A Digital Signature Scheme in Web-based Negotiation Support System



Similar documents
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CS 758: Cryptography / Network Security

Savitribai Phule Pune University

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

CRYPTOGRAPHY IN NETWORK SECURITY

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Introduction to Cryptography CS 355

Understanding digital certificates

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Using etoken for SSL Web Authentication. SSL V3.0 Overview

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

Chapter 7: Network security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

SECURITY IN NETWORKS

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Overview. SSL Cryptography Overview CHAPTER 1

Overview of Public-Key Cryptography

SSL A discussion of the Secure Socket Layer

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Information Security

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Message authentication and. digital signatures

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Cryptography and Network Security Chapter 14

Introduction to Computer Security

Controller of Certification Authorities of Mauritius

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Practice Questions. CS161 Computer Security, Fall 2008

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Software Tool for Implementing RSA Algorithm

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security Technology Network Management

Lecture 9: Application of Cryptography

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Client Server Registration Protocol

Lukasz Pater CMMS Administrator and Developer

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Content Teaching Academy at James Madison University

Cornerstones of Security

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Authentication requirement Authentication function MAC Hash function Security of

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Pre requisites for Digital Signature

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

7! Cryptographic Techniques! A Brief Introduction

An Introduction to Cryptography and Digital Signatures

Instructions on TLS/SSL Certificates on Yealink Phones

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

What is network security?

Network Security. HIT Shimrit Tzur-David

CSE/EE 461 Lecture 23

A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE

Introduction to Cryptography

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Fighting product clones through digital signatures

Introduction to Security and PIX Firewall

Understanding Digital Certificates and Secure Sockets Layer (SSL)

An Introduction to Cryptography as Applied to the Smart Grid

TLS and SRTP for Skype Connect. Technical Datasheet

Chapter 16: Authentication in Distributed System

How To Create A Digital Signature Certificate

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Security. Learning Objectives. This module will help you...

Signature Schemes. CSG 252 Fall Riccardo Pucella

Key Management and Distribution

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University

Quickstream Connectivity Options

IT Networks & Security CERT Luncheon Series: Cryptography

CSCE 465 Computer & Network Security

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Chapter 17. Transport-Level Security

[SMO-SFO-ICO-PE-046-GU-

Chapter 10. Cloud Security Mechanisms

Network Security Protocols

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security Policy Revision Date: 23 April 2009

GT 6.0 GSI C Security: Key Concepts

Application Layer (1)

Business Issues in the implementation of Digital signatures

Transcription:

A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada yxmeng68@yahoo.ca 2 School of Computer, Wuhan University, Wuhan, P. R. China, 430072 bmengwhu@sina.com Abstract. With the rapid development of electronic commerce, digital signature is very important in preventing from forging, tampering, and disavowing electronic contract in web-based negotiation support system (WNSS). Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures, a digital signature scheme for electronic contracts is presented in the paper. Public key algorithm, hash function and interceders are used in the scheme. The feasibility and implementation of the scheme in WNSS are discussed. 1 Introduction The web-based negotiation support system (WNSS) has been developed and applied in electronic commerce, which could be used to support the negotiators to negotiate through Internet [1, 2]. WNSS can provide real-time remote supports and services in every phases of negotiation. Negotiators can use WNSS to deal with business negotiations and bargaining at any place of the world conveniently. In the traditional business negotiations, two parties of the negotiation usually sign or stamp on the paper contract, if the negotiation is successful, namely black and white. In this way we can identify trade associates, confirm the reliability of contract and prevent from disavowing. However, when the negotiators agree with a protocol or electronic contract in WNSS, we also need credible identification and implement digital signature to prevent from disavowing. Furthermore, the electronic contract without signatures is easily modified. And the integrity and authenticity of the contract can t be assured. Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures [3-8], this paper presented a digital

622 Yuxuan Meng 1 and Bo Meng 2 signature scheme for electronic contracts in WNSS, which use public key algorithm, hash function and interceders. The digital signature scheme can assure the reliability of electronic contracts and prevent from disavowing effectively. The feasibility and implementation of the digital signature scheme in WNSS are discussed. 2 Digital Signature and Digital Certificates 2.1 Digital Signature The real purpose of a signature is for an individual/entity to provide a stamp of approval of the data or document under review. In today s world, almost every legal financial transaction is formalized on paper. A signature or multiple signatures on the paper guarantee its authenticity. The signature is typically used for the purposes of user authentication and document authentication. Signatures on the paper have two functions. One is preventing from disavowing, so that we can confirm that the file has been subscribed. Another is preventing from copying, so that we can confirm the reality of the file. Digital signatures have the same functions of paper-based signatures. However, the digital signatures are more different from paper-based signatures. Because the digital signatures are so dependent on the actual data content, they are very suitable for digital data, which can be tampered with quite easily. The digital signatures have especial problems to be solved. Firstly, the digital file is easily to be copy, even the digital signature is difficult to forge, but cutting and plastering valid signature is so easy. Secondly, the digital file is easily to modify after the digital signature, and the modified file won t leave any trace. Thus simple graphic tag that simulates manual signature can t be used for digital signature. Digital signature should have some characteristics as follows. (1) Digital signature should use the information that can only identify signatory. (2) The content of the message that would be signed can be authentication before signature. (3) Digital signature could be validated by the third party in order to resolve dispute. Obviously digital signature not only has the function of identification, but also authentication. Digital signature can be used to preventing from forging signature, tampering information, sending message in the name of other people and denying the information that has been sent/received. 2.2 Digital Signature Algorithms 2.2.1 Symmetric algorithms with interceder The precondition of this algorithm is that sender and receiver fully trust interceder. Let S, T, R denote sender, interceder and receiver respectively. Then the algorithm is described as follows [3, 4]. (1) S and T share key K A, R and T share key K B.

A Digital Signature Scheme in Web-based Negotiation Support System 623 (2) S encrypt file M with K A to generates K A (M). Then S sends K A (M) to T. (3) Because only S and T share K A, if T can decrypt K A (M) with K A, T can confirm the message coming from S. Then T write a declaration D to prove that he have received the M from S. At last T use K B to encrypt M and D: K B (M, D). (4) T sends K B (M, D) to S. (5) S use K B to decrypt K B (M, D), then gets M and D. From D, S could assure the M comes from S. 2.2.2 Public key algorithms Public key algorithms are asymmetric algorithms, which are very suitable for digital signature, because they have public key and private key. It is very important to choose the private key for using Public key algorithms to encrypt file. The keys must meet three conditions: SK(PK(M))=M PK(SK(M))=M. To calculate SK from PK is very difficult. It is impossible to determine the M from part of plaintext. The algorithm is described as follows [3, 4]. (1) S encrypts plaintext M with his own private key SK to generate SK (M). (2) S sends SK (M) to R. (3) R decrypts with S s public key PK to get M. If R could carry out step (3), the digital signature of S is valid. 2.2.3 Public key algorithm with hash function The efficiency of using public key algorithm to encrypt long file is very low. Therefore hash function is always used with public key algorithm at the same time, in order to improve efficiency. In this way, sender needn t encrypt the whole file, he only to encrypt the hash value of the file. The sender and receiver should negotiate and determine the hash function and digital signature algorithm in advance. The algorithm is described as follows [3, 4]. (1) S uses a hash function to generate hash result H (M) of the file M. (2) S encrypts H(M) with his own private key SK to get SK(H(M)), namely digital signature. (3) S sends M and SK (H (M)) to R. (4) R also uses the same hash function with S to generate H (M) of the M, and decrypts SK(H(M)) with S s public key PK to get H(M). If H (M)=H(M), then the digital signature is valid. 2.3 Digital Certificates If digital signature is based on public key algorithms, there are two problems obviously. At first, how to ensure the owners of the public keys are authentic. Secondly, how to deal with the production, distribution and management of the public keys. Certification Authority (CA) can resolve above problems. The authenticity of public keys may be established by a trusted third party. A guarantee of the identity of the owner of a public key is called certification of the public key. A person or organization that certifies public keys is known as a Certification Authority (CA). The digital certificate is the evidence as identity of the person or organization on Internet. It includes the owner s name, public key, CA s digital signature, the

624 Yuxuan Meng 1 and Bo Meng 2 period of validity of the digital certificate, etc. Digital certificate can provide identity and authenticity, so it is widely used in electronic commerce. 3 A Digital Signature Scheme in WNSS 3.1 Requirements of Digital Signature in WNSS It is very important for both negotiators to sign the contract by the end of the negotiation, because the signed contract is the voucher of the business trade. To insure the validity, fairness of the signature and prevent from disavowing, the digital signature in WNSS should satisfy the following requirements. (1) The digital signature of both negotiators of the negotiation is authentic. Any negotiator can confirm the signature he received comes from the other party of the negotiation, but not from someone else. (2) The digital signatures of the negotiators can t be forged. Only negotiators can sign the contract, anyone else can t forge their signatures. (3) The digital signatures of the negotiators can t be used repeatedly by other people. The signature is a part of the contract. Anyone else can t transfer the signature to other files. (4) The context of the contract that both negotiators should sign must be same. In the process of transfer, the context of the contract can t be tampered. (5) The digital signature of both negotiators is of non-repudiation. After both negotiators have signed the contract, they can t deny their signatures. (6) The digital signature of both negotiators is fair. At the end of the process of signature, the result is both negotiators having received the other party s signature or both negotiators having not received the other party s signature. (7) If the context of the contract was very confidential, it could be seen by both negotiators only. 3.2 The Digital Signature Scheme in WNSS Taking into account of the requirements of digital signature in WNSS and several algorithms widely used in digital signatures, we designs a new digital signature scheme for electronic contracts in WNSS, which uses public key algorithm, hash function and interceders. Let A and B be two negotiators of the negotiation respectively. Let PK A, PK B, PK C be the public keys of the negotiator A, B and interceder respectively. Let SK A, SK B be private keys of the negotiator A, B respectively. Let H be hash function. Let M be the plaintext of the electronic contracts. The digital signature scheme is described as follows. A encrypts M with B s public key PK B to generate PK B (M). A use hash function to generate hash result H(M). Then, A encrypts H(M) with his private key SK A to sign the M. And SK A (H(M)) is called the digital signature. Furthermore, A

A Digital Signature Scheme in Web-based Negotiation Support System 625 encrypts H(M) and SK A (H(M)) with C s public key PK C to generate a information packet ATC: PK C (H(M) SK A (H(M))), which would be transferred to C by B. A sends PK B (M), H(M) and ATC to B. B will decrypt PK B (M) with his own private key SK B to get M. Then B uses the same hash function as A to generate his own hash result H (M). If H(M)= H (M), then B can be sure M has not been changed during transference. Then B encrypts H (M) with his own private key SK B to sign the M. And SK B (H (M)) is B s digital signature. B sends H (M), SK B ( H (M)) and ATC to C. C decrypts ATC with SK C to get H(M) and SK A (H(M)). Then C will compare H(M) with H (M). If it is different, then M is changed during transference. Hence the digital signatures of both negotiators are invalid. If it is same, then the M that B signed is the same as that A signed. Then C will decrypt SK A (H (M)) and SK B (H (M)) with PK A and PK B respectively. If H(M) H (M), the digital signatures by both negotiators are incorrect, then the signatures are invalid. If H(M)=H (M), then C can ensure the signatures by both negotiators are valid. If the digital signatures by A and B is valid, then SK B (H (M)) is timestamped and sent to A by C, and SK A (H(M)) is also time-stamped and sent to B by C. 3.3 The Feasibility Analysis of the Scheme The feasibility of the scheme is analyzed as follows. (1) The digital signatures are authentic. Because C is a trusted interceder by both negotiators, the digital signatures that received by each negotiator are verified and confirmed by C. (2) The digital signatures are not forged. Because only negotiators have their own private keys, if interceder can decrypt signatures with negotiators public keys respectively, he will know the signatures are not forged. (3) The digital signatures can t be used repeatedly. Because that the negotiators signed is the hash result of contract, the signatures can t be copied to another contracts. (4) The digital signature scheme can satisfy the integrity requirement of the contract. In the step of the scheme, if the context of H (M) and H(M) is different, we can discover the context of contract that each negotiator signed is different and the contract is changed by someone else in the transfer process. (5) The digital signature scheme can satisfy the requirement of non-repudiation. Because both negotiators receive signed contract that is time-stamped and sent by interceder, they can t deny their signatures. The interceder can verify and prove the signatures of the both negotiators. (6) The digital signature scheme can satisfy the fairness requirement. After the interceder has verified that the signatures are valid, both negotiators can receive the other negotiator s signature of the contract. Otherwise, both negotiators can t receive the other negotiator s signature of the contract. Both negotiators are in the strong fairness situation. And the interceder couldn t see the context of the contract.

626 Yuxuan Meng 1 and Bo Meng 2 (7) The execution efficiency of the scheme is very high, because negotiators only encrypt the hash result and the interceder needn t to transfer the contract. The interceder only do a few public key operations and signature verifications, then sent verified signatures to negotiators. (8) In the digital signature scheme, the transferred contract can also be encrypted with keys that are different from signature keys in order to improve the security of the scheme further. 3.4 Implementation of the Digital Signature Scheme in WNSS Generally a trusted third party is needed to provide service and intercede negotiation through WNSS. The third party can aid the negotiators in the process of the negotiation. Therefore, the trusted third party in WNSS can act as the interceder of the digital signature scheme. Because we use public key algorithm to encrypt contract, we need a CA to provide certificate service. In a similar way, the trusted third party can act as CA. As we all know, MS NT 4.0 is widely used in Intranet and Internet. And in the Option Pack the software named Certificate Server1.0 can be used to construct our own CA conveniently and to realize the authorization and certification to the web server and client. The both negotiators can adopt X.509 certificate. The digital certificate can not only implement the bi-directional authentication in SSL connection, but also implement digital signatures with the keys in the certificate. RSA is one of public key algorithm that is well known with its high security. It is especially suitable for using in digital signature. The algorithm of RSA is as follows. Public key: n = p q. (p and q are two large prime numbers and are secret.) Private key: d= e 1 mod ((p-1)(q-1)). (e is relatively prime to (p-1)(q-1). e and n are public.) Signature procedure: S=M d mod n Validation procedure: V(M, S)=TRUE M=S e mod n Up to now many hashing algorithms have been designed, such as Rabin hash algorithm, N-hash algorithm, MD2, MD4, MD5, SHA and so on. MD5 produces a 128-bit (16-byte) hash result. The security of MD5 algorithm is higher and its operation speed is very fast, so that it is widely used. In WNSS we use RSA and MD5 to implement digital signatures for electronic contract. As a network programming language, JAVA is rapidly developed and widely used in Internet. JAVA integrates a number of security tools. It can be used to develop multifunctional application programs that include identity certification, digital signature, encryption, decryption, etc. JAVA is also used to implement webbased negotiation support system. Therefore we use JAVA to develop and implement our digital signature application programs in WNSS.

A Digital Signature Scheme in Web-based Negotiation Support System 627 4 Conclusions Based on the requirements of electronic contract in WNSS and several techniques widely used in digital signatures, a new digital signature scheme for electronic contracts is presented in the paper. Public key algorithm, hash function and interceders are used in the scheme. The feasibility of the scheme is analyzed. It has been implemented in our web-based negotiation support system. Digital signatures could be used to prevent from forging, tampering and disavowing, so it is one of the important techniques in electronic commerce. With the development of electronic commerce, the techniques in network security that include digital signature will be more and more important in our lives. Acknowledgment This research was supported by China Scholarship Council and the Natural Science Foundation of Hubei province of China (Project No. 2001ABB058). References 1. B. Meng and W. Fu, An Overview of Theories and Models in Group Decision Making and Negotiation Support Systems, Proceedings of '99 International Conference on Management Science and Engineering, 1999. 2. W. Gao and B. Meng, Research and Development of Web-based Negotiation Support System, Computer Engineering, 29 19, 63-65(2003) (in Chinese). 84. 3. Mohan Atreya, et al., Digital Signatures ( McGraw-Hill, Berkeley, Calif., 2002). 85. 4. J. C. A. van der Lubbe, Basic Methods of Cryptography (Cambridge University Press, New York, 1998). 86. 5. Timothy P. Layton, Information Security: Design, Implementation, Measurement, and Compliance (Auerbach Publications, Boca Raton, 2007). 6. Elena Ferrari and Bhavani Thuraisingham, Web and Information Security (IRM Press, Hershey, Pa., 2006). 7. Aashish Srivastava, Electronic Signatures: A Brief Review of the Literature, Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet ICEC '06, August 2006. 8. Mark Stamp, Information Security: Principles and Practice (Wiley-Inter Science, Hoboken, N.J., 2006).