Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996. 4/7/2019 Ref: Pfleeger96, Ch.4.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Network Security Philadelphia UniversityAhmad Al- Ghoul Module 3 Encryption Protocols and Practices  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
16.2 Digital Signatures By: John Barton. What is a Digital Signature? The idea comes from the idea of signing a document by its author (authenticating.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices (Part B)
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Basics of Cryptography
Unit 3 Section 6.4: Internet Security
Key Exchange References: Applied Cryptography, Bruce Schneier
Cryptography Much of computer security is about keeping secrets
Computer Communication & Networks
Network Security.
Cryptographic Hash Function
Public Key Encryption Systems
CSCE 715: Network Systems Security
Cryptography And Network Security
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Cryptography.
Presented by: Dr. Munam Ali Shah
NET 311 Information Security
Security through Encryption
Message Authentication and Hash Functions
Chapter 11 – Message Authentication and Hash Functions
csci5233 computer security & integrity (Chap. 4)
Message Authentication and Hash Functions
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Introduction to Cryptography (1)
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Cryptographic Protocols
Public Key Encryption Systems
Public Key Encryption Systems
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996. 4/7/2019 Ref: Pfleeger96, Ch.4

Definition of Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: it is a mark that only the sender can make, but other people can easily recognize as belonging to the sender. 4/7/2019 Ref: Pfleeger96, Ch.4

Requirements of Digital Signatures Unforgeable If person P signs message M with signature S(P,M), it is impossible for anyone else to produce the pair [M, S(P,M)]. Authentic If a person R receives the pair [M, S(P,M)] purportedly from P,R can check that the signature is really from P. 4/7/2019 Ref: Pfleeger96, Ch.4

Additional Desirable Properties of Digital Signatures Not Alterable After being transmitted, M cannot be changed by S,R, or an interceptor. Not Reusable A previous message presented will be instantly detected by R. 4/7/2019 Ref: Pfleeger96, Ch.4

Symmetric Key Digital Signatures The secrecy of the key guarantees the authenticity of the message. Does not prevent forgery, and cannot prevent against repudiation (denial of sending the message). Thus an arbiter is needed to prevent forgery. 4/7/2019 Ref: Pfleeger96, Ch.4

Digital Signatures without Encryption If secrecy is not an issue, then a cryptographic sealing function can be used as a signature. The sealing function is a mathematical function of every bit of its input. A hash could be used as a sealing function. 4/7/2019 Ref: Pfleeger96, Ch.4

Preventing Reuse or Alteration A time stamp (or sequence number) could be used to prevent reuse. The time stamp could also become part of every block of a block cipher, to prevent alteration of a piece of an encrypted message. 4/7/2019 Ref: Pfleeger96, Ch.4

Asymmetric Digital Signatures Public key systems can be used for digital signatures. A sender could encrypt a message using their private key. The encrypted message could be read by anyone using the sender’s public key. The message could not be decrypted using someone else’s public key. 4/7/2019 Ref: Pfleeger96, Ch.4