LAB 3: Digital Signature

Slides:



Advertisements
Similar presentations
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Advertisements

Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Asymmetric-Key Cryptography
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Public Encryption: RSA
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Introduction to Modern Cryptography Lecture 7 1.RSA Public Key CryptoSystem 2.One way Trapdoor Functions.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Bob can sign a message using a digital signature generation algorithm
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
1 Lect. 13 : Public Key Encryption RSA ElGamal. 2 Shamir Rivest Adleman RSA Public Key Systems  RSA is the first public key cryptosystem  Proposed in.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Information Security CS 526
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Elliptic Curve Cryptography
Digital Signature Tahani aljehani. Where Does This Fit.
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Cryptography and Network Security Chapter 13
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Overview Modern public-key cryptosystems: RSA
CS480 Cryptography and Information Security
Asymmetric-Key Cryptography
Public Key Cryptosystem
Asymmetric-Key Cryptography
RSA Slides by Kent Seamons and Tim van der Horst
Key Exchange References: Applied Cryptography, Bruce Schneier
第四章 數位簽章.
第四章 數位簽章.
Information Security message M one-way hash fingerprint f = H(M)
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Information Security CS 526
Digital signatures.
Information Security message M one-way hash fingerprint f = H(M)
Real-world Security of Public Key Crypto
Asymmetric Cryptography
Information Security message M one-way hash fingerprint f = H(M)
The Application of Elliptic Curves Cryptography in Embedded Systems
Information Security CS 526
The Secure Sockets Layer (SSL) Protocol
Digital Signatures…!.
Lecture 6: Digital Signature
Public-Key, Digital Signatures, Management, Security
Symmetric-Key Cryptography
Introduction to Cryptography
Public Key Cryptography
Presentation transcript:

LAB 3: Digital Signature NET 536 Network Security Networks and Communication Department LAB 3: Digital Signature

Digital Signatures: RSA ElGamal 6-Dec-19 Networks and Communication Department

Networks and Communication Department Introduction Digital signature is a data string which associates a message (in digital form) with some originating entity. Digital signature verification is a method for verifying that a digital signature is authentic (was indeed created by the specific entity). The main difference from a handwritten signature is that digital signature of a message is intimately connected with the message, and for different messages is different, whereas the handwritten signature is adjoined to the message and always looks the same. 6-Dec-19 Networks and Communication Department

Key Points A digital signature is an authentication mechanism that enables the creator of a message to attach a code that act as a signature. Typically, the signature is formed by taking the hash of the message and encrypting the message with the creator’s private key. The signature guarantees the source and integrity of message. 6-Dec-19 Networks and Communication Department

Digital Signature Overview Based on asymmetric crypto - Example: RSA Properties of a Digital Signature: Verification of the validity of a digital signature needs only the public key Only the owner of the corresponding private key can produce a valid signature There is also MAC (Message Authentication Code) – signing using a shared key (based on symmetric cryptography) 6-Dec-19 Networks and Communication Department

The Model of Digital Signature 6-Dec-19 Networks and Communication Department

RSA Digital Signature Construction: Rivest, Shamir, and Adleman proposed in 1978. Construction: 1. Choose two large prime numbers P and Q, then compute N=P×Q. 2. Select an integer e such that gcd(e, (N))=1. 3. Compute d such that e×d mod (N)=1. 4. Public key = (N, e). 5. Private key = (N, d). 6-Dec-19 Networks and Communication Department

RSA Digital Signature 6-Dec-19 Networks and Communication Department

RSA Digital Signature Example 6-Dec-19 Networks and Communication Department

RSA Digital Signature Problems 6-Dec-19 Networks and Communication Department

ElGamal Digital Signature ElGamal proposed in 1985 ElGamal Public Key Cryptosystem Security Basis: Discrete Logarithm Problem 6-Dec-19 Networks and Communication Department

ElGamal Digital Signature 6-Dec-19 Networks and Communication Department

ElGamal Digital Signature 6-Dec-19 Networks and Communication Department

ElGamal Digital Signature g is primitive root mod p if: g ^ (p-1) mod p =1 Where 𝑔 𝑖 mod p ≠ 1 , 0 < i < p-1 Below is the proof where p=7, g=3 6-Dec-19 Networks and Communication Department

ElGamal Digital Signature Example choose: p = 11, g = 2, d = 8 compute: y= 2^8 mod 11 = 3 Signing of m = 5, choose d’ = 9 - O.K. because gcd(9, 10) = 1 compute s = 2^9 mod 11 = 6 solve equation: 5 = 8 · 6 + 9t (mod 10) that is 7 = 9t (mod 10)  t=3 signature: (5, 6, 3) 6-Dec-19 Networks and Communication Department