Download presentation
Presentation is loading. Please wait.
Published byEmery Terry Modified over 9 years ago
1
Digital Signatures and applications Math 7290CryptographySu07
2
Digital Signature Schemes Digital vs Conventional Signatures RSA Signature Scheme El Gamal Signature Scheme Security Protocols Session Keys -- Diffie Hellman theme and variations Centralized key management (certificates) Decentralized key management (PGP)
3
Conventional vs Digital advantages and disadvantages Conventional Part of a physical document compared to known authentic signature Identical copy easily distinguished and does not substitute for the original Digital Not physically part of the document Verification is done with an authentication algorithm Identical copies are easy to make and (ab)use
4
Digital Signature Scheme Must bind to the signer and to the message being signed An encryption like process Must be verifiable by recipient A decryption like process Scheme consists of Messagesx Signaturesy Keysk Signing algorithmy=e(x,k) Verification algorithmx=d(y,k’)
5
RSA encryption scheme n=pq, where p and q are large primes e, encryption exponent (no factor in common with (p-1)(q-1)) d, decryption exponent (multiplicative inverse of e mod (p-1)(q-1)) PUBLIC KEY (e, n) private key d encryption of message x: y=x e modulo n decryption of message y: x=y d modulo n
6
RSA Digital Signatures Alice has public key (e A,n A ) and private key d A. Bob has public key (e B,n B ) and private key d B. Alice has prepared a message x to send to Bob But before sending it she signs it using her private key: Then she sends z to Bob. Bob decrypts and verifies using his private key and Alice’s public key! Bob knows the message, and it had to be from Alice. Noone else could have her private key!
7
El Gamal Encryption Scheme p a large prime, integer a, 0<a<p-1 , a primitive element mod p, = a mod p public key (p, , ) private key a Encryption of message x: (y 1,y 2 ) where y 1 = k mod p, y 2 =x k mod p (k? any k is ok) Decryption of message (y 1,y 2 ): y 2 (y 1 a ) -1 mod p = x
8
El Gamal Signature Scheme Alice has her private key a, and her random k, (here chosen relatively prime to p-1) and her public key (p, , ) Bob Alice signs message m (encrypted or not with Bob’s public key) by computing and sending (m,r,s) to Bob(m,r,s)
9
Bob verifies that the message is from Alice, using Alice’s public key (p, , ). He computes: Bob receives (m,r,s) and the signature of Alice is verified if v 1 =v 2 because Bob can then decrypt m, if necessary,
10
caveat encryptor inadvertent trapdoors with El Gamal signatures don’t use the same k twice! the private key a becomes accessible be careful if r is relatively prime to p-1 again, the secrecy of a is compromised
11
Diffie Hellman Key Exchange whereby Alice & Bob agree on a session key Alice (or Bob) selects a large prime p and a primitive element mod p. Both can be made public. Alice selects secret x, 0<x<p-1 and Bob selects secret y, 0<y<p-1. Alice sends A= x mod p to Bob. Bob sends B= y mod p to Alice. Alice computes K=B x =( y ) x while Bob computes K=A y = ( x ) y. They have a common key to use in a symmetric key setting!
12
But what if … Alice (or Bob) selects a large prime p and a primitive element mod p. Both can be made public. Alice selects secret x, 0<x<p-1 and Bob selects secret y, 0<y<p-1. Alice sends A=x mod p to Bob. Bob sends B=y mod p to Alice. but Eve intercepts both A and B; she selects her own z and sends instead E=z mod p and sends it to both Alice and Bob (who think they are receiving B and A). Eve computes KA=Az= (x )z, KB=Bz= (y )z Alice computes K=Ex=(z)x =KA while Bob computes K=Ey= (z )y =EB. Alice and Bob think they have safe communication, but Eve is …. supervising perhaps?
13
authenticated key agreement a protocol than incorporates digital signatures Alice (or Bob) selects a large prime p and a primitive element mod p. Both can be made public. Alice selects secret x, 0<x<p-1 and Bob selects secret y, 0<y<p-1. Alice sends A= x mod p to Bob. Bob sends B= y mod p to Alice. Alice computes K=B x =( y ) x while Bob computes K=A y = ( x ) y. Bob computes B= y mod p.
14
authenticated key agreement a protocol than incorporates digital signatures Alice (or Bob) selects a large prime p and a primitive element mod p. Both can be made public. Alice selects secret x, 0<x<p-1 and Bob selects secret y, 0<y<p-1. Alice sends A= x mod p to Bob. Bob computes B= y mod p. Bob uses his digital signature for the message (B,A) to produce sig B (B,A). Bob also computes K=A y = ( x ) y. Bob then encrypts sig B (B,A) using the key K: E K (sig B (B,A))=S B. Bob sends B, S B.
15
authenticated key agreement a protocol than incorporates digital signatures (continued) Alice uses B to compute K=Bx= (y)x Alice decrypts SB using K to get sigB(B,A). Alice then verifies Bob’s signature. Alice reciprocates; she computes sigA(A,B) and encrypts it using K: EK(sigA(A,B))=SA. Alice sends SA to Bob who can then verify her signature.
16
Public Key Infrastructures X.509 Certificate (centralized authority) VeriSign, AT&T,etc Certificates having different levels of trust/validity are issued by the CA PGP (decentralized system) each user has a keyring with trust levels for others (implicit/complete/partial/none) validation for any other based on connections in the web of trust associated with the user’s keyring
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.