Digita Digital l Signa Signatu tures es Instructor: Ahmad - - PowerPoint PPT Presentation

digita digital l signa signatu tures es instructor ahmad
SMART_READER_LITE
LIVE PREVIEW

Digita Digital l Signa Signatu tures es Instructor: Ahmad - - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaways


slide-1
SLIDE 1

Introduction to Modern Cryptography Sharif University Spring 2015

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering

Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany

1 / 59

Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course.

slide-2
SLIDE 2

Introduction to Modern Cryptography Sharif University Spring 2015

 Syntax and Definition  Building a Digital Signature  Full Domain Hash (FDH)

Outline

2 / 59

slide-3
SLIDE 3

Introduction to Modern Cryptography Sharif University Spring 2015

Syntax and Definition

3 / 59

slide-4
SLIDE 4

Introduction to Modern Cryptography Sharif University Spring 2015

Signing by hand

4 / 59

slide-5
SLIDE 5

Introduction to Modern Cryptography Sharif University Spring 2015

Signing electronically

5 / 59

slide-6
SLIDE 6

Introduction to Modern Cryptography Sharif University Spring 2015

Signing electronically

6 / 59

slide-7
SLIDE 7

Introduction to Modern Cryptography Sharif University Spring 2015

What about a MAC?

7 / 59

slide-8
SLIDE 8

Introduction to Modern Cryptography Sharif University Spring 2015

Digital signatures

8 / 59

slide-9
SLIDE 9

Introduction to Modern Cryptography Sharif University Spring 2015

Usage

9 / 59

slide-10
SLIDE 10

Introduction to Modern Cryptography Sharif University Spring 2015

Dissemination of public keys

10 / 59

slide-11
SLIDE 11

Introduction to Modern Cryptography Sharif University Spring 2015

Signatures versus MA schemes

11 / 59

slide-12
SLIDE 12

Introduction to Modern Cryptography Sharif University Spring 2015

Security of a DS scheme

12 / 59

slide-13
SLIDE 13

Introduction to Modern Cryptography Sharif University Spring 2015

uf-cma adversaries

13 / 59

slide-14
SLIDE 14

Introduction to Modern Cryptography Sharif University Spring 2015

Security of a DS scheme

14 / 59

slide-15
SLIDE 15

Introduction to Modern Cryptography Sharif University Spring 2015

Formalization: UF-CMA

15 / 59

slide-16
SLIDE 16

Introduction to Modern Cryptography Sharif University Spring 2015

A difference with MACs

16 / 59

slide-17
SLIDE 17

Introduction to Modern Cryptography Sharif University Spring 2015

Strong unforgeability

17 / 59

slide-18
SLIDE 18

Introduction to Modern Cryptography Sharif University Spring 2015

Formalization: SUF-CMA

18 / 59

slide-19
SLIDE 19

Introduction to Modern Cryptography Sharif University Spring 2015

Building a Digital Signature

19 / 59

slide-20
SLIDE 20

Introduction to Modern Cryptography Sharif University Spring 2015

RSA signatures

20 / 59

slide-21
SLIDE 21

Introduction to Modern Cryptography Sharif University Spring 2015

Plain RSA signatures: Idea

21 / 59

slide-22
SLIDE 22

Introduction to Modern Cryptography Sharif University Spring 2015

Plain RSA signature scheme

22 / 59

slide-23
SLIDE 23

Introduction to Modern Cryptography Sharif University Spring 2015

Security of plain RSA signatures

23 / 59

slide-24
SLIDE 24

Introduction to Modern Cryptography Sharif University Spring 2015

Attacks on plain RSA

24 / 59

slide-25
SLIDE 25

Introduction to Modern Cryptography Sharif University Spring 2015

Homomorphic properties of RSA

25 / 59

slide-26
SLIDE 26

Introduction to Modern Cryptography Sharif University Spring 2015

Another attack on plain RSA

26 / 59

slide-27
SLIDE 27

Introduction to Modern Cryptography Sharif University Spring 2015

Other issues

27 / 59

slide-28
SLIDE 28

Introduction to Modern Cryptography Sharif University Spring 2015

Throwing in a hash function

28 / 59

slide-29
SLIDE 29

Introduction to Modern Cryptography Sharif University Spring 2015

What we need from H

29 / 59

slide-30
SLIDE 30

Introduction to Modern Cryptography Sharif University Spring 2015

Preventing previous attacks

30 / 59

slide-31
SLIDE 31

Introduction to Modern Cryptography Sharif University Spring 2015

RSA PKCS#1 signatures

31 / 59

slide-32
SLIDE 32

Introduction to Modern Cryptography Sharif University Spring 2015

Does 1-wayness prevent forgery?

32 / 59

slide-33
SLIDE 33

Introduction to Modern Cryptography Sharif University Spring 2015

𝑰𝑸𝑳𝑫𝑻 revisited

33 / 59

slide-34
SLIDE 34

Introduction to Modern Cryptography Sharif University Spring 2015

Goal

34 / 59

slide-35
SLIDE 35

Introduction to Modern Cryptography Sharif University Spring 2015

Full Domain Hash (FDH)

35 / 59

slide-36
SLIDE 36

Introduction to Modern Cryptography Sharif University Spring 2015

Full-Domain-Hash (FDH) [BR96]

36 / 59

slide-37
SLIDE 37

Introduction to Modern Cryptography Sharif University Spring 2015

UF-CMA in RO model

37 / 59

slide-38
SLIDE 38

Introduction to Modern Cryptography Sharif University Spring 2015

Security of FDH in RO model

38 / 59

slide-39
SLIDE 39

Introduction to Modern Cryptography Sharif University Spring 2015

Programming the RO

39 / 59

slide-40
SLIDE 40

Introduction to Modern Cryptography Sharif University Spring 2015

The case 𝒓𝒕 = 𝟏 and 𝒓𝒊 = 𝟐

40 / 59

slide-41
SLIDE 41

Introduction to Modern Cryptography Sharif University Spring 2015

The case 𝒓𝒕 = 𝟏 and 𝒓𝒊 = 𝟐

41 / 59

slide-42
SLIDE 42

Introduction to Modern Cryptography Sharif University Spring 2015

The inverter for the case 𝒓𝒕 = 𝟏 and 𝒓𝒊 = 𝟐

42 / 59

slide-43
SLIDE 43

Introduction to Modern Cryptography Sharif University Spring 2015

The inverter for the case 𝒓𝒕 = 𝟏 and 𝒓𝒊 = 𝟐

43 / 59

slide-44
SLIDE 44

Introduction to Modern Cryptography Sharif University Spring 2015

The case 𝒓𝒕 = 𝟏 and 𝒓𝒊 > 𝟐

44 / 59

slide-45
SLIDE 45

Introduction to Modern Cryptography Sharif University Spring 2015

The case 𝒓𝒕 = 𝟏 and 𝒓𝒊 > 𝟐

45 / 59

slide-46
SLIDE 46

Introduction to Modern Cryptography Sharif University Spring 2015

The inverter for the case 𝒓𝒕 = 𝟏 and 𝒓𝒊 > 𝟐

46 / 59

slide-47
SLIDE 47

Introduction to Modern Cryptography Sharif University Spring 2015

The inverter for the case 𝒓𝒕 = 𝟏 and 𝒓𝒊 > 𝟐

47 / 59

slide-48
SLIDE 48

Introduction to Modern Cryptography Sharif University Spring 2015

The inverter for the case 𝒓𝒕 = 𝟏 and 𝒓𝒊 > 𝟐

48 / 59

slide-49
SLIDE 49

Introduction to Modern Cryptography Sharif University Spring 2015

The case 𝒓𝒕 > 𝟏

49 / 59

slide-50
SLIDE 50

Introduction to Modern Cryptography Sharif University Spring 2015

Replying to Sign queries

50 / 59

slide-51
SLIDE 51

Introduction to Modern Cryptography Sharif University Spring 2015

Simplification

51 / 59

slide-52
SLIDE 52

Introduction to Modern Cryptography Sharif University Spring 2015

Inverter for the case 𝒓𝒕 > 𝟏

52 / 59

slide-53
SLIDE 53

Introduction to Modern Cryptography Sharif University Spring 2015

Analysis intuition

53 / 59

slide-54
SLIDE 54

Introduction to Modern Cryptography Sharif University Spring 2015

Fundamental Lemma variant

54 / 59

slide-55
SLIDE 55

Introduction to Modern Cryptography Sharif University Spring 2015

Analysis

55 / 59

slide-56
SLIDE 56

Introduction to Modern Cryptography Sharif University Spring 2015

Analysis

56 / 59

slide-57
SLIDE 57

Introduction to Modern Cryptography Sharif University Spring 2015

Security of FDH in RO model

57 / 59

slide-58
SLIDE 58

Introduction to Modern Cryptography Sharif University Spring 2015

Better analysis of FDH in RO model

58 / 59

slide-59
SLIDE 59

Introduction to Modern Cryptography Sharif University Spring 2015

Questions?

59 / 59