Bob can verify the signature as follows. V 1 = α m mod q = mod 19 = 16 V2 = (Y A ) S1 (S1) S2 mod q = (4 3 )(3 4 )mod mod 19 = 16 V1=V2 is a valid signature

RSA DS RSA encryption and decryption are commutative, hence it may be used directly as a digital signature scheme given an RSA scheme {(e,R), (d,p,q)} to sign a message, compute: S= M d (mod R) to verify a signature, compute: M = S e (mod R) = M e.d (mod R) = M(mod R) thus know the message was signed by the owner of the public key

RSA would seem obvious that a message may be encrypted, then signed using RSA without increasing it size but have blocking problem, since it is encrypted using the receivers modulus, but signed using the senders modulus (which may be smaller) several approaches possible to overcome this more commonly use a hash function to create separate MDC which is then signed