digita digital l signa signatu tures es instructor ahmad
play

Digita Digital l Signa Signatu tures es Instructor: Ahmad - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaways


  1. Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course. Sharif University Introduction to Modern Cryptography Spring 2015 1 / 59

  2. Outline  Syntax and Definition  Building a Digital Signature  Full Domain Hash (FDH) Sharif University Introduction to Modern Cryptography Spring 2015 2 / 59

  3. Syntax and Definition Sharif University Introduction to Modern Cryptography Spring 2015 3 / 59

  4. Signing by hand Sharif University Introduction to Modern Cryptography Spring 2015 4 / 59

  5. Signing electronically Sharif University Introduction to Modern Cryptography Spring 2015 5 / 59

  6. Signing electronically Sharif University Introduction to Modern Cryptography Spring 2015 6 / 59

  7. What about a MAC? Sharif University Introduction to Modern Cryptography Spring 2015 7 / 59

  8. Digital signatures Sharif University Introduction to Modern Cryptography Spring 2015 8 / 59

  9. Usage Sharif University Introduction to Modern Cryptography Spring 2015 9 / 59

  10. Dissemination of public keys Sharif University Introduction to Modern Cryptography Spring 2015 10 / 59

  11. Signatures versus MA schemes Sharif University Introduction to Modern Cryptography Spring 2015 11 / 59

  12. Security of a DS scheme Sharif University Introduction to Modern Cryptography Spring 2015 12 / 59

  13. uf-cma adversaries Sharif University Introduction to Modern Cryptography Spring 2015 13 / 59

  14. Security of a DS scheme Sharif University Introduction to Modern Cryptography Spring 2015 14 / 59

  15. Formalization: UF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 15 / 59

  16. A difference with MACs Sharif University Introduction to Modern Cryptography Spring 2015 16 / 59

  17. Strong unforgeability Sharif University Introduction to Modern Cryptography Spring 2015 17 / 59

  18. Formalization: SUF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 18 / 59

  19. Building a Digital Signature Sharif University Introduction to Modern Cryptography Spring 2015 19 / 59

  20. RSA signatures Sharif University Introduction to Modern Cryptography Spring 2015 20 / 59

  21. Plain RSA signatures: Idea Sharif University Introduction to Modern Cryptography Spring 2015 21 / 59

  22. Plain RSA signature scheme Sharif University Introduction to Modern Cryptography Spring 2015 22 / 59

  23. Security of plain RSA signatures Sharif University Introduction to Modern Cryptography Spring 2015 23 / 59

  24. Attacks on plain RSA Sharif University Introduction to Modern Cryptography Spring 2015 24 / 59

  25. Homomorphic properties of RSA Sharif University Introduction to Modern Cryptography Spring 2015 25 / 59

  26. Another attack on plain RSA Sharif University Introduction to Modern Cryptography Spring 2015 26 / 59

  27. Other issues Sharif University Introduction to Modern Cryptography Spring 2015 27 / 59

  28. Throwing in a hash function Sharif University Introduction to Modern Cryptography Spring 2015 28 / 59

  29. What we need from H Sharif University Introduction to Modern Cryptography Spring 2015 29 / 59

  30. Preventing previous attacks Sharif University Introduction to Modern Cryptography Spring 2015 30 / 59

  31. RSA PKCS#1 signatures Sharif University Introduction to Modern Cryptography Spring 2015 31 / 59

  32. Does 1-wayness prevent forgery? Sharif University Introduction to Modern Cryptography Spring 2015 32 / 59

  33. 𝑰 𝑸𝑳𝑫𝑻 revisited Sharif University Introduction to Modern Cryptography Spring 2015 33 / 59

  34. Goal Sharif University Introduction to Modern Cryptography Spring 2015 34 / 59

  35. Full Domain Hash (FDH) Sharif University Introduction to Modern Cryptography Spring 2015 35 / 59

  36. Full-Domain-Hash (FDH) [BR96] Sharif University Introduction to Modern Cryptography Spring 2015 36 / 59

  37. UF-CMA in RO model Sharif University Introduction to Modern Cryptography Spring 2015 37 / 59

  38. Security of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 38 / 59

  39. Programming the RO Sharif University Introduction to Modern Cryptography Spring 2015 39 / 59

  40. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 40 / 59

  41. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 41 / 59

  42. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 42 / 59

  43. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 43 / 59

  44. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 44 / 59

  45. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 45 / 59

  46. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 46 / 59

  47. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 47 / 59

  48. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 48 / 59

  49. The case 𝒓 𝒕 > 𝟏 Sharif University Introduction to Modern Cryptography Spring 2015 49 / 59

  50. Replying to Sign queries Sharif University Introduction to Modern Cryptography Spring 2015 50 / 59

  51. Simplification Sharif University Introduction to Modern Cryptography Spring 2015 51 / 59

  52. Inverter for the case 𝒓 𝒕 > 𝟏 Sharif University Introduction to Modern Cryptography Spring 2015 52 / 59

  53. Analysis intuition Sharif University Introduction to Modern Cryptography Spring 2015 53 / 59

  54. Fundamental Lemma variant Sharif University Introduction to Modern Cryptography Spring 2015 54 / 59

  55. Analysis Sharif University Introduction to Modern Cryptography Spring 2015 55 / 59

  56. Analysis Sharif University Introduction to Modern Cryptography Spring 2015 56 / 59

  57. Security of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 57 / 59

  58. Better analysis of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 58 / 59

  59. Questions? Sharif University Introduction to Modern Cryptography Spring 2015 59 / 59

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend