cryptography v digital signatures
play

Cryptography V: Digital Signatures Computer Security Lecture 6 - PowerPoint PPT Presentation

Cryptography V: Digital Signatures Computer Security Lecture 6 David Aspinall School of Informatics University of Edinburgh 31st January 2013 Outline Basics Constructing signature schemes Security of signature schemes ElGamal DSA


  1. Cryptography V: Digital Signatures Computer Security Lecture 6 David Aspinall School of Informatics University of Edinburgh 31st January 2013

  2. Outline Basics Constructing signature schemes Security of signature schemes ElGamal DSA Summary

  3. Outline Basics Constructing signature schemes Security of signature schemes ElGamal DSA Summary

  4. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information.

  5. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as:

  6. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication

  7. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation

  8. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability

  9. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability ◮ integrity

  10. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability ◮ integrity ◮ verifiability by independent, public or 3rd party

  11. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability ◮ integrity ◮ verifiability by independent, public or 3rd party ◮ Digital signatures are the asymmetric analogue of MACs, with a crucial difference.

  12. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability ◮ integrity ◮ verifiability by independent, public or 3rd party ◮ Digital signatures are the asymmetric analogue of MACs, with a crucial difference.

  13. Aims ◮ Digital signatures allow a principal to cryptographically bind (a representation of) its identity to a piece of information. ◮ Signatures can help establish security properties such as: ◮ authentication ◮ accountability/non-repudiation ◮ unforgeability ◮ integrity ◮ verifiability by independent, public or 3rd party ◮ Digital signatures are the asymmetric analogue of MACs, with a crucial difference. MACs can’t disinguish which of A or B provided integrity to a message (so no non-repudiation or independent verifiability). ◮ NB: electronic signature is a more general notion.

  14. Handwritten versus Digital Signatures

  15. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data

  16. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data verifier needs signature verifier needs public key

  17. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data verifier needs signature verifier needs public key signatures always same depends on document

  18. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data verifier needs signature verifier needs public key signatures always same depends on document copies apparent copies indistinguishable

  19. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data verifier needs signature verifier needs public key signatures always same depends on document copies apparent copies indistinguishable signer saw document computer added signature

  20. Handwritten versus Digital Signatures ink binds to paper cryptographically bound to data verifier needs signature verifier needs public key signatures always same depends on document copies apparent copies indistinguishable signer saw document computer added signature have legal impact may have legal impact

  21. Signature mechanism A signature mechanism for principal A is given by: ◮ A message space M of messages for signing ◮ A set S of signatures (e.g. strings {0 , 1} n ) ◮ A secret signing function S A : M → S ◮ A public verification function V A : M × S → Bool

  22. Signature mechanism A signature mechanism for principal A is given by: ◮ A message space M of messages for signing ◮ A set S of signatures (e.g. strings {0 , 1} n ) ◮ A secret signing function S A : M → S ◮ A public verification function V A : M × S → Bool satisfying the correctness and security properties: 1. V A ( m, s ) = true if and only if S A ( m ) = s . 2. For any principal other than A , it is computationally infeasible to find for any m ∈ M , an s ∈ S such that V A ( m, s ) = true.

  23. Signature mechanism A signature mechanism for principal A is given by: ◮ A message space M of messages for signing ◮ A set S of signatures (e.g. strings {0 , 1} n ) ◮ A secret signing function S A : M → S ◮ A public verification function V A : M × S → Bool satisfying the correctness and security properties: 1. V A ( m, s ) = true if and only if S A ( m ) = s . 2. For any principal other than A , it is computationally infeasible to find for any m ∈ M , an s ∈ S such that V A ( m, s ) = true. Usually use a public algorithm yielding key-indexed families { S s | s ∈ K } of signing and verification functions { V v | v ∈ K }. Principal advertises v .

  24. Signature mechanism A signature mechanism for principal A is given by: ◮ A message space M of messages for signing ◮ A set S of signatures (e.g. strings {0 , 1} n ) ◮ A secret signing function S A : M → S ◮ A public verification function V A : M × S → Bool satisfying the correctness and security properties: 1. V A ( m, s ) = true if and only if S A ( m ) = s . 2. For any principal other than A , it is computationally infeasible to find for any m ∈ M , an s ∈ S such that V A ( m, s ) = true. Usually use a public algorithm yielding key-indexed families { S s | s ∈ K } of signing and verification functions { V v | v ∈ K }. Principal advertises v . Remark: nobody has proved a signature mechanism satisfying 2 exists, although there are good candidates.

  25. Using a signature scheme

  26. Using a signature scheme ◮ T o sign a message the signer A

  27. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) .

  28. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) . 2. Sends the pair ( m, s ) .

  29. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) . 2. Sends the pair ( m, s ) . ◮ T o verify that a signature s on a message m was created by A , another principal, the verifier :

  30. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) . 2. Sends the pair ( m, s ) . ◮ T o verify that a signature s on a message m was created by A , another principal, the verifier : 1. Obtains the verification function V A for A .

  31. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) . 2. Sends the pair ( m, s ) . ◮ T o verify that a signature s on a message m was created by A , another principal, the verifier : 1. Obtains the verification function V A for A . 2. Computes u = V A ( m, s )

  32. Using a signature scheme ◮ T o sign a message the signer A 1. Computes s = S A ( m ) . 2. Sends the pair ( m, s ) . ◮ T o verify that a signature s on a message m was created by A , another principal, the verifier : 1. Obtains the verification function V A for A . 2. Computes u = V A ( m, s ) 3. Accepts the signature if u = true, Rejects it if u = false.

  33. Outline Basics Constructing signature schemes Security of signature schemes ElGamal DSA Summary

  34. Digital signatures with a TTP ◮ Given a trusted third party, it is possible to use symmetric cryptography techniques.

  35. Digital signatures with a TTP ◮ Given a trusted third party, it is possible to use symmetric cryptography techniques. ◮ Let secure Sam S be the TTP, who shares a key with each principal.

  36. Digital signatures with a TTP ◮ Given a trusted third party, it is possible to use symmetric cryptography techniques. ◮ Let secure Sam S be the TTP, who shares a key with each principal. ◮ For A to send a signed contract M to B , S acts as an intermediary. Message 1. A → S : { M } K as S → B : Message 2. { M } K bs (like Wide Mouthed Frog key exchange protocol, M should include time-stamps and names).

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend