Introduction to Cryptography CS 355



Similar documents
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?

Signature Schemes. CSG 252 Fall Riccardo Pucella

Digital signatures. Informal properties

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Digital Signature. Raj Jain. Washington University in St. Louis

Crittografia e sicurezza delle reti. Digital signatures- DSA

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptographic Hash Functions Message Authentication Digital Signatures

Authentication requirement Authentication function MAC Hash function Security of

Practice Questions. CS161 Computer Security, Fall 2008

1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.

Digital Signatures. What are Signature Schemes?

Computer Science A Cryptography and Data Security. Claude Crépeau

CS 758: Cryptography / Network Security

1 Signatures vs. MACs

Overview of Public-Key Cryptography

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Digital Signatures. Prof. Zeph Grunschlag

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Public Key Cryptography and RSA. Review: Number Theory Basics

Computer Security: Principles and Practice

Digital Signature CHAPTER 13. Review Questions. (Solution to Odd-Numbered Problems)

Textbook: Introduction to Cryptography 2nd ed. By J.A. Buchmann Chap 12 Digital Signatures

Cryptography Lecture 8. Digital signatures, hash functions

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Cryptography and Network Security Digital Signature

Introduction to Computer Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CSCE 465 Computer & Network Security

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Lecture 15 - Digital Signatures

MTAT Cryptology II. Digital Signatures. Sven Laur University of Tartu

Table of Contents. Bibliografische Informationen digitalisiert durch

DIGITAL SIGNATURES 1/1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

SECURITY IN NETWORKS

Introduction. Digital Signature

2. Cryptography 2.4 Digital Signatures

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Public Key (asymmetric) Cryptography

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CS549: Cryptography and Network Security

Recommendation for Applications Using Approved Hash Algorithms

Authentication, digital signatures, PRNG

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

CIS 5371 Cryptography. 8. Encryption --

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Randomized Hashing for Digital Signatures

Cryptography & Network Security

Message authentication and. digital signatures

Hash Functions. Integrity checks

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Digital signatures are one of the most important inventions/applications of modern cryptography.

Capture Resilient ElGamal Signature Protocols

EXAM questions for the course TTM Information Security May Part 1

CRC Press has granted the following specific permissions for the electronic version of this book:

Cryptography and Network Security Chapter 11

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptography and Network Security

Lecture 3: One-Way Encryption, RSA Example

Lecture 9: Application of Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Message Authentication Codes. Lecture Outline

1 Message Authentication

Chapter 7: Network security

One-Way Encryption and Message Authentication

Lecture 9 - Message Authentication Codes

Message Authentication

Elements of Applied Cryptography Public key encryption

Public Key Cryptography Overview

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

A Factoring and Discrete Logarithm based Cryptosystem

A Digital Signature Scheme in Web-based Negotiation Support System

Schnorr Signcryption. Combining public key encryption with Schnorr digital signature. Laura Savu, University of Bucharest, Romania

Chapter 10. Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

Implementation of Elliptic Curve Digital Signature Algorithm

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Advanced Cryptography

CRYPTOGRAPHY IN NETWORK SECURITY

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Public Key Cryptography of Digital Signatures

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Transcription:

Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1

Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru on Identification Schemes This topic will be covered in the final exam CS 355 Fall 2005 / Lecture 30 2

Lecture Outline Digital signatures Security requirements The RSA signatures The El Gamal signatures The DSA signatures CS 355 Fall 2005 / Lecture 30 3

Where Does This Fit? Secret Key Setting Public Key Setting Secrecy / Confidentiality Authenticity / Integrity Stream cipher Block cipher + encryption modes MAC Public key encryption: RSA, El Gamal, etc. Digital Signatures CS 355 Fall 2005 / Lecture 30 4

Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies that the signature on the bill is the same with the signature on the card Contracts, they are valid if they are signed. Can we have a similar service in the electronic world? CS 355 Fall 2005 / Lecture 30 5

Digital Signatures Digital Signature: a data string which associates a message with some originating entity. Digital Signature Scheme: a signing algorithm: takes a message and a (private) signing key, outputs a signature a verification algorithm: takes a (public) key verification key, a message, and a signature Provides: Authentication Data integrity Non-Repudiation (MAC does not provide this.) CS 355 Fall 2005 / Lecture 30 6

Adversarial Goals Total break: adversary is able to find the secret for signing, so he can forge then any signature on any message. Selective forgery: adversary is able to create valid signatures on a message chosen by someone else, with a significant probability. Existential forgery: adversary can create a pair (message, signature), s.t. the signature of the message is valid. A signature scheme can not be perfectly secure; it can only be computationally secure. Given enough time and adversary can always forge Alice s signature on any message. CS 355 Fall 2005 / Lecture 30 7

Attack Models for Digital Signatures Key-only attack: Adversary knows only the verification function (which is supposed to be public). Known message attack: Adversary knows a list of messages previously signed by Alice. Chosen message attack: Adversary can choose what messages wants Alice to sign, and he knows both the messages and the corresponding signatures. CS 355 Fall 2005 / Lecture 30 8

Digital Signatures and Hash Very often digital signatures are used with hash functions, hash of a message is signed, instead of the message. Hash function must be: Pre-image resistant Weak collision resistant Strong collision resistant CS 355 Fall 2005 / Lecture 30 9

RSA Signatures Key generation (as in RSA encryption): Select 2 large prime numbers of about the same size, p and q Compute n = pq, and Φ = (q - 1)(p - 1) Select a random integer e, 1 < e < Φ, s.t. gcd(e, Φ) = 1 Compute d, 1 < d < Φ s.t. ed 1 mod Φ Public key: (e, n) Secret key: d, CS 355 Fall 2005 / Lecture 30 10

RSA Signatures (cont.) Signing message M Verify 0 < M < n Compute S = M d mod n Verifying signature S Use public key (e, n) Compute S e mod n = (M d mod n) e mod n = M Note: in practice, a hash of the message is signed and not the message itself. CS 355 Fall 2005 / Lecture 30 11

RSA Signatures (cont.) Example of forging Attack based on the multiplicative property of property of RSA. y 1 = sig K (x 1 ) y 2 = sig K (x 2 ), then ver K (x 1 x 2 mod n, y 1 y 2 mod n) = true So adversary can create the valid signature y 1 y 2 mod n on the message x 1 x 2 mod n This is an existential forgery using a known message attack. CS 355 Fall 2005 / Lecture 30 12

El Gamal Signature Key Generation (as in ElGamal encryption) Generate a large random prime p such that DLP is infeasible in Z p and a generator g of the multiplicative group Z p of the integers modulo p Select a random integer a, 1 a p-2, and compute y = g a mod p Public key is (p; g ; β = g a ) Private key is a. Recommended sizes: 1024 bits for p and 160 bits for a. CS 355 Fall 2005 / Lecture 30 13

ElGamal Signature (cont.) Signing message M Select random k, 1 k p-1, k Z * p-1 Compute r = g k mod p s = k -1 ( h(m) - ar ) mod (p-1) Signature is: (r,s) Size of signature is double size of p NOTE: h is a hash function CS 355 Fall 2005 / Lecture 30 14

ElGamal Signature (cont.) Signature is: (r, s) r = g k mod p s = k -1 ( h(m) - ar ) mod (p-1) Verification Verify that r is in Z p-1* : 1 r p-1 Compute v 1 = β r r s mod p v 2 = g h(m) mod p Accept iff v 1 =v 2 QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. CS 355 Fall 2005 / Lecture 30 15

ElGamal Signature (cont.) Security of ElGamal signature Weaker than DLP k must be unique for each message signed Hash function h must be used, otherwise easy for an existential forgery attack without h, a signature on M Z p, is (r,s) s.t. β r r s = g M mod p choose u,v s.t. gcd(v,p-1)=1, then let r=g u β v mod p=g u+av mod p, and let s=-rv -1 mod (p-1) then β r r s = g ar (g u+av ) s = g ar g avs g us = g ar g av(-rv^{-1}) g us = g ar g -ar g us = g us i.e., (r,s) is a signature of the message us CS 355 Fall 2005 / Lecture 30 16

ElGamal Signature (Continued) 0 < r < p must be checked, otherwise easy to forge a signature on any message if an valid signature is available. given M, and r=g k, s=k -1 ( h(m) - ar ) mod (p-1) for any message M, let u=h(m ) / h(m) mod (p-1) computes s =su mod (p-1) and r s.t. r ru (mod (p-1)) AND r r (mod p), then β r r s = β ru r su = (β r r s ) u = (g h(m) ) u = g h(m ) CS 355 Fall 2005 / Lecture 30 17

Digital Signature Algorithm (DSA) Specified as FIPS 186 Key generation Select a prime q of 160-bits Choose 0 t 8 Select 2 511+64t < p < 2 512+64t with q p-1 Let α be a generator of Z p*, and set g = α (p-1)/q mod p Select 1 a q-1 Compute β = g a mod p Public key: (p, q, g, β) Private key: a CS 355 Fall 2005 / Lecture 30 18

DSA Signing message M: Select a random integer k, 0 < k < q Compute k -1 mod q r = (g k mod p) mod q s = k -1 ( h(m) + ar) mod q Signature: (r, s) Note: FIPS recommends the use of SHA-1 as hash function. CS 355 Fall 2005 / Lecture 30 19

DSA Verification Verify 0 < r < q and 0 < s < q, if not, invalid Compute u 1 = h(m)s -1 mod q, u 2 = rs -1 mod q Signature: (r, s) r = (g k mod p) mod q s = k -1 ( h(m) + ar) mod q Valid iff r = (g u 1 β u 2 mod p) mod q g u 1 β u 2 =g h(m)s^{-1} g ars^{-1} = g (h(m)+ar)s^{-1} = g k (mod p) CS 355 Fall 2005 / Lecture 30 20

Coming Attractions Security protocols CS 355 Fall 2005 / Lecture 30 21