Digital signatures.

Slides:



Advertisements
Similar presentations
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Advertisements

Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Chapter 7-1 Signature Schemes.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Cryptography1 CPSC 3730 Cryptography Chapter 13 Digital Signature Standard (DSS)
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Topic 22: Digital Schemes (2)
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Prepared by Dr. Lamiaa Elshenawy
S EMINAR P RESENTATION ON N OTIONS OF S ECURITY 1 S M Masud Karim January 18, 2008 Bonn, Germany.
Digital Signature Standard (DSS) US Govt approved signature scheme designed by NIST & NSA in early 90's published as FIPS-186 in 1991 revised in 1993,
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
Cryptography Lecture 10 Arpita Patra © Arpita Patra.
Cryptography and Network Security Chapter 13
Overview Modern public-key cryptosystems: RSA
Topic 26: Discrete LOG Applications
Key Exchange References: Applied Cryptography, Bruce Schneier
B504/I538: Introduction to Cryptography
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Introduction Used for communication to verify
Authenticated encryption
Group theory exercise.
Modern symmetric-key Encryption
Digital Signature Schemes and the Random Oracle Model
Cryptography Lecture 26.
Introduction to modern cryptology
Topic 11: Authenticated Encryption + CCA-Security
Cryptography Lecture 27.
Digital Signature Schemes and the Random Oracle Model
Introduction to Modern Cryptography
Perfect security Samuel Ranellucci Défacne de these Date
Cryptography and Network Security
Data Integrity: Applications of Cryptographic Hash Functions
Pre-image Resistance: Given a, hard to find b such that ____
Digital Signatures…!.
Digital Signatures.
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Cryptographic Hash Functions Part I
Chapter -8 Digital Signatures
Topic 13: Message Authentication Code
Chapter 13 Digital Signature
Introduction to Modern Cryptography
Cryptography Lecture 10.
The power of Pairings towards standard model security
Cryptography Lecture 22.
Cryptography Lecture 25.
Digital Signature Standard (DSS)
Cryptography Lecture 26.
Digital Signatures Network Security.
LAB 3: Digital Signature
Presentation transcript:

Digital signatures

What is a digital signature A digital signature allows the holder of the secret key (the signing key) to sign a document Everyone who knows the verification key can verify that the signature is valid (correctness) No one can forge a signature even given the verification key even though he is given a signature

Structure of digital signature 𝐺𝑒𝑛 1 𝑛 → (𝑠𝑘,𝑣𝑘) 𝑆𝑖𝑔𝑛 𝑠𝑘 𝑚 → 𝑠𝑖𝑔 𝑉𝑒 𝑟 𝑣𝑘 𝑚,𝑠𝑖𝑔 → {0,1}

Structure of digital signature scheme (DSS) 𝐺𝑒𝑛 1 𝑛 → (𝑠𝑘,𝑣𝑘) 𝑆𝑖𝑔𝑛 𝑠𝑘 𝑚 → 𝑠𝑖𝑔 𝑉𝑒 𝑟 𝑣𝑘 𝑚,𝑠𝑖𝑔 → {0,1} Correctness 𝑉𝑒 𝑟 𝑣𝑘 𝑚,𝑆𝑖𝑔 𝑛 𝑠𝑘 (𝑚) =1 Unforgeability To be continued

DSS VS MAC 𝐺𝑒𝑛 1 𝑛 → (𝑠𝑘,𝑣𝑘) 𝐺𝑒𝑛 1 𝑛 → 𝑘 𝑆𝑖𝑔𝑛 𝑠𝑘 𝑚 → 𝑠𝑖𝑔 𝑚𝑎𝑐 𝑘 𝑚 → 𝑡 𝐺𝑒𝑛 1 𝑛 → (𝑠𝑘,𝑣𝑘) 𝑆𝑖𝑔𝑛 𝑠𝑘 𝑚 → 𝑠𝑖𝑔 𝑉𝑒 𝑟 𝑣𝑘 𝑚,𝑠𝑖𝑔 → {0,1} 𝐺𝑒𝑛 1 𝑛 → 𝑘 𝑚𝑎𝑐 𝑘 𝑚 → 𝑡 v𝑒 𝑟 𝑘 𝑚,𝑡 → {0,1}

Mac forgery game M ←{} k ∈ 𝑅 0,1 𝑠 𝑚′ M←𝑀∪{𝑚′} Repeat as many times as the adversary wants 𝑡′ ←𝑚𝑎 𝑐 𝑘 (𝑚′) 𝑡′ Wins if 𝑚 ∉𝑀 𝑣𝑒𝑟𝑖𝑓𝑦 𝑚,𝑡 =1 (𝑚,𝑡)

Signature forgery game 𝑣𝑘 M ←{} 𝑠𝑘,𝑣𝑘←𝐺𝑒𝑛( 1 𝑠 ) 𝑚′ M←𝑀∪{𝑚′} Repeat as many times as the adversary wants 𝑠𝑖𝑔′ ←𝑆𝑖𝑔 𝑛 𝑠𝑘 (𝑚′) 𝑠𝑖𝑔′ Wins if 𝑚 ∉𝑀 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 𝑚,𝑠𝑖𝑔 =1 (𝑚,𝑠𝑖𝑔)

Definition of signature scheme Correctness: Pr 𝑉𝑒 𝑟 𝑣𝑘 𝑚,𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 =1 𝑠𝑘,𝑣𝑘 ←𝐺𝑒𝑛 1 𝑠 =1 Unforgeability For all PPT adversary 𝐴, there exists negligible function 𝜇, Pr 𝐴 𝑤𝑖𝑛𝑠 𝑡ℎ𝑒 𝑠𝑖𝑔𝑛𝑎𝑡𝑢𝑟𝑒 𝑓𝑜𝑟𝑔𝑒𝑟𝑦 𝑔𝑎𝑚𝑒 ≤𝜇(𝑛)

Relation between macs and signatures Every signature scheme is a message authentication code. A mac scheme is not necessarily a signature. Without the key, it may be impossible to verify a mac.

Signatures are expensive They require public-key operations for each signature you wish to do. Hash functions are relatively cheap

Hash and sign Let (𝐺𝑒𝑛′,𝑆𝑖𝑔𝑛′,𝑉𝑒𝑟𝑖𝑓𝑦′) be a signature scheme and let 𝐻 be a collision resistant hash function, then the following 𝐺𝑒𝑛 1 𝑠 ≔𝐺𝑒 𝑛 ′ 1 𝑠 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔ 𝑆𝑖𝑔 𝑛 𝑠𝑘 ′ (𝐻 𝑚 ) 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 𝑚,𝑠𝑖𝑔 ≔ 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 ′ 𝐻 𝑚 ,𝑠𝑖𝑔 =1

Security of hash and sign Let (𝐺𝑒𝑛′,𝑆𝑖𝑔𝑛′,𝑉𝑒𝑟𝑖𝑓𝑦′) be a signature scheme and let 𝐻 be a collision resistant hash function, then the following 𝐺𝑒𝑛 1 𝑠 ≔𝐺𝑒 𝑛 ′ 1 𝑠 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔ 𝑆𝑖𝑔 𝑛 𝑠𝑘 ′ (𝐻 𝑚 ) 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑠𝑘 𝑚,𝑠𝑖𝑔 ≔ 𝑉𝑒𝑟𝑖𝑓 𝑦 ′ 𝐻 𝑚 ,𝑠𝑖𝑔 =1 Essentially the same proof as hash and mac Breaking security of this scheme means Finding a collision Finding a signature on an unsigned message

Interesting property of plaintext RSA 𝑠𝑘,𝑝𝑘 ←𝐾𝑒𝑦𝐺𝑒𝑛 1 𝑠 ⇒ 𝐸𝑛 𝑐 𝑝𝑘 𝐷𝑒 𝑐 𝑠𝑘 𝑚 =𝑚 Due to the fact that 𝑚 𝑒 𝑑 = 𝑚 𝑑 𝑒 = 𝑚 𝑒𝑑

RSA signature scheme Let (𝐾𝑒𝑦𝑔𝑒𝑛,𝐸𝑛𝑐,𝐷𝑒𝑐) denote the RSA encryption scheme 𝐺𝑒𝑛 1 𝑠 ≔{𝑠𝑘←𝑠 𝑘 ′ , 𝑣𝑘←𝑝𝑘∣ 𝑠 𝑘 ′ ,𝑝 𝑘 ′ ←𝐾𝑒𝑦𝑔𝑒𝑛 1 𝑠 } 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔ 𝐷𝑒𝑐 𝑠𝑘 𝑚 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 𝑚, 𝑠𝑖𝑔 ≔ 𝐸𝑛 𝑐 𝑣𝑘 𝑠𝑖𝑔 =𝑚

Insecure RSA signature scheme 𝐺𝑒𝑛 1 𝑠 ≔{ 𝑣𝑘←𝑝𝑘, 𝑠𝑘←𝑠𝑘′ ∣ 𝑠 𝑘 ′ ,𝑝 𝑘 ′ ←𝐾𝑒𝑦𝑔𝑒𝑛 1 𝑠 } 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔ 𝐷𝑒𝑐 𝑠𝑘 𝑚 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 𝑚,𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 = 𝐸𝑛 𝑐 𝑣𝑘 𝐷𝑒𝑐 𝑠𝑘 𝑚 𝐸𝑛 𝑐 𝑣𝑘 𝐷𝑒𝑐 𝑠𝑘 𝑚 = 𝑚 𝑑 𝑒 = 𝑚 𝑒⋅𝑑 =𝑚

Secure RSA signature scheme Assumptions Random oracle 𝐻 (Hash function modeled as a random oracle 𝑛=𝑝𝑞 where 𝑝,𝑞 are prime 𝐺𝑒𝑛 1 𝑠 ≔{ 𝑣𝑘←𝑝𝑘, 𝑠𝑘←𝑠𝑘′ ∣ 𝑠 𝑘 ′ ,𝑝 𝑘 ′ ←𝐾𝑒𝑦𝑔𝑒𝑛 1 𝑠 } 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔ 𝐷𝑒𝑐 𝑠𝑘 𝐻(𝑚) 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 𝑚,𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 ≔𝐻 𝑚 = 𝐸𝑛 𝑐 𝑣𝑘 𝐷𝑒𝑐 𝑠𝑘 𝐻(𝑚) 𝐸𝑛 𝑐 𝑣𝑘 𝐷𝑒𝑐 𝑠𝑘 𝐻(𝑚) = (𝐻 (𝑚)) 𝑑 𝑒 𝑚𝑜𝑑 𝑛 (𝐻 (𝑚)) 𝑑 𝑒 𝑚𝑜𝑑 𝑛 = 𝐻(𝑚) 𝑒⋅𝑑 𝑚𝑜𝑑 𝜙(𝑛) (𝑚𝑜𝑑 𝑛)=𝐻(𝑚)

Schnorr signature scheme Based on Group G Generator 𝑔 for G Random oracle 𝐻 Discrete logarithm

Schnorr signature scheme Requirement: Group 𝐺, 𝐺 =𝑞, generator 𝑔, random oracle 𝐻 𝐺𝑒𝑛 1 𝑠 𝑠𝑘 ∈ 𝑅 𝐺 𝑣𝑘← 𝑔 𝑠𝑘 𝑉𝑒𝑟𝑖𝑓 𝑦 𝑣𝑘 (𝑚,𝑠𝑖𝑔) 𝑎,𝑠 ←𝑠𝑖𝑔 u ← 𝑔 𝑠 ⋅ 𝑣𝑘 −𝑎 Output 𝐻 𝑢,𝑚 =𝑎 𝑆𝑖𝑔 𝑛 𝑠𝑘 𝑚 𝑏∈ 𝑅 𝑍 |𝐺| 𝑢← 𝑔 𝑏 𝑎←𝐻(𝑢,𝑚) 𝑠←𝑎⋅𝑠𝑘+𝑏 (𝑚𝑜𝑑 𝑞) Output (𝑎,𝑠)