digital signatures for e government
play

Digital Signatures for e-Government Challenges a Long-Term - PowerPoint PPT Presentation

Signatures for e-Government Ba skiewicz, Kubiak, Kutyowski Digital Signatures for e-Government Challenges a Long-Term Security Architecture Mediated RSA Floating exponents Strong mRSA Przemysaw Ba skiewicz, Przemysaw


  1. Signatures for e-Government Bła´ skiewicz, Kubiak, Kutyłowski Digital Signatures for e-Government Challenges – a Long-Term Security Architecture Mediated RSA Floating exponents Strong mRSA Przemysław Bła´ skiewicz, Przemysław Kubiak, Hash based and Mirosław Kutyłowski signatures Wrocław University of Technology e-Forensics, Shanghai, 11 Nov. 2010

  2. Challenges for electronic signatures Signatures for e-Government Bła´ skiewicz, Advantages Kubiak, Kutyłowski Electronic signatures based on asymmetric techniques are relatively strong and easy to verify by anybody. Challenges Mediated RSA Electronic signatures are suitable for wide scale flow of Floating documents, providing strong proofs for: exponents authorship of a document signed Strong mRSA integrity of the document and lack of modifications after Hash based signatures signing However ... ... a strong mathematical algorithm is not enough to ensure security of signatures.

  3. Challenges for electronic signatures some crucial threats Signatures for e-Government Bła´ skiewicz, Problem: leaking secret keys Kubiak, Kutyłowski the signatures can be forged when secret keys are revealed Challenges to a third party. Mediated RSA How do we know that the secret keys are only in the Floating signing device of the signer? exponents Strong mRSA Hash based Problem: erosion of cryptography signatures advances of cryptanalysis are unpredictable. How do we know that nobody knows how to break the signature scheme? A real forger will always deny his capabilities.

  4. Challenges for electronic signatures some crucial threats Signatures for e-Government Bła´ skiewicz, Kubiak, Problem: dishonest service providers Kutyłowski a service provider can Challenges Mediated RSA retain secret information (when generating the keys), Floating insert trapdoors in software and hardware delivered, exponents Strong mRSA ... Hash based How can we trust that certification processes and signatures audits are effective enough? How do we know that the controlling body does not collude with the service provider?

  5. Challenges for electronic signatures how to deal with the threats Signatures for e-Government Bła´ skiewicz, Kubiak, Desired properties Kutyłowski 1 security of the system should not be based on the Challenges assumption that a certain party is honest. Mediated RSA A misbehavior should be inevitably detectable. Floating exponents 2 security properties should be self-evident as much as Strong mRSA possible, security evaluation should not require high Hash based signatures expertise. Such assumptions adopted by e-voting community as fundamental design rules.

  6. Challenges for electronic signatures dangerous assumptions Signatures for e-Government Bła´ skiewicz, Kubiak, PKI today Kutyłowski PKI today assumes honesty of Trusted Third Parties . Challenges Failure of this assumption is critical to the system. Mediated RSA In European legal systems it is not necessary to prove Floating exponents honest behavior in order to act as TTP . Strong mRSA Even worse, sometimes public bodies are obliged by Hash based signatures law to accept such services. so may be reluctance of business and citizens for PKI today is well founded?

  7. Our goal Signatures for e-Government Bła´ skiewicz, Kubiak, 1 provide solutions that are immune against misbehavior, Kutyłowski 2 make PKI system less dependent on certification and Challenges audit, provide tools for public verifiability Mediated RSA Floating exponents Our techniques: Strong mRSA 1 strong RSA : an RSA signature with DL based internal Hash based signatures signature, 2 Floating key : a strong mediated signature with clone detection 3 hash based PKI?

  8. mRSA - the core of the system algorithm Signatures for The key idea (Boneh, Ding, Tsudik 2001, 2004): e-Government Bła´ skiewicz, the secret key is split between two “parties”: the user Kubiak, Kutyłowski and the central server (mediator): none of the two parties can alone make a signature. Challenges Mediated RSA Mediated RSA in detail: Floating exponents public key: e , N , Strong mRSA Hash based private key d is split: d = d 1 + d 2 , signatures signature generation under message m : 1 h ( m ) , ∆ := PSS-padding ( h ( m )) , are calculated, 2 s 1 := ∆ d 1 mod N , 3 s 1 , ∆ , h ( m ) are sent to the mediator, 4 the mediator checks status of user’s id-card, 5 s 2 := ∆ d 2 mod N , 6 s := s 1 · s 2 mod N is now verified using h ( m ) .

  9. mRSA - the core of the system key management Signatures for Key splitting - example procedure: e-Government Bła´ skiewicz, the mediator generates d 2 in a way independent from Kubiak, Kutyłowski generation of n and d n , e and d are calculated by a dealer (e.g. in a Challenges distributed manner) Mediated RSA Floating d 1 := d − d 2 transferred (distributivelly or as a single exponents Paillier ciphertext) to the signing device Strong mRSA Hash based neither the mediator nor the signing device alone has signatures data to factorize n Security of mRSA versus security of RSA if there is an effective cryptanalytic attack on mRSA, then by simulating data for mRSA protocol having RSA data we will obtain an effective attack on RSA. so: cryptanalytically mRSA is at least as strong as RSA

  10. Why mediated signatures? Signatures for The aim of mediated signatures: e-Government Bła´ skiewicz, Fast revocation of user’s public key in case the private key Kubiak, Kutyłowski has been compromised – the pre-signatures of the card are no more finalized. Challenges Mediated RSA Drawbacks of currently deployed protocols: Floating exponents CRL: the list is refreshed in time intervals, if the list is Strong mRSA large - some applications abandon status checking, Hash based signatures OCSP: executed at the time the signature is verified, hence many repeated executions, validation service: for the signer – it is not compulsory, for a verifier – additional service she would pay for; if many copies of a document distributed by the signer - many validations.

  11. Floating exponents detection of cloned signature creation devices Signatures for e-Government Bła´ skiewicz, Kubiak, Kutyłowski Strengthening - mediated signatures update d 1 and d 2 after each key usage, Challenges Mediated RSA public key unchanged Floating the updates are unpredictable - a (pseudo)random exponents process Strong mRSA Hash based when a cloned card is used, it changes the key d 2 on signatures the mediator’s side, afterwards the legitimate card cannot create a valid signature and cloning becomes detected!

  12. Floating exponents detection of cloned signature creation devices Signatures for e-Government Bła´ skiewicz, Floating exponents -details: Kubiak, Kutyłowski the exponents d 1 and d 2 might float: Challenges there is a dynamic offset, say h , of the exponents: Mediated RSA the signature creation device holds d 1 + h Floating the server holds d 2 − h exponents Strong mRSA during each interaction a small number c is agreed Hash based between the signature device and the server, and the signatures offset is updated h := h + c . if two devices with the same key interact with the server, then the offset becomes de-synchronized: this leads to detection of clones!

  13. Strong mRSA motivation Signatures for e-Government Generation directly on a signature creation device Bła´ skiewicz, 1 if randomness not really random, then the keys might Kubiak, Kutyłowski be really weak ... Challenges 2 ... but it is hardly possible to check that the Mediated RSA randomness is really good Floating exponents 3 all kinds of kleptographic techniques apply Strong mRSA Hash based External generation signatures 1 source of randomness could be of very good quality 2 easy to control and protect against installing trapdoors in the keys 3 ... as long as trapdoors are not a feature of the system!

  14. Strong mRSA motivation Signatures for e-Government Bła´ skiewicz, Kubiak, Kutyłowski Challenges Dilemma: Mediated RSA Floating Whom to trust: exponents 1 a manufacturer? Strong mRSA Hash based 2 or a service provider? signatures

  15. Nested signatures for RSA Signatures for e-Government Bła´ skiewicz, Kubiak, Kutyłowski Internal signature: RSA uses the hash value of the message to be signed Challenges Mediated RSA padded by some number of bits, Floating a salt in PSS-padding might itself be a signature! exponents Strong mRSA in salt there is enough space for e.g. BLS (Boneh, Hash based Lynn, Shacham 2001) signature, signatures internal deterministic signature causes RSA-PSS to be deterministic, but with unpredictable salt . So there is no room for a covert channel.

  16. Strong RSA key generation options Signatures for e-Government Bła´ skiewicz, Kubiak, Kutyłowski Challenges Example scenario: Mediated RSA the keys for RSA are generated by a service provider Floating exponents and loaded into a signing device Strong mRSA the keys for internal signature are generated by a Hash based signatures signing device

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend