Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography Basic (cont)
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 31 Network Security
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
The RSA Algorithm Rocky K. C. Chang, March
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
IS 302: Information Security and Trust Week 5: Integrity 2012.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Cryptographic Hash Functions and Protocol Analysis
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Security Outline Encryption Algorithms Authentication Protocols
Digital Signatures Last Updated: Oct 14, 2017.
MAC: Message Authentication Code
Asymmetric Cryptography
Introduction to Symmetric-key and Public-key Cryptography
Diffie-Hellman Key Exchange
Presentation transcript:

Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013

Digital Signatures Diagram illustrating how to sign a message Why do we use a one-way hash? How does a collision or second pre-image attack relate to this?

Digital Signatures What assurances do we get? o Authentication? o Confidentiality? o Integrity? o Non-repudiation? MAC vs. Digital Signature o What are the differences? What do we sign?

Digital Signatures When do we sign? o Sign-then-Encrypt (common) Surreptitious forwarding attack o Encrypt-then-Sign Authorship claim attack

Order of Authentication/Encryption Encrypt then Authenticate (Sign/MAC) o More secure (in theory) o More efficient to discard bogus messages Authenticate (Sign/MAC) then Encrypt o Harder to attack the MAC, not visible o Disclosing data is less severe than accepting modified data o Horton Principle – authenticate what you mean, not what you say Encrypt and Authenticate o Process in parallel o MAC protect authenticity, not privacy All choices can be used securely and insecurely

Message Authentication Three approaches o Benefits of each? o Drawbacks? o Third option broken, use HMAC

Digital Certificates Who has a digital certificate? What is the most common use for certificates?

Performance Test Goal: figure out the relative computing time for algorithms (one block) o SHA-1 o AES o RSA Encrypt o RSA Signature Order the above, fastest to slowest

Performance Test Average of 10, 000 iterations SHA-1 – ms AES – ms RSA encrypt – ms 3515x slower than a hash RSA signature – ms 8x slower than a hash 215x slower than a hash 26x slower than AES 421x slower than AES 16x slower than RSA enc.

RSA Padding Or: “How RSA should really be used” (See PKCS #1)

RSA Primitives RSA Encryption o m e = c (mod n) RSA Decryption o c d = m (mod n) Pitfalls of using RSA o What if m is very small? Take the e’th root of c Use RSA padding o Implementation flaws – timing attacks Insert constant delays or binding RSA Labs publishes the standards for using RSA o Public Key Cryptography Standard #1 (PKCS #1)

Overview of PKCS #1 Good cryptographic practice o Employ a key pair in only one scheme One pair for signatures, one for encryption Provides 2 approaches for using the RSA primitives o Legacy PKCS1-v1_5 o Recommended OAEP, PSS

PKCS1-v1_5 Encryption Encryption o Message m becomes EM EM = 0x00 || 0x02 || PS || 0x00 || M o EM is then used with the encryption primitive Decryption o Ensure that the decrypted message conforms to the expected structure above, remove padding, etc How does this scheme affect the size of the message to be encrypted? When does this approach produce identical ciphertexts? PS is randomly generated, non-zero, bytes PS must be at least 8 bytes Why must PS have a minimum length?

PKCS1-v1_5 Signatures Signature o Hash message m, pre-pend the digestID to create T EM = 0x00 || 0x01 || PS || 0x00 || T o EM is then used with the signature primitive Verification o Use public key to obtain EM o Ensure that EM conforms to the expected structure above, remove padding, etc How does this scheme affect the size of the message digests that can be used? When does this approach produce identical signatures? PS is the byte 0xff repeated over and over

PKCS1-v1_5 Encryption o EM = 0x00 || 0x02 || PS || 0x00 || M Signature o EM = 0x00 || 0x01 || PS || 0x00 || T Why do both start with 0x00?

RSA Encryption with OAEP OAEP o Optimal Asymmetric Encryption Padding o In addition to being more secure adds the ability to associate a label with the message Encrypt(M, L (optional), n, e)

RSA Encryption with OAEP PS is the byte 0x00 repeated over and over seed is a random series of bytes How does this scheme affect the size of the message to be encrypted? When does this approach produce identical ciphertexts?

RSA Signatures with PSS PSS o Probabilistic Signature Scheme Padding 1 and Padding 2 are bytes of 0x00 Salt is random bc is 0xbc When does this approach produce identical signatures? Set leftmost x bits to 0