SUBLIMINALFREE AUTHENTICATION AND SIGNATURE
|
|
|
- Ferdinand Whitehead
- 10 years ago
- Views:
Transcription
1 SUBLIMINALFREE AUTHENTICATION AND SIGNATURE (Extended Abstract) Yvo Desmedt Dept. EE & CS, Univ. of Wisconsin - Milwaukee P.O. Box 784, WI Milwaukee, U.S.A. ABSTRACT Simmons [17] introduced the notion of subliminal channel in 1983, by demonstrating how to hide secret information inside an authenticated message. In this paper we propose a practical subliminal-free authentication system and extend our results to subliminal-free signatures. The subliminal-freeness of our systems can be proven. We discuss applications in the context of verification of treaty and international bank communications. I. INTRODUCTION In the process of peace keeping, the verification of international treaty plays an important role [l]. Discussions of arms reductions include that each party is able to have observation posts in the other country, which can send authenticated (or even signed) messages. This introduces however a major security problem. Indeed, will the observation post be used for spying activities? The problem of message authentication without secrecy was initialized and investigated by Simmons [16]. This problem was not solved until today, as a consequence of the possibility of a subliminal channel. Five years ago Simmons discovered that a secret message can be hidden inside the authenticator (for more details see [17]). He called this hidden communication channel, the subliminal channel. Other subliminal channels were introduced inside signature systems e.g., [18,19]. The concept of subliminal channel can be formalized and generalized [4]. In our paper we come up with a practical authentication system which &minates dmost completely the possibility to use a subliminal channel. This result is explained in Section W., after having introduced the main ideas in Section We extend our results to subliminal-free signature systems (see Section V.). How- C.G. Guenther (Ed.): Advances in Cryptology - EUROCRYPT 88, LNCS 330, pp , Spnnger-Verlag Berlin Heidelberg 1988
2 24 ever the last system is less practical. The reader not familiar with the terminology used in modern cryptology, will find a brief introduction to it in Section TERMINOLOGY IN MODERN CRYPTOLOGY In this section we explain briefly: 0 subliminal channels, 0 the role of a warden, 0 message authentication without secrecy, 0 the Goldwasser-Mid-Rivest signature scheme, 0 commitment in modern cryptology. To better understand the concept of subliminal channels, let us discuss Simmons illustration [17]. Two prisoners are communicating authenticated messages in full view of a warden. The warden is able to read the messages. The subliminal consists in hiding a message through the authentication scheme, such that the warden cannot detect its use nor read the hidden part. Solving the problem of subliminal channels is not sacient to obtain authentication without secrecy, as is well known. Subliminal information can be sent in an analog way through modulation, time jitter and so on. For a solution to overcome this problem see [20, p The techniques we use here are digital. By combining our results with [ZO, p. 651, the problem of message authentication without secrecy can be completely solved. Let us briefly explain the basic ideas used in the Goldwasser-Micali-Rivest signature scheme [14,15]. Their scheme is based on: 0 claw-free permutation pairs, 0 prefix-free mapping, 0 an authentication tree. Informally, claw-free permutation pairs are permutations fo and fi over a common domain for which its is computationally infeasible to find a triple 2, y and z such that f~(s) = fl(y) = z [14, p If factoring numbers of a special form are hard then such claw-free permutations exist [14, pp These numbers have the form: 1~ = p.q, p and Q primes such that: p 3 3 (mod 8) and Q E 7 (mod 8).
3 25 Such numbers n are known as Williams integers, due to there first use in cryptology by Williams [21] and are also known as Blum integers. The functions fa,,, = x2 (mod n) and f ~ =, 4x2 ~ (mod n) form permutations over the set of quadratic residues modulo n and are claw-free [15] (remark that these functions were slightly modified in [14]). It is essential to know that the Jacobi symbol (217~) = -1 if n is a Williams (Blum) integer, so 2 is a quadratic nonresidue modulo n. If there is no doubt about n we will shortly say fo instead of f ~, ~ and f1 instead of fl,,,. For authenticity and signature one does not only need claw-freeness for two permutations but a family of permutations which are pairwise claw-free. Hereto fi is defined as fi(z) = fid(fid--l(...fil(fi0(2)) -..)), where... z = Zdzd-1...ilia in binary. We define lil = d+ 1. One has to read f; as (fi)- so that fy (fi(z)) = x. In order to exclude that anyone else could compute fj- (y) from a given f; (y) (j# i) Goldwasser, Micali and Rivest use prefix-free mapping (.). A prefix-hee encoding satisfies the property that (j) is never a prefix of (i) (j# i). Finally, to avoid chosen text attacks and forgery, an authentication tree is used [15]. Different authentication trees have been presented, but their differences are not important in this context. We will not discuss these trees in detail, because they are only partially important in order to understand this paper. The motivation for an authentication tree is to make random signatures that can be used later on to sign real messages. In order to obtain the security one uses f-claw-free permutations and g-claw-free permutations (for more details see [9,14,15]). Commitment originates from Blum s ideas [2]. It allows A to randomly choose a number R and to commit herself to this number, e.g., to B. Hereto A encrypts R and sends the result C = hk(r) to B. If a good encryption system, e.g., a probabilistic encryption system as [12], has been used no information is revealed about R. Later on A is able to reveal R, As a consequence of her commitment A is unable to lie or pretend that her choice was R instead of R. B is able to verify if R is correct when A reveals it together with k. A s&cient condition for commitment is that: h~(z) = hp(y) implies 3: = y. (1) Let us briefly discuss a practical commitment algorithm, which is however not guaranteed secure. To commit herself to the bit 0, A sends ht(o,o,..., 0) where h is the DES and key k is chosen randomly; to commit to 1, A sends hk(l,l,...,1).
4 MAIN IDEA The &n idea to obtain subliminal-freeness is to use an active warden. We call a warden active, if he does not only listen to catch up subliminal channel users, but he also interucts in the communication in a special way to better enforce the subliminal-freeness. Remember that a warden is allowed to send fake messages trying to convince the receiver that they are authentic [17]. So the only trust in the active warden consists in believing he will not help to set-up a subliminalchannel. The idea of an active warden is not 100% new. Simmons already used a similar idea (without calling it active warden) to exclude the use of analog covert channels [20, p Our active warden is however digital. Let us now explain in more detail how to realize the subliminal-freeness. Let us cad A the sender of the message M, B the receiver of M and W the active warden. A first sends the message to W, who sends it to B. A then convinces B that the message is indeed authentic, by answering (random) questions from B. The warden s role is to guarantee that these answers and questions can not be abused to send secret information in an hidden way. Hereto he will modify the questions and answers. Nevertheless the fact that these questions and answers have been modified, B must be still convincible that indeed A has sent the message and nobody else, the warden included. Let us now present the technical results. IV. SUBLIMINAL-FREE AUTHENTICATION To simplify the presentation, we first reduce the task of the warden to guarantee that A (the sender of the message M ) can not use a subliminal channel; however B (the receiver of the message M ) is allowed to send information in a subliminal way. At the end of this section we will also eliminate the possibility that B can use subliminal channels. The authentication mechanism we propose is a one-time-valid authentication scheme [5, p A one-time-valid authenticated message looses his validity once the authenticity of the message has been checked by the legitimate receiver of the message, or after a certain time. The concept of one-time-validity itself is certainly not new. It can be obtained by adding the actual date and time to the message. It can also be obtained using zero-knowledge 111,131. This approach is now used. Our system is partially based on the Goldwasser-Micali-Rivest signature
5 27 scheme, which was briefly explained in Section 11.. We also use some methods which were developed in [7]. From now on we assume that the message M and i are encoded with a prefix-free encoding [15]. Remark that no authentication tree is necessary, because the scheme is not a signature system and because our protocol is zero-knowledge. The need to use two different claw-free pairs (f and g) also disappears. The authentication mainly consists in proving that A knows fcl(r), where f is based on claw-free permutations, as explained in Section 11.. Let us explain the details of the protocol. n = p - q a Williams (Slum) integer together with R1, R2,..., Rk form the public key of the sender (A). The Rj are chosen randomly such that the Jacobi symbol of (Rj I n) = 1. p and q are secret. Before that A uses the system, W (the active warden) asks A to prove that n is indeed the product of two primes, which satisfy the above conditions. This can be done using a zero-knowledge protocol (see e.g., [lo]). This zero-knowledge protocol has only to be used once, because W can store n and label it as being verified. To authenticate a message M our public key authentication system follows the following protocol, where Steps 2-7 are repeated I times: Step 1 A sends the message M to W, who sends it to B. Step 2 A generates a t (not necessarily random) such that gcd(t, n) = 1 and squares it IMI times and multiplies it with (random) fl to obtain X = ft( lh ) (mod n) and sends X to W. Step 3 W checks that the Jacobi symbol (X I n) = 1. If it is not, then W stops the protocol, else W does similar as A did in Step 2 starting from a truzy random t to obtain X and sends a = + X Xi (mod n) to B. Step 4 B sends a (random) Boolean vector (El,..., Ek) to A (through the active warden). Step 5 A sends Y = t. n fg (frj) (mod n) to W, where +1 is used if Rj E;=l is a quadratic residue, else -1 is used. Step 6 W verifies (by squaring and multiplications) if Y is correct. If it is not, then W halts the protocol, else W sends,o = t Y (mod n) to B. Step 7 B verifies p by using square operations, multiplications, cr and A s public key. The last multiplication is by fl. Remark that A would be able to send one bit of information (the fact that the protocol could be halted) in Step 3 or in Step 6, however the warden is then able
6 28 to arrest A (if appropriated). The fact that this one bit of information, that A could send, is detectable by the warden implies that it is not a subliminal bit. Indeed subliminal as defined by Simmons implies undetectability by the warden. If necessary the warden can ask A to sign all her messages, so that the warden is able to prove later on that A tried to use a subliminal channel. However it is also possible that the warden (or an active eavesdropper) has tried to inject a fake message M and is unable to answer B s questions, and therefore stops the protocol. So B has no guarantee about the authenticity of this bit. To discuss the security of the above protocol we need to remind what the mafia fraud is [6]. Suppose that A proves statement S to B using zero-knowledge for example, then A will answer questions from B. If C is able to claim to D that she is proving S, using B as dishonest verifier of A s proof, then the proof system is not secure against the mafia fraud. Several zero-knowledge protocols allow this fraud in real-time. Hereto B and C have to communicate questions and answers respectively horn D to A and vice-versa. The mafia fraud is important to evaluate the security of authentication, signature and identification. Let us now discuss the security of our subliminal-free authentication system. Theorem 1 If one ezcludes the mafia fraud, the real sender will convince the prover and a fake prover will fail. This protocol is a zero-knowledge proof. Proof (sketch): Consider that the warden is not active, so t = X = 1, then the proof is similar as in [7, pp Theorem 2 Using the assumptions of [15], the protocol cannot be defrauded by the mafia fraud. To be more precise if A authenticates M an active eavesdropper can not modify the proof to authenticate M, unless the Goldwasser-Micali-Rivest system can be broken. Proof (sketch): Drop the effect of the active warden. The effect of the mafia fraud corresponds with an active eavesdropper who modifies M into M and tries to convince B about the authenticity of M. Hereto he can multiply X with X, exor Ej with and multiply Y with Y, such that if B checks Y, he is convinced that A has sent M. The proof consists in demonstrating that if the active eavesdropper succeeds then he can break the Goldwasser-Micali-Rivest [15] signature system. c7 Theorem 3 If n is of the appropriated form, then A is not able to send subliminal information (a more formal theorem will be given in the final paper). Proof (sketch): The proof is based on perfect secrecy. 0
7 29 In the previous protocol, B is able to send a secret message to A, by letting (El,..., El;) correspond with a part of the hidden (encrypted) message. This can be avoided by modifying Step 4 and Step 5 using the concept of commitment. The modifications are: Step 4.a W chooses a random Boolean vector (3'1). dom K and sends h~(f1,. condition (1)..., Fl;) and ran-.., Fl;) to B, where h satisfies Step 4.b B sends a (random) Boolean vector (El,,..,EL.) to W. Step 4.c W sends (Gl,...,Gl;) = (El 3 Fl,...,Ek Fl;) to A, and reveals (8'1)..., Fl;) and K to B. Step 4.d B verifies (Fly..., Fl;) and the protocol continues if correct. n f~(frj) (mod n) to W, where $1 is used if Rj Gj=1 is a quadratic residue, else -1 is used. Step 5 A sends Y = t - ~- - Remark that B will use the Gi at the moment that he checks p. The use of the concept of commitment was extremely important to avoid that the warden could cheat or that B could send subliminal information. The role of the active warden differs from before. Indeed to avoid that A can use a subliminal channel, the warden does not have to interact with A, he has to act similarly as an active eavesdropper. So the warden could interact in such a way that A and B are not conscious that he is intervening. However, to prevent B from sending siibliminal information, the warden and B must contact each other. The proofs of security of these protocols will be fully discussed in the final paper. To prove them a more formal definition of subliminal-freeness will be given. Remark that if B is able to break the security of the encryption E then B is able to cheat and the sublimindfreeness disappears. When one wants stronger guarantees that the protocol is subliminal-free the following adaptation can be used:.., El;) and ran- Step 4.a B chooses a (random) Boolean vector (El,. dom K and sends ~ K(E~,...,&) to W, where h satisfies condition (1). Step 4.b W sends a random Boolean vector (Fl,..., Fl;) to B. Step 4.c B reveals (El,...,&) and K to W. Step 4.d first W verifies (El,...,El;) and if correct then Mi sends (GI,..., Gt) = (El@ Fl,..., El; 3 8'k) to A and the protocol continues.
8 30 However, if W is able to break the security of E this time, then W can impersonate A by sending messages M and B will believe they originate fcom A. So, depending of how the protocol is used, the assumption that E is secure has Merent consequences. The reader could correctly remark that A is able to send subliminal information at the moment of publication of n, Rj (her public key) by choosing them specially. However these keys are constant, so the subliminal information that they can contain is strongly limited. In case the warden nevertheless worries about it, he is able to eliminate this danger in a similar way as we proceed in Section V. (for more details see [4]). V. SUBLIMINAL-FREE SIGNATURES The idea is to make the Goldwasser-Micali-Rest signature system subliminalfree. We use the same notations as in [15]. To make the signature subliminal free the warden has to guarantee that aiz the Rj, which are used in [15], are truly random. This can be obtained using the commitment idea. Before A starts to use her signature system, W has to be convinced (using zero-knowledge) that n has the appropriated form. To sign the jth message M, the following protocol is used: Step 1 A chooses a (random) quadratic residue Rj (mod n) and random K and sends ~K(R~) as commitment to W, together with the message M. Step 2 W chooses a truly random quadratic residue R; (mod n) and sends it to A. Step 3 A calculates Rj = Rj x R; (mod n) and uses this Rj in the same way as in [15]. Then A reveals her R'J. and K and sends the signature Qj and the necessary authenticator (Lj) to the warden. Step 4 W (the warden) checks q, the authenticator(s) and the signature. He also checks if the Jacobi symbols (a, 1 n) = (Lj I n) = 1. If one of these does not correspond, then the warden halts the protocol, else he sends (or publishes) M, the authenticator(s) multiplied by fl and the signature multiplied by fl. The warden stores the updated authentication tree, with the fl that he used. The same idea can be used to guarantee that &, which is a part of the public key of A, is subliminal-free. A is still able to send subliminal information in her public key n, by publishing a special n. It is theoretical possible to avoid this problem, however the implementation is involved (see [4]).
9 31 VI. PRACTICAL ASPECTS The first protocol discussed in Section IV. is easy to set-up. In case of verification of treaty or international bank communications, the host country can be the warden. The example of international bank communications is important from a commercial point of view. Indeed several banking organizations with international activities frequently face the problem that they are not allowed to use encryption to protect the privacy of their messages. Subliminal-free authentication would make their communications more secure without security objections from the corresponding countries where the banks operate. Subliminal-free authentication can be used in identification systems. By authenticating messages as: I, A, am at the moment in Town, Street, House Number, Floor,..., describing the exact location of A and B, more secure identification systems can be made [5, pp Making authentication systems subliminal-free, makes the use of it for identification more attractive. Many other applications exist. It is easy to adapt the first protocol in order to work with two wardens, not trusting each other. This dows the phone companies to act as warden in national and in international communications. The other protocols can also be adapted to have two wardens, but the protocols become then more involved. The speed of the protocols can be compared with the speed of RSA, if several tricks are used. Ideas as described in [9] can be used. Remark in this context that the Rj are constants, so A can significantly speed up the calculations of fil(frj), nevertheless that M is not constant. Hereto she has to store some values (more details will be given in the hal paper). A also can speed up the calculation of X using her knowledge of +(n). Much faster subliminal-free authentication and signature systems can be made partially based on [7,8]. However these schemes have also disadvantages. F ull details will be given in find paper. VII. CONCLUSION The problem of making subliminal-free authentication and signature systems, which was open for five years, is now solved. The applications of subliminal-free authentication go from verification of treaty to international banking communications. One can expect that in the near future more practical subliminal-free authentication and signature schemes will be presented using less interactions. The impact that non-interactive zero-knowledge [3] can have on such improvements has to be investigated.
10 32 REFERENCES [l] J. A. Adam. Ways to verify the U.S.-Soviet arms pact. IEEE Spectrum, pp , February [2] M. Blum. Coin apping by telephone - a protocol for solving impossible problems. In digest of papers COMPCON82, pp , IEEE Computer Society, February [3] M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp , May 2-4, [4] Y. Desmedt. Abuses in cryptography and how to fight them. August To be presented at Crypto 88. [5] Y. Desmedt. Major security problems with the dorgeable (Feige-)Fiat- Shamir proofs of identity and how to overcome them. In Securicom 88, 6th worldwide congress on computer and communications security and protection, pp , SEDEP Paris France, March 15-17, [S] Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat- Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto 87 (Lecture Notes in Computer Science 293), pp , Springer-Verlag, Santa Barbara, California, U.S.A., August [7] U. Feige, A. Fiat, and A. S h e. Zero knowledge proofs of identity. In Proceedings of the Nineteenth ACM Symp. Theory of Computing, STOC, pp , May 25-27, [8] A. Fiat and A. Sbamir. How to prove yourself: Practical solutions to identification and signature problems. In A. Odlyzko, editor, Advances in Cryptology, PTOC. of Crypto 86 (Lecture Notes in Computer Science 263)) pp , Springer-Verlag, Santa Barbara, California, U. S. A., August [9] 0. Goldreich. Two remarks concerning the Goldwasser-Mid-Rivest signature scheme. In A. Odlyzko, editor, Advances in Cyptology, PTOC. of Cypto 86 (Lecture Notes in Computer Science 263), pp , Springer- Verlag, Santa Barbara, California, U.S.A., August 11-15, [lo] 0. Goldreich, S. Micali, and A. Wigderson. How to prove all NP statements in zero-knowledge and a methodolgy of cryptographic protocol design. In A. Odlyzko, editor, Advances in Cryptology, PTOC. of Cypto 86 (Lecture Notes in Computer Science 2631, pp , Springer-Verlag, Santa Barbara, California, U. s. A., August [ll] 0. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In The Computer Society of IEEE, 27th Annual Symp. on Foundations of Computer Science (FOCS), pp , IEEE Computer Society Press, Toronto, Ontario, Canada, October 27-29, [12] S. Goldwasser and S. Micah. Probabilistic encryption. Journal of Computer and System Sciences, 28(2), pp , April 1984.
11 33 [13] S. Goldwasser, S. Micali, and C. Rackoff. Knowledge complexity of interactive proofs. In Proc. 17th STOC, pp , [14] S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp , April [15] S. Goldwasser, S. Micali, and R. Rivest. A paradoxical solution to the signature problem. In Proceedings of 25th Symp. on Foundation of Computer Science, pp , [16] G. J. Simmons. Message Authentication Without Secrecy, pp AAAS Selected Symposia Series 69, Westview Press, [17] G. J. Simmons. The prisoners problem and the subliminal channel. In D. Chaum, editor, Advances in Cyptology. PTOC. of Crypto 83, pp , Plenum Press N.Y., Santa Barbara, California, August [18] G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. PTOC. of Crypto 85 (Lecture Notes in Computer Science 218), pp , Springer-Verlag, Santa Barbara, California, August 18-22, I191 G. J. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. hgemaxsson, editors, Advances in Cryptology. Proc. of Eurocrypt 84 (Lecture Notes in Computer Science 209), pp , Springer-Verlag, Berlin, Paris, France, April 9-11, [20] G. J. Simmons. Verification of treaty compliance-revisited. In Proc. of the 1983 IEEE Symposium on Security and Privacy, pp , IEEE Computer Society Press, April Oakland, California. [21] H. C. Williams. A modification of the RSA public-key encryption procedure. IEEE Trans. Inform. Theory, 26(6), pp , November 1980.
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
A Secure and Efficient Conference Key Distribution System
********************** COVER PAGE ********************** A Secure and Efficient Conference Key Distribution System (Extended Abstract) Mike Burmester Department of Mathematics Royal Holloway University
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer. Yale University. S. Micali Massachusetts Institute of Technology
J, Cryptoiogy (1996) 9:191-195 Joumol of CRYPTOLOGY O 1996 International Association for Cryptologic Research A Secure Protocol for the Oblivious Transfer (Extended Abstract) M. J. Fischer Yale University
On the Difficulty of Software Key Escrow
On the Difficulty of Software Key Escrow Lars R. Knudsen and Torben P. Pedersen Katholieke Universiteit Leuven, Belgium, email: [email protected] Cryptomathic, Denmark, email: [email protected]
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
How to Prove a Theorem So No One Else Can Claim It
Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
ETH Zurich. Email: [email protected]. participants such that only certain groups of them can recover it.
Publicly Veriable Secret Sharing Markus Stadler? Institute for Theoretical Computer Science ETH Zurich CH-8092 Zurich, Switzerland Email: [email protected] Abstract. A secret sharing scheme allows to
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
LUC: A New Public Key System
LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar
Privacy-Providing Signatures and Their Applications PhD Thesis Author: Somayeh Heidarvand Advisor: Jorge L. Villar Privacy-Providing Signatures and Their Applications by Somayeh Heidarvand In fulfillment
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
A New, Publicly Veriable, Secret Sharing Scheme
Scientia Iranica, Vol. 15, No. 2, pp 246{251 c Sharif University of Technology, April 2008 A New, Publicly Veriable, Secret Sharing Scheme A. Behnad 1 and T. Eghlidos A Publicly Veriable Secret Sharing
Public Key (asymmetric) Cryptography
Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,
Public Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Pricing via Processing or Combatting Junk Mail
Pricing via Processing or Combatting Junk Mail Cynthia Dwork Moni Naor Draft of full version Abstract We present a computational technique for combatting junk mail, in particular, and controlling access
RSA Encryption. Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis [email protected] http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 Daniel Bleichenbacher Bell Laboratories 700 Mountain Ave., Murray Hill, NJ 07974 [email protected]
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Lecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 218 Advances in Cryptology CRYPTO '85 Proceedings Ischnbcha Hochsthule FACH8ESEICH INFORMAL LLLLL2 T H E K 6 Scichgebiete:- v..: Edited
RSA signatures and Rabin Williams signatures: the state of the art
RSA signatures and Rabin Williams signatures: the state of the art Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago, Chicago,
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones
Cryptanalysis of a Partially Blind Signature Scheme or How to make $100 bills with $1 and $2 ones Gwenaëlle Martinet 1, Guillaume Poupard 1, and Philippe Sola 2 1 DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg
How to Protect Peer-to-Peer Online Games from Cheats
How to Protect Peer-to-Peer Online Games from Cheats Haruhiro Yoshimoto Rie Shigetomi Hideki Imai University of Tokyo Imai Laboratory, Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba,
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Group Blind Digital Signatures: Theory and Applications by Zulækar Amin Ramzan Submitted to the Department of Electrical Engineering and Computer Science in partial fulællment of the requirements for the
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
On-Line/Off-Line Digital Signatures
J. Cryptology (996) 9: 35 67 996 International Association for Cryptologic Research On-Line/Off-Line Digital Signatures Shimon Even Computer Science Department, Technion Israel Institute of Technology,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Notes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)
Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
The science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
The 12th Australasian Conference on Information Security and Privacy (ACISP 07). (2 4 july 2007, Townsville, Queensland, Australia) J. Pieprzyk Ed. Springer-Verlag, LNCS????, pages??????. An Application
Linear Authentication Codes: Bounds and Constructions
866 IEEE TRANSACTIONS ON INFORMATION TNEORY, VOL 49, NO 4, APRIL 2003 Linear Authentication Codes: Bounds and Constructions Huaxiong Wang, Chaoping Xing, and Rei Safavi-Naini Abstract In this paper, we
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, Volume 13, Number 3. Pages 361 396, Springer-Verlag, 2000. 2000 International Association for Cryptologic Research Security Arguments for Digital Signatures and Blind Signatures
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
How To Know If A Message Is From A Person Or A Machine
The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau
Lecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
Applied Cryptography Public Key Algorithms
Applied Cryptography Public Key Algorithms Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Public Key Cryptography Independently invented by Whitfield Diffie & Martin
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
A Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
