Digital Signatures out of Second-Preimage Resistant Hash Functions
|
|
|
- Kelley Roberts
- 9 years ago
- Views:
Transcription
1 Digital Signatures out of Second-Preimage Resistant Hash Functions Erik Dahmen 1, Katsuyuki Okeya 2, Tsuyoshi Takagi 3, and Camille Vuillaume 2 1 Technische Universität Darmstadt [email protected] 2 Hitachi, Ltd., Systems Development Laboratory {katsuyuki.okeya.ue,camille.vuillaume.ch}@hitachi.com 3 Future University Hakodate [email protected] Abstract. We propose a new construction for Merkle authentication trees which does not require collision resistant hash functions; in contrast with previous constructions that attempted to avoid the dependency on collision resistance, our technique enjoys provable security assuming the well-understood notion of second-preimage resistance. The resulting signature scheme is existentially unforgeable when the underlying hash function is second-preimage resistant, yields shorter signatures, and is affected neither by birthday attacks nor by the recent progresses in collision-finding algorithms. Keywords: Merkle signatures, provable security, second-preimage resistance. 1 Introduction In 1979, Ralph Merkle proposed a digital signature scheme constructed out of cryptographic hash functions only [7]. The interest of this scheme is that, unlike most public-key cryptosystems, its security does not rely on number-theoretic problems. Even if a particular hash function appears insecure, the scheme can be easily repaired by using a different hash function. Finally, the current research suggests that the Merkle signature scheme (MSS) will be only marginally affected if large quantum computers are built, something that is not true for popular public-key cryptosystems such as RSA and ECC. The security of the original construction of the MSS relies on a collision resistant hash function for the hash tree and a preimage resistant function for the one-time signature stage [3]. Regarding security, this construction has two drawbacks. First, recent attacks on the collision resistance of popular hash functions such as MD5 [15] and SHA1 [14] show that collision resistance is a goal which is hard to achieve. Second, the security level of Merkle signatures is determined by the collision resistance property of the hash function and therefore affected by birthday attacks.
2 In [8], the authors argue, without proof, that the security level of the MSS should be determined by the second-preimage resistance property of the hash function. Although no attack based on a collision finder is known for the MSS, its security proof does not exclude the existence of such attacks. In addition, Rohatgi proposes using target-collision resistant hash functions for achieving goals that are similar to ours [11]. Unfortunately, practical hash functions were not designed with target-collision resistance in mind, and keyed hash functions such as HMAC lose all of their security properties when their key is revealed, and as such, cannot be regarded as target-collision resistant. Although we agree with [8] that second-preimage resistance should be at the heart of the security of the MSS, we emphasize that until now, no satisfactory solution is known, at least from a provable security perspective. In this paper, we propose a new construction for Merkle authentication trees and show that the resulting signature scheme is secure against adaptive chosen message attacks, assuming a second-preimage resistant hash function and a secure one-time signature scheme. Our construction is inspired by the XOR tree proposed by Bellare and Rogaway for building universal one-way hash functions out of universal one-way compression functions [1]. However, we use the XOR tree for a totally different purpose, namely establishing the unforgeability of the Merkle signature scheme, and we relax the assumption on the compression function to second-preimage resistance. Even for hash functions with short output size, our scheme provably yields a high security level; compared to the original MSS, not only security is improved, but the size of signatures is reduced as well. The paper is organized as follows: in Section 2 we review security notions for hash functions and signature schemes. In Section 3 we introduce the new construction and its security proof. In Section 4 we estimate the security level of the new scheme. In Section 5 we consider the problem of signing arbitrarily long messages. In Section 6 we present practical considerations. In Section 7 we state our conclusion. 2 Hash Functions and Signature Schemes Hash Functions. We call H K = { H k : {0,1} {0,1} n} a family of hash k K functions, parameterized by a key k K, that map bit strings of arbitrary length to bit strings of length n. There exist various security notions for hash functions, see [10] for an overview. In this paper we focus on the three most popular ones, namely preimage resistance, second-preimage resistance and collision resistance. In the following, x R X means that x is chosen uniformly at random. Preimage resistance. For any key k R K and y R H k ({0,1} n ) it is computationally infeasible to compute x {0,1} such that H k (x) = y. Second-preimage resistance. For any key k R K and x R {0,1} n it is computationally infeasible to compute x {0,1} such that x x and H k (x) = H k (x ). Collision resistance. For any key k R K it is computationally infeasible to compute x,x {0,1} such that x x and H k (x) = H k (x ).
3 We call a family H k of hash functions (t ow,ǫ ow ) preimage resistant (respectively (t spr,ǫ spr ) second-preimage resistant or (t cr,ǫ cr ) collision resistant), if for any adversary A that runs in time at most t ow (resp. t spr or t cr ), the probability of finding a preimage (resp. second-preimage or collision) is smaller than ǫ ow (resp. ǫ spr or ǫ cr ). Using generic (brute-force) attacks to compute preimages or second-preimages, one requires t ow = t spr = 2 n k evaluations of the hash function, to find a preimage or second preimage with probability ǫ ow = ǫ spr = 1/2 k. Due to the birthday paradox, one requires t cr = 2 n/2 evaluations of the hash function to find a collision with probability ǫ cr = 1/2. Signatures Schemes. A signature scheme Sign is defined as the triple (Gen, Sig, Ver). Gen is the key pair generation algorithm that on input a security parameter 1 n produces a pair (sk,pk), where sk is the private key or signature key and pk is the public key or verification key, (sk,pk) Gen(1 n ). Sig is the signature generation algorithm that on input a message M and private key sk produces a signature σ(m) Sig(M,sk). Ver is the verification algorithm that on input (M,σ(M),pk) checks whether the signature is valid, i.e. it outputstrue if and only if the signature is valid and false otherwise [4]. In the following, let t Gen,t Sig,t Ver be the time algorithms Gen,Sig,Ver require for key generation, signing and verification, respectively. Let Sign = (Gen,Sig,Ver) be a signature scheme. We call Sign a (t,ǫ,q) signature scheme or (t,ǫ,q) existentially unforgeable under an adaptive chosen message attack (CMA-secure), if for any forger For Sig sk( ) (pk), that has access to a signing oracle Sig sk ( ) and that runs in time at most t, the success probability in forging a signature is at most ǫ, where For Sig sk( ) (pk) can query the signing oracle at most Q times [4]. 3 Merkle Signatures using Second-Preimage Resistance In this section we describe our construction for the Merkle authentication tree, from now on called SPR-Merkle tree, and prove that the CMA-security of the resulting signature scheme (SPR-MSS) can be reduced to the second-preimage resistance of the used hash function and the CMA-security of the chosen onetime signature scheme (OTS). In the following, let H K = { H k : {0,1} 2n {0,1} n} k K be a family of (t spr,ǫ spr ) second-preimage resistant hash functions. Our construction differs to the original construction proposed by Merkle in the following way: before applying the hash function to the concatenation of two child nodes to compute their parent, both child nodes are XORed with a randomly chosen mask. Also, a leaf of the SPR-Merkle tree is not the hash value of the concatenation of the bit strings in the OTS verification key, but the bit strings themselves. The SPR-Merkle tree is constructed starting directly from these bit strings. For that reason, it is sufficient that the hash functions H k H K accept only bit strings of length at most 2n as input. In this section
4 we restrict the length of the message to be signed to n bits. The problem of signing arbitrarily long messages is considered in Section y i[j] random mask random mask (part of public key) k H (two masks/level) v i[0] v i[1] y i+1[2j] y i+1[2j+1] k H k H v i+1[0] v i+1[1] v i+1[0] v i+1[1] Fig. 1. XOR construction for the SPR-Merkle tree Key Pair Generation. The key pair generation of our scheme works as follows. First choose h 1, to determine the number of signatures that can be generated with this key pair, i.e. 2 h many. Next compute 2 h OTS key pairs (X j,y j ), for j = 0,...,2 h 1. We assume that each signature key and verification key consists of 2 l bit strings each of length n. Then choose a key for the hash function k R K and masks v i [0],v i [1] R {0,1} n uniformly at random for i = 0,...,h+l 1. The 2 h 2 l n-bit strings from the verification keys form the leaves of the SPR-Merkle tree, which in total yields a tree of height h + l. The nodes are denoted by y i [j], where i = 0,...,h + l denotes the height of the node in the tree (the root has height 0 and the leaves have height h + l) and j = 0,...,2 i 1 denotes the position of the node on that height, counting from left to right. The inner nodes are computed as y i [j] = H k ( (yi+1 [2j] v i [0] ) ( y i+1 [2j + 1] v i [1] )) for i = h + l 1,...,0 and j = 0,...,2 i 1, see Figure 1. The SPR-MSS private key consists of the 2 h OTS signature keys X j and the SPR-MSS public key consists of 1. the key for the hash function k, 2. the XOR masks v 0 [0],v 0 [1],...,v h+l 1 [0],v h+l 1 [1], and
5 3. the root of the Merkle tree y 0 [0]. Remark 1. In case the number of bit strings L in the verification key of the chosen OTS is not a power of 2, the resulting SPR-Merkle tree has height h + log 2 L. The SPR-Merkle tree is constructed such that the subtrees below the 2 h nodes y h [j] are unbalanced trees of height log 2 L. Signature Generation. For s {0,...,2 h 1}, the sth signature of message M = (m 0,...,m n 1 ) 2 is σ s (M) = ( s,σ OTS (M),Y s,a s ), where s is the index of the signature, σ OTS (M) is the one-time signature of M, generated with X s, Y s is the sth verification key, and A s = (a h,...,a 1 ) is the authentication path for Y s, where a i is the sibling of the node at height i on the path from y h [s] to the root y 0 [0], i.e. { yi [s/2 a i = h i 1],if s/2 h i 1 mod 2 y i [s/2 h i + 1],if s/2 h i, for i = 1,...,h. 0 mod 2 path to root p 1 = y 1[0] p 0 = y 0[0] a 1 = y 1[1] authentication path y h 2 [0] p h 2 = y h 2 [s/4] y h 2 [2 h 2 1] y h 1 [0] a h 1 = y h 1 [s/2 1] p h 1 = y h 1 [s/2] y h 1 [2 h 1 1] y h [0] p h = y h [s] a h = y h [s+1] y h [2 h 1] y h+l 1 [s2 l 1 ] y h+l 1 [(s+1)2 l 1 1] Y s y h+l [s2 l ] y h+l [s2 l +1] y h+l [(s+1)2 l 2] y h+l [(s+1)2 l 1] Fig. 2. Notations of the SPR-MSS Verification. The verification consists of two steps. First the verifier verifies the one-time signature of message M using the supplied verification key Y s. Then he verifies the authenticity of Y s as follows: first he uses the 2 l bit strings in Y s to compute the inner node y h [s] as y i [j] = H k ( yi+1 [2j] v i [0] y i+1 [2j + 1] v i [1] )
6 for i = h + l 1,...,h and j = s2 i h,...,(s + 1)2 i 1 1. Then he uses the authentication path A s and recomputes the path from y h [s] to the root y 0 [0] as ( (ai+1 H k v i [0] ) ( p i+1 v i [1] )),if s/2 h i+1 1 mod 2 p i = ( (pi+1 H k v i [0] ) ( a i+1 v i [1] )),if s/2 h i+1 0 mod 2 for i = h 1,...,0 and p h = y h [s]. The signature is valid if p 0 equals the signers public root y 0 [0] and the verification of σ OTS (M) was successful. Figure 2 illustrates how the authentication path can be utilized in order to recompute the root y 0 [0]. 3.1 Security of the SPR-MSS. We now reduce the CMA-security of the SPR-MSS to the second-preimage resistance of H K and the CMA-security of the used OTS. We do so by showing in Algorithm 1 how a forger For Sig sk( ) (pk) for the SPR-MSS can be used to construct an adversary Adv SPR,OTS that either finds a second-preimage for a random element of H K or breaks the CMA-security for a certain instance of the underlying OTS. In Algorithm 1, we use the convention that when algorithms called by Adv SPR,OTS fail, so does Adv SPR,OTS. Note that since the first-preimage x is chosen uniformly at random, so are the masks v a [0],v a [1]. As a consequence, the adversary Adv SPR,OTS creates an environment identical to the signature forging game played by the forger. We will now compute the success probability of Adv SPR,OTS. Case 1 (Y s, A s ) (Y s, A s ). The fact that the verification key Y s can be authenticated against the root y 0 [0] implies a collision of H k, see Appendix C. This collision can either occur during the computation of the inner node y h [s] or during the computation of the path from y h [s] to the root y 0 [0]. The adversary Adv SPR,OTS is successful in finding a second-preimage of x if the node y a [b] is computed as y a [b] = H k (x ) with x x. Since the position of node y a [b] was chosen at random, the probability that the collision occurs precisely at this position is at least 1/(2 h+l 1). In total, the success probability of Adv SPR,OTS is at least ǫ/(2 h+l 1), where ǫ is the success probability of the forger. Case 2 (Y s, A s ) = (Y s, A s ). In this case ( σ OTS (M ),M ) ( σ OTS (M s ),M s ) holds which implies that For Sig sk( ) (pk) generated an existential forgery for one instance of the underlying OTS. The probability that For Sig sk( ) (pk) breaks CMA-security of the supplied instance (s = c) is at least 1/2 h. In total, the success probability of Adv SPR,OTS is at least ǫ/2 h, where ǫ is the success probability of the forger. Note that since both cases are complementary, one occurs with probability at least 1/2. This leads to the following theorem:
7 Algorithm 1: Adv SPR,OTS Input: Hash function key k R K, tree height h 1, first-preimage x R {0, 1} 2n, OTS instance with verification key Y and signing oracle Sig X( ) Output: Second-preimage x {0, 1} 2n with x x and H k (x) = H k (x ), or existential forgery for the supplied instance of the OTS, or failure 1. Choose c R {0,..., 2 h 1} uniformly at random. 2. Generate OTS key pairs (X j, Y j), j = 0,..., 2 h 1, j c and set Y c Y. 3. Choose (a, b) R { (i, j) : i {0,..., h + l 1}, j {0,..., 2 i 1} }. 4. Choose random masks v i[0], v i[1] R {0, 1} n, i = 0,..., h + l 1, i a. 5. Construct the Merkle tree up to height a Choose v a[0], v a[1] {0, 1} n such that x = ( y a+1[2b] v a[0] ) ( y a+1[2b + 1] v a[1] ). Note that y a[b] = H k (x). 7. Use v a[0], v a[1] to complete the key pair generation. 8. Run For Sigsk( ) (pk). 9. When For Sigsk( ) (pk) asks its qth oracle query with message M q: (a) if q = c then obtain the one-time signature of M q using the signing oracle Sig X( ) provided as input: σ OTS(M q) Sig X(M q). (b) else compute σ OTS(M q) using the qth OTS signature key X q. (c) Respond to forger with signature σ q(m q) = ( ) q, σ OTS(M q), Y q, A q. 10. When For Sigsk( ) (pk) outputs signature σ s(m ) for M : (a) Verify the signature σ s(m ) = ( s, σ OTS(M ), Y s, A s). (b) if (Y s, A s) (Y s, A s): i. if y a[b] is computed during the verification as y a[b] = H k (x ) and x x holds then return x as second-preimage of x. ii. else return failure. (c) else (in that case (Y s, A s) = (Y s, A s)): i. if s = c then return (σ OTS(M ), M ) as forgery for the supplied instance of the OTS. ii. else return failure. Theorem 1 (Security of SPR-MSS). If H K = { H k : {0,1} 2n {0,1} n} k K is a family of (t spr,ǫ spr ) second-preimage resistant hash functions with ǫ spr 1/(2 h+l+1 2) and the used OTS is a (t ots,ǫ ots,1) signature scheme with ǫ ots 1/2 h+1, then the SPR-MSS is a (t,ǫ,2 h ) signature scheme with ǫ 2 max { (2 h+l 1) ǫ spr,2 h ǫ ots } 4 Comparison t = min { t spr,t ots } 2h t Sig t Ver t Gen. Security Level. We compute the security level of the SPR-MSS and compare it with the original MSS that relies on collision resistance (CR-MSS). As OTS we
8 use the Lamport Diffie one-time signature scheme (LD OTS) [6]. The following theorem establishes the security of the LD OTS (details of the reduction can be found in Appendix A). Theorem 2 (Security of LD-OTS). If F K = { F k : {0,1} n {0,1} n} k K is a family of (t ow,ǫ ow ) one-way functions with ǫ ow 1/4n, then the LD OTS is a (t,ǫ,1) signature scheme with ǫ 4n ǫ ow t = t ow t Sig t Gen By combining Theorems 1 and 2, we get ǫ 2 max { (2 h+log 2 2n 1) ǫ spr,2 h+log 2 4n ǫ ow } t = min { t spr,t ow } 2h t Sig t Ver t Gen. (1) Note that we can replace t ots by t ow rather than t ow t Sig t Gen since the time the OTS requires for signing and key generation are already included in Theorem 1. The security level is computed as the quotient t/ǫ. For the values t ow,t spr,ǫ ow and ǫ spr we consider the generic attacks of Section 2 and set ǫ ow = 1/2 h+log 2 4n+1 t ow = 2 n h log 2 4n 1 ǫ spr = 1/(2 h+log 2 2n+1 2) t spr = 2 n log 2 (2h+log 2 2n+1 2) (2) which yields ǫ = 1 in Equation (1). The times for signing, verifying, and key generation are stated in terms of evaluations of F k and H k. We set t Sig = (h+1) n (n to compute the LD OTS signature and h n as the average cost for the authentication path computation using Szydlo s algorithm [13]), t Ver = 3n+h 1 (n to verify the LD OTS signature, 2n 1 to compute the inner node y h [s], and h to compute the path to the root), and t Gen = 2 h+log 2 2n+1 1 (2 h 2n to compute the LD OTS verification keys and 2 h+log 2 2n 1 to compute the root. By substituting these values, we get t/ǫ = 2 n h log 2 4n 1 2 h+log 2 (h+1)n 2 log 2 (3n+h 1) 2 h+log 2 2n The values for t Sig,t Ver and t Gen affect the security level only for large h. Otherwise the security level can be estimated as 2 n h log 2 n 4. A similar result can be obtained for the security of the CR-MSS with the following theorem (details of the reduction can be found in Appendix B). Theorem 3 (Security of CR-MSS). If G K = { G k : {0,1} 2n {0,1} n} k K is a family of (t cr,ǫ cr ) collision resistant hash functions with ǫ cr 1/2 and the underlying OTS is a (t ots,ǫ ots,1) signature scheme with ǫ ots 1/2 h+1, then the CR-MSS is a (t,ǫ,2 h ) signature scheme with ǫ 2 max { ǫ cr,2 h ǫ ots } t = min { t cr,t ots } 2h t Sig t Ver t Gen
9 By combining Theorems 2 and 3, we get ǫ 2 max { ǫ cr,2 h+log 2 4n ǫ ow } t = min { t cr,t ow } 2h t Sig t Ver t Gen. (3) We now set ǫ cr = 1/2 and t cr = 2 n/2 (see Section 2) and use the values for ǫ ow,t ow from Equation (2) which yields ǫ = 1 in Equation (3). We further set t Sig = (h + 1) n, t Ver = n h and t Gen = 2 h 2n + 2 h+1 1 and get t/ǫ = 2 n/2 2 h+log 2 (h+1)n 2 log 2 (n+1+h) 2 h+log 2 2n 2 h Again, the values for t Sig,t Ver and t Gen affect the security level only for large h. Otherwise, the security level can be estimated as 2 n/2 1. Remark 2. It is possible to choose different trade-offs for the values in Equation (2). This however would not affect the resulting security level but only the upper bound for h. We chose these values because they correspond to the extreme case ǫ = 1 in Equation (1), where Theorems 1 and 3 still hold. Table 1 shows the security level of SPR-MSS and CR-MSS for different values of n. It also shows the upper bounds for h such that the security level of SPR- MSS and CR-MSS can be estimated as 2 n h log 2 n 4 and 2 n/2 1, respectively. Table 1. Security level of SPR-MSS and CR-MSS using the LD OTS Output length n Security level of SPR-MSS h h h h Maximal height of tree h h 52 h 67 h 98 h 114 Security level of CR-MSS Maximal height of tree h h 50 h 65 h 96 h 112 Table 1 shows that the security level is increased drastically when using the SPR-MSS. As a consequence, the SPR-MSS not only has weaker security assumptions, but hash functions with much smaller output size suffice to obtain the same security level as the CR-MSS. Nowadays, a security level of at least 2 80 is required. When using n = 128, the SPR-MSS achieves a security level greater than 2 80 for h 38. To obtain a similar security level with CR-MSS, one must use n = 224. Sizes. The CR-MSS public key consists of the root of the Merkle tree and the key for the hash function. Assuming this key has bit length n, the size of an CR-MSS public key is 2 n bits. The SPR-MSS public key must also contain the 2(h + l) XOR masks, each of bit length n. Therefore, in total the size of an
10 SPR-MSS public key is 2(h + l + 1) n bits. In case of the LD OTS we have l = log 2 2n. Using the same hash function, the signature size is the same for the CR-MSS and the SPR-MSS. When using the LD OTS, the one-time signature of the message consists of n bit strings of length n. The verification key also consists of n bit strings of length n, since half of the verification key can be computed from the signature. The authentication path consists of h bit strings of length n. In total, the size of a signature is (2n+h) n bits. Table 2 compares the signature and public key size of the SPR-MSS and the CR-MSS when using h = 20. Table 2. Sizes of SPR-MSS and CR-MSS using the LD OTS Public key size Signature size Security level SPR-MSS (n = 128) 7, 424 bits 35, 328 bits 2 98 CR-MSS (n = 160) 320 bits 54, 400 bits 2 79 CR-MSS (n = 224) 448 bits 104, 832 bits Table 2 shows that in addition to its superior security, the SPR-MSS also provides smaller signatures than the CR-MSS, at the expense of larger public keys. In fact, in many cases the signer s public key, embedded in a certificate, is part of the signature; for that reason the sum of the sizes of the public key and the signature is often relevant. However, even in this case, the SPR-MSS is still superior to the CR-MSS. 5 Signing Arbitrarily Long Data In Section 3 we restricted the length of the message to be signed to n bits. We now give some suggestions for signing arbitrarily long messages. The most straightforward way is to use a collision resistant hash function anyway. Although this solution requires stronger security assumptions, the SPR-MSS would still provide smaller signatures. A better approach is to use target collision resistant (TCR) hash functions [9, 1]. Recall that in the TCR game, the adversary must first commit to a message M, then receives the key K, and wins if he can output another message M such that H K (M) = H K (M ). The security notion TCR is stronger than secondpreimage resistance, but weaker than collision resistance [10]. In the TCR-hashand-sign paradigm, the signature of a message M is the pair ( σ(k H K (M)), K ), i.e. the key K must be signed as well. In [1], Bellare and Rogaway show how a TCR hash function can be constructed from a TCR compression function using the XOR tree we used in SPR-MSS. In this case, the length of the hash key depends on the message length. If M has bit length n b, the bit length of the key K is 2n log 2 b. In [12] Shoup proposed a linear construction for TCR
11 hash functions that reduce the bit length of the key to n log 2 b. However, even with Shoup s hash function, the key size still depends (logarithmically) on the message length, and can be relatively large. In order to solve the problem of long keys, Bellare and Rogaway suggested iterating TCR hash functions [1]. For example, the TCR hash function can be iterated with three different keys K 1, K 2 and K 3 as depicted in Figure 3; in this case, although the three keys must be transmitted with the signature, only K 3 must be signed. Since each round reduces the size of the input to the next hash function, assuming a message with b blocks, after three iterations, the size of the final key K 3 will have about log 2 (log 2 (log 2 (b))) blocks of n bits. With a 128-bit hash function, if K 3 is allowed to have at most 3 blocks, then messages up to 2 63 blocks (or 2 71 bits) can be signed. M C 1 C 2 C 3 H 1 H 2 H 3 Sig K 1 K 2 K 3 σ signature= K 1, K 2, K 3, σ with σ = Sig(K 3 C 3) Fig. 3. Iterating TCR hash functions Unfortunately, even when TCR hash functions are iterated, the signature size is somewhat large: if K 3 has three blocks, the input to the signature scheme has 4n bits, and the signature size is about 4n 2 bits. In [5] Halevi and Krawczyk introduce yet another security notion, which they call enhanced target collision resistance (etcr). Unlike the TCR game, the adversary commits to a message M, receives the key K, and wins if he finds another key and another message such that H K (M) = H K (M ). When using etcr hash functions, it is no longer necessary to sign the key. Furthermore, Halevi and Krawczyk proved that an etcr hash function can be instantiated by a real-world hash function, where the blocks of the input message are randomized with a single key, and the key is appended to the message [5]. Their proof assumes that the underlying compression function has second-preimage resistance-like properties, which they call espr (evaluated second-preimage resistance). Using an etcr hash function and assuming espr for the underlying compression function, our scheme yields signatures of only about n 2 bits. 6 Practical considerations Using a Real-World Hash Function. Most of our proofs are based on a second-preimage resistant family of hash functions. Although there is no explicit family for SHA1 or MD5, one can regard the initial chaining value as a
12 key [10], or consider the hash functions themselves to be the key, through the random choices made by their designers [1]. However, in that case, the key is known by adversaries before starting the experiment, and not randomly chosen in the experiment; the corresponding security notion is called always secondpreimage resistant by Rogaway and Shrimpton [10]. Our theorems apply to any second-preimage-resistant hash function, including always second-preimage resistant hash functions. Using a Pseudo-Random Number Generator. In the description of our signature scheme, we assumed that the 2 h one-time signature secret keys X j are completely stored by the signer. In practice, if the number of signatures 2 h is large, this is of course completely out of question. Instead of randomly generating the OTS secret keys X j, one can take them as output of a pseudo-random number generator with a unique seed, which totally eliminates the issue of storage. The resulting scheme can be proven to be secure with the additional assumption that the output of the PRNG is indistinguishable from a truly random number [3]. Shorter One-Time Signatures. The main drawback of Merkle signatures is their long signature size. In fact, the one-time signature scheme is mostly responsible for these lengthy signatures, because one-time signatures typically have a number of blocks proportional to the number of bits to sign. Improving on the original idea of Lamport, Merkle proposed using one block for each message bit, where a checksum is appended to the message [7]. In addition, Winternitz suggested processing message bits by blocks of w consecutive bits, at the expense of some more hash computations [7]. Combining these ideas, the number of bit strings for one instance of the OTS is l = n 2 /w + log 2 (n/w) /w, the size of one-time signatures l n and the number of hash evaluations for signing (and verifying) is on average 2 w 1 l [2]. Although there are other techniques for constructing one-time signature schemes out of hash functions, and especially using graphs instead of trees, practical implementations of one-time signatures using the improvements from Merkle and Winternitz often outperform graphbase one-time signatures [2]. 7 Conclusion We proposed SPR-MSS, a variant of the Merkle signature scheme with much weaker security assumptions than the original construction. More precisely, our scheme is existentially unforgeable under adaptive chosen message attacks, assuming second-preimage and preimage resistant hash functions. Compared to the original Merkle signature which relies on a collision-resistant hash function, SPR-MSS provides a higher security level even when the underlying hash function has a smaller output size. For instance, when using a 128-bit hash function such as MD5, which is still secure in view of second-preimage resistance, SPR- MSS offers a security level better than 2 80 for trees of height up to 38.
13 References 1. Mihir Bellare and Phillip Rogaway. Collision-resistant hashing: Towards making UOWHFs practical. In Advances in Cryptology - CRYPTO 97, volume 1294 of LNCS, pages Springer, Chris Dods, Nigel Smart, and Martijn Stam. Hash based digital signature schemes. In Cryptography and Coding, volume 3796 of LNCS, pages Springer, Luis Carlos Coronado García. On the security and the efficiency of the merkle signature scheme. Cryptology eprint Archive, Report 2005/192, eprint.iacr.org/. 4. Shafi Goldwasser, Silvio Micali, and Ron L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2): , Shai Halevi and Hugo Krawczyk. Strengthening digital signatures via randomized hashing. In Advances in Cryptology - CRYPTO 2006, volume 4117 of LNCS, pages Springer, Leslie Lamport. Constructing digital signatures from a one way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory, Ralph C. Merkle. A certified digital signature. In Advances in Cryptology - CRYPTO 89, volume 435 of LNCS, pages Springer, Dalit Naor, Amir Shenhav, and Avishai Wool. One-time signatures revisited: Have they become practical. Cryptology eprint Archive, Report 2005/442, http: //eprint.iacr.org/. 9. Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In 21st Annual ACM Symposium on Theory of Computing - STOC 89, pages ACM Press, Philip Rogaway and Thomas Shrimpton. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Fast Software Encryption - FSE 2004, volume 3017 of LNCS, pages Springer, Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In ACM Conference on Computer and Communications Security - CSS 99, pages ACM Press, Victor Shoup. A composition theorem for universal one-way hash functions. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages Springer, Michael Szydlo. Merkle tree traversal in log space and time. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages Springer, Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full SHA-1. In Advances in Cryptology - CRYPTO 2005, volume 3621 of LNCS, pages Springer, Xiaoyun Wang and Hongbo Yu. How to break MD5 and other hash functions. In Advances in Cryptology - EUROCRYPT 2005, volume 3494 of LNCS, pages Springer, 2005.
14 A Security of the Lamport Diffie One-Time Signature Scheme This Section describes the Lamport Diffie one-time signature scheme (LD OTS) [6] { and states a security reduction to the used one-way function. Let F K = Fk : {0,1} n {0,1} n} be a family of one-way functions. The one-time k K signature key of the LD OTS consists of the 2n n bit strings x i [0],x i [1] R {0,1} n,i = 0,...,n 1 and a key for the one-way function k R K. The verification key Y consists of the 2n n-bit strings ( y i [0],y i [1] ) = ( F k (x i [0]),F k (x i [1]) ) for i = 0,...,n 1 and the key k. The signature of an n-bit message M = (m 0,...,m n 1 ) 2 is given as σ i = x i [m i ],i = 0,...,n 1, i.e. the bit strings from the signature key are chosen according to the bits of the message; x i [0] if m i = 0 and x i [1] if m i = 1. To verify a signature one has to check if F k (σ i ) = y i [m i ] holds for all i = 0,...,n 1. The time required by the LD OTS for key generation, signing and verifying in terms of evaluations of F k are t Gen = 2n, t Sig = n and t Ver = n, respectively. We disregard the time required to randomly choose the signature key and assume the signer does not store the verification key. Algorithm 2 shows how a forger For SigX( ) (Y ) for the LD OTS can be used to construct an inverter for an random element of F K. In other words, the security of the LD OTS is reduced to the preimage resistance of F K. Algorithm 2: Adv Pre Input: k R K and y F k ({0, 1} n ) Output: x such that y = F k (x) or failure 1. Generate LD OTS key pair (X, Y ). 2. Choose a R {1,..., n} and b R {0, 1}. 3. Replace y a(b) with y in the LD OTS verification key Y. 4. Run For Sig X( ) (Y ). 5. When For Sig X( ) (Y ) asks its only oracle query with M = (m 0,..., m n 1) 2: (a) if m a = (1 b) then sign M and respond to For Sig X( ). (b) else return failure. 6. When For Sig X( ) outputs signature for message M = (m 0,..., m n 1) 2: (a) if m a = b then return σ a as preimage of y. (b) else return failure. The adversary Adv Pre is successful in finding a preimage of y if and only if For SigX( ) (Y ) queries an M with m a = (1 b) (Line 5a) and returns a valid signature for M with m a = b (Line 6a). The probability for m a = (1 b) is 1/2. Since M must be different from the queried message M, there exists at least one index c such that m c = 1 m c. Adv Pre is successful if a = c, which happens with probability at least 1/2n. This result is summarized in Theorem 2 in Section 4.
15 B Security of the Original Merkle Signature Scheme This section states a security reduction for the original Merkle signature scheme to the collision resistance of the used compression function and the CMA-security of the underlying OTS. The reduction is similar to what was shown in Section 3.1; the main difference being that we are satisfied if we find a collision anywhere in the tree. Let G K = { G k : {0,1} 2n {0,1} n} be a family of collision k K resistant hash functions. Algorithm 3 shows how a forger For Sigsk( ) (pk) for the MSS can be used to construct a collision finder for a random element of G K. Algorithm 3: Adv CR,OTS Input: Key for the hash function k R K, height of the tree h 1, an instance of the underlying OTS consisting of a verification key Y and the corresponding signing oracle Sig X( ) Output: Collision of G k, existential forgery for the supplied instance of the OTS, or failure 1. Choose c R {0,..., 2 h 1} uniformly at random. 2. Generate OTS key pairs (X j, Y j), j = 0,..., 2 h 1, j c and set Y c Y. 3. Complete the key pair generation. 4. Run For Sigsk( ) (pk). 5. When For Sigsk( ) (pk) asks its qth oracle query with message M q: (a) if q = c then obtain the one-time signature of M q using the signing oracle Sig X( ) provided as input: σ OTS(M q) Sig X(M q). (b) else compute σ OTS(M q) using the qth OTS signature key X q. (c) Generate the MSS signature σ q(m q) = ( ) q, σ OTS(M q), Y q, A q and respond to the forger. 6. When For Sigsk( ) (pk) outputs signature σ s(m ) = ( s, σ OTS(M ), Y s, A s) for M : (a) verify the signature σ s(m ). (b) if (Y s, A s) (Y s, A s) then return a collision of G k. (c) else (if (Y s, A s) = (Y s, A s)): i. if s = c then return (σ OTS(M ), M ) as forgery for the supplied instance of the OTS. ii. else return failure. To compute the success probability of Adv CR,OTS we have to distinguish two cases. Case 1 (Y s,a s) (Y s,a s ): The fact that the verification key Y s can be authenticated against the root y 0 [0] implies a collision of G k, see Appendix C. The success probability of finding a collision is at least ǫ, the success probability of the forger. Case 2 (Y s,a s) = (Y s,a s ): In this case ( σ OTS (M ),M ) ( ) σ OTS (M s ),M s holds which implies that For Sigsk( ) (pk) generated an existential forgery for
16 one instance of the underlying OTS. The probability that For Sig sk( ) (pk) breaks CMA-security of the supplied instance (s = c) is at least 1/2 h. In total, the success probability of Adv SPR,OTS is at least ǫ/2 h, where ǫ is the success probability of the forger. Note that since both cases are complementary, one occurs with probability at least 1/2. This result is summarized in Theorem 3 in Section 4. C (Y s, A s ) (Y s, A s ) Implies a Collision Case 1 A s A s : Let h δ > 0 be the index where the authentication paths are different, i.e. a δ a δ. Further let (p h,...,p 0), (p h,...,p 0 ) be the paths from node y h [s] to the root y 0 [0] constructed using the authentication paths A s,a s, respectively. We certainly know that p 0 = p 0 holds. If p δ 1 = p δ 1, then (a δ p δ ),(a δ p δ ) is a collision for H k. Otherwise, there exists an index δ > γ > 0 such that p γ p γ and p γ 1 = p γ 1. Then, (a γ p γ),(a γ p γ ) is a collision for H k. Note, that the order in which a i and p i are concatenated depends on the index s in the signature. Case 2 Y s Y s : Let s 2 l δ < (s+1) 2 l be the index where the bit strings in the verification keys are different, i.e. y δ y δ. If y h [s] = y h[s], there exists an index h + l γ > h such that y γ[β] y γ [β] and y γ 1[ β/2 ] = y γ 1 [ β/2 ], with β = δ/2 h+l γ. Then a collision for H k is given as { (y γ [β] y γ[β + 1]),(y γ [β] y γ [β + 1]),if β 0 mod 2 (y γ[β 1] y γ[β]),(y γ [β 1] y γ [β]),if β 1 mod 2. Otherwise, that is if y h [s] y h[s], similar arguments as in Case 1 can be used to find a collision.
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
CMSS An Improved Merkle Signature Scheme
CMSS An Improved Merkle Signature Scheme Johannes Buchmann 1, Luis Carlos Coronado García 2, Erik Dahmen 1, Martin Döring 1, and Elena Klintsevich 1 1 Technische Universität Darmstadt Department of Computer
Hash-based Digital Signature Schemes
Hash-based Digital Signature Schemes Johannes Buchmann Erik Dahmen Michael Szydlo October 29, 2008 Contents 1 Introduction 2 2 Hash based one-time signature schemes 3 2.1 Lamport Diffie one-time signature
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
A Novel Approach for Signing Multiple Messages: Hash- Based Signature
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
XMSS A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
XMSS A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions Second Version, 26. November 2011 Johannes Buchmann, Erik Dahmen, and Andreas Hülsing {buchmann,dahmen,huelsing}@cdc.informatik.tu-darmstadt.de
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
On-Line/Off-Line Digital Signatures
J. Cryptology (996) 9: 35 67 996 International Association for Cryptologic Research On-Line/Off-Line Digital Signatures Shimon Even Computer Science Department, Technion Israel Institute of Technology,
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
One-Way Encryption and Message Authentication
One-Way Encryption and Message Authentication Cryptographic Hash Functions Johannes Mittmann [email protected] Zentrum Mathematik Technische Universität München (TUM) 3 rd Joint Advanced Student School
Provable-Security Analysis of Authenticated Encryption in Kerberos
Provable-Security Analysis of Authenticated Encryption in Kerberos Alexandra Boldyreva Virendra Kumar Georgia Institute of Technology, School of Computer Science 266 Ferst Drive, Atlanta, GA 30332-0765
Length extension attack on narrow-pipe SHA-3 candidates
Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY [email protected]
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
The Exact Security of Digital Signatures How to Sign with RSA and Rabin
Appears in Advances in Cryptology Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996. The Exact Security of Digital Signatures How to Sign with
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)
The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?) Hugo Krawczyk Abstract. We study the question of how to generically compose symmetric encryption and authentication
Digital signatures are one of the most important inventions/applications of modern cryptography.
CHAPTER 7: DIGITAL SIGNATURES Digital signatures are one of the most important inventions/applications of modern cryptography. Part VII Digital signatures The problem is how can a user sign (electronically)
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
Fast Hash-Based Signatures on Constrained Devices
Fast Hash-Based Signatures on Constrained Devices Sebastian Rohde 1, Thomas Eisenbarth 1, Erik Dahmen 2, Johannes Buchmann 2, and Christof Paar 1 1 Horst Görtz Institute for IT Security Ruhr University
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
The Future of Digital Signatures. Johannes Buchmann
The Future of Digital Signatures Johannes Buchmann Digital Signatures Digital signatures document sign signature verify valid / invalid secret public No IT-Security without digital signatures Software
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, Volume 13, Number 3. Pages 361 396, Springer-Verlag, 2000. 2000 International Association for Cryptologic Research Security Arguments for Digital Signatures and Blind Signatures
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes
Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg
Outline CSc 466/566 Computer Security 8 : Cryptography Digital Signatures Version: 2012/02/27 16:07:05 Department of Computer Science University of Arizona [email protected] Copyright c 2012 Christian
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Twin Signatures: an Alternative to the Hash-and-Sign Paradigm
Proceedings of the 8th ACM Conference on Computer and Communications Security. Pages 20 27. (november 5 8, 2001, Philadelphia, Pennsylvania, USA) Twin Signatures: an Alternative to the Hash-and-Sign Paradigm
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak
Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a
Authentication, digital signatures, PRNG
Multimedia Security Authentication, digital signatures, PRNG Mauro Barni University of Siena Beyond confidentiality Up to now, we have been concerned with protecting message content (i.e. confidentiality)
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
On the Security of CTR + CBC-MAC
On the Security of CTR + CBC-MAC NIST Modes of Operation Additional CCM Documentation Jakob Jonsson * jakob [email protected] Abstract. We analyze the security of the CTR + CBC-MAC (CCM) encryption mode.
Chapter 12. Digital signatures. 12.1 Digital signature schemes
Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this
Universal Padding Schemes for RSA
Universal Padding Schemes for RSA Jean-Sébastien Coron, Marc Joye, David Naccache, and Pascal Paillier Gemplus Card International, France {jean-sebastien.coron, marc.joye, david.naccache, pascal.paillier}@gemplus.com
DIGITAL SIGNATURES 1/1
DIGITAL SIGNATURES 1/1 Signing by hand COSMO ALICE ALICE Pay Bob $100 Cosmo Alice Alice Bank =? no Don t yes pay Bob 2/1 Signing electronically Bank Internet SIGFILE } {{ } 101 1 ALICE Pay Bob $100 scan
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks Ioannis Krontiris Athens Information Technology P.O.Box 68, 19.5 km Markopoulo Ave. GR- 19002, Peania, Athens, Greece
Fast Batch Verification for Modular Exponentiation and Digital Signatures
An extended abstract of this paper appears in Advances in Cryptology Eurocrypt 98 Proceedings, Lecture Notes in Computer Science Vol. 1403, K. Nyberg ed., Springer-Verlag, 1998. This is the full version.
MACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives Olivier Pereira Université catholique de Louvain ICTEAM Crypto Group B-1348, Belgium [email protected]
Cryptography and Network Security Chapter 11
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
New Online/Offline Signature Schemes Without Random Oracles
New Online/Offline Signature Schemes Without Random Oracles Kaoru Kurosawa 1 and Katja Schmidt-Samoa 2 1 Department of Computer and Information Sciences, Ibaraki University, Japan 2 Fachbereich Informatik,
How To Attack Preimage On Hash Function 2.2 With A Preimage Attack On A Pre Image
Preimage Attacks on 4-Step SHA-256 and 46-Step SHA-52 Yu Sasaki, Lei Wang 2, and Kazumaro Aoki NTT Information Sharing Platform Laboratories, NTT Corporation 3-9- Midori-cho, Musashino-shi, Tokyo, 8-8585
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
Digital Signatures. Prof. Zeph Grunschlag
Digital Signatures Prof. Zeph Grunschlag (Public Key) Digital Signatures PROBLEM: Alice would like to prove to Bob, Carla, David,... that has really sent them a claimed message. E GOAL: Alice signs each
Digital signatures. Informal properties
Digital signatures Informal properties Definition. A digital signature is a number dependent on some secret known only to the signer and, additionally, on the content of the message being signed Property.
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Randomized Hashing for Digital Signatures
NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
An extended abstract of this paper appears in Tatsuaki Okamoto, editor, Advances in Cryptology ASIACRYPT 2000, Volume 1976 of Lecture Notes in Computer Science, pages 531 545, Kyoto, Japan, December 3
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Ch.9 Cryptography. The Graduate Center, CUNY.! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis
Ch.9 Cryptography The Graduate Center, CUNY! CSc 75010 Theoretical Computer Science Konstantinos Vamvourellis Why is Modern Cryptography part of a Complexity course? Short answer:! Because Modern Cryptography
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Elliptic Curve Hash (and Sign)
Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43
Identity-Based Encryption from the Weil Pairing
Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages
