If There Is a Single Security Hole in a Cryptosystem, the Part I Exposure of a Cryptosystem Will Make Sure That Someone Will Eventually find It

If There Is a Single Security Hole in a Cryptosystem, the Part I Exposure of a Cryptosystem Will Make Sure That Someone Will Eventually find It

MURPHY LAW for CRYPTOGRAPHY If there is a single security hole in a cryptosystem, the Part I exposure of a cryptosystem will make sure that someone will eventually find it. Digital signatures Even if this person is honest the discovery may ultimately leak to malicious parties. It is not suffcient that a cryptographic system is very secure, or even perfectly sucure - practically it is desirable that its implementations are secure enough what is vey hard to achieve. IV054 1. Digital signatures 2/58 CHAPTER 7: DIGITAL SIGNATURES BASIC IDEAS BASIC IDEAS Digital signatures are one of the most important inventions/applications of modern Example: Assume that each user A can use a special public-key cryptosystem (eA,dA). cryptography. One way to sign a message w by a user A, and to send w and its signature, so that The problem is how can a user sign (electronically) an (electronic) message in such any user can verify the signature, is to apply on w (as the signing procedure) the a way that everybody (or the intended addressee only) can verify the signature and mapping dA : signature should be good enough also for legal purposes. signing a message: (w, dA(w))) signature verification: eA(dA(w)) = w? → Moreover, a properly implemented digital signature should give the receiver a reason to believe that the received message was really send by the claimed sender (authentication One way to sign a message w by a user A so that only the user B can verify the of the message) and was not altered during the transit (integrity of the message). signature, is to apply on w (as the signing procedure) at first the mapping dA and then, on the outcome, eB : In many countries it is already desirable, or even necessay, to use in imporatnat signing the message: (w, eB (dA(w))) signature verification: → communications digital signatures and they have also legal significance. eA(dB (eB (dA(w)))) = w? A way to send a message w, and a signature of its hash, created by a user A, using a hash function h, so that anybody can verify the signature: signing the hash:(w, dA(h(w))) signature verification: h(w) = eA(da(h(w)))? → IV054 1. Digital signatures 3/58 IV054 1. Digital signatures 4/58 ADDITIONAL PROPERTIES of DIGITAL SIGNATURES DIGITAL SIGNATURES - OBSERVATION In many ways and instances digital signatures provide a Can we make digital signatures by digitizing our usual new layer of validation and security. signature and attaching them to the messages (or documents) that need to be signed? Digital signatures are both very different and also much equivalent to handwritten ones in many No! Why? Because such signatures could be easily respects. removed and attached to some other documents or messages. Digital signatures, when properly implemented, are also more difficult to forge than handwritten signatures. Key observation: Digital signatures have to depend not only on the signer, but also on the document/message Digital signatures employ publi-key cryptography. that is being signed. IV054 1. Digital signatures 5/58 IV054 1. Digital signatures 6/58 DIGITAL SIGNATURES - BASIC REQUIREMENTS DIGITAL SIGNATURES - A PROBLEM Basic requirements - I. Digital signatures should be such that each user should be able If only signature (but not the secrecy) of a message/document is of importance, then it to verify signatures of other users, but that should give him/her no information how to suffices that Alice sends to Bob sign a message on behalf of any other user. (w, dA(w)) Caution: Signing a message w by A for B by Basic requirements - II A valid digital signature should give the recipient reasons to believe that the message was created by a known sender and that it was not altered in eB (dA(w)) transit. is O.K., but the symmetric solution, with encoding first: Note An important difference from a handwritten signature is that digital signature of a message is always intimately connected with the message, and for different messages is c = dA(eB (w)) different, whereas the handwritten signature is adjoined to the message and always looks the same. is not good. Technically, a digital signature signing is performed by a signing algorithm and a digital Indeed, an active enemy, the tamperer, can intercept the message, then can compute signature is verified by a verification algorithm. dT (eA(c)) = dT (eB (w)) A copy of a digital (classical) signature is identical (usually distinguishable) to (from) and can send the outcome to Bob, pretending that it is from him/tamperer (without the origin. A care has therefore to be taken that digital signatures are not misused. being able to decrypt/know the message). This chapter contains some of the main techniques for design and verification of digital Any public-key cryptosystem in which the plaintext and cryptotext spaces are the same signatures (as well as some possible attacks on them). can be used for digital signature. IV054 1. Digital signatures 7/58 IV054 1. Digital signatures 8/58 WHY TO SIGN HASHES of MESSAGES and not MESSAGES A SCHEME of DIGITAL SIGNATURE SYSTEMS – SIMPLIFIED THEMSELVES VERSION Signing hashes of messages -example: A digital signature system (DSS) consists of: P - the space of possible plaintexts (messages/documents). A way to send a message w, and a signature of its hash, created by a user A, using a S - the space of possible signatures. hash function h, so that any one can verify the signature: K - the space of possible keys. signing the hash:(w, dA(h(w))) signature verification: h(w) = eA(da(h(w))) For each k K there is a signing algorithm sigk and a corresponding verification ∈ There are several reasons why it is better to sign hashes of messages than messages algorithm verk such that themselves. sigk : P S. → For efficiency: Hashes are much shorter and so are their signatures - this is a way to verk : P S true, false save resources (time,...) ⊗ → { } and For compatibility: Messages are typically bit strings. Digital signature schemes, true if s = sigk (w); , such as RSA, operate often on other domains. A hash function can be used to verk (w, s) = convert an arbitrary input into the proper form. (false otherwise. For integrity: If hashing is not used, a message has to be often split into blocks and Algorithms sigk and verk should be realizable in polynomial time. each block signed separately. However, the receiver may not able to find out Verification algorithms can be publicly known; signing algorithms (actually only whether all blocks have been signed and in the proper order. their keys) should be kept secret IV054 1. Digital signatures 9/58 IV054 1. Digital signatures 10/58 DIGITAL SIGNATURE SCHEMES I DIGITAL SIGNATURES SCHEMES II - conditions Digital signature schemes are basic tools for authentication messages. A digital signature scheme allows anyone to verify signature of any sender S without providing any Correctness: information how to generate signatures of S. For each messagem fromM and public keyk from Kv , it should hold A Digital Signature Scheme (M, S, Ks , Kv ) is given by: verk (m, s) = true M - a set of messages to be signed if there is anr from 0, 1 ∗ such that S - a set of possible signatures { } Ks - a set of private keys for signing - one for each signer s = sigl (r, m) Kv - a set of public keys for verification - one for each signer for a private keyl from Ks corresponding to the public keyk. Moreover, it is required that: Security: For each k from Ks , there exists a single and easy to compute signing mapping For anyw fromM andk from Kv , it should be computationally unfeasible, without the sigk : 0, 1 ∗ M S { } × → knowledge of the private key corresponding tok, to find a signatures fromS such that For each k from Kv there exists a single and easy to compute verification mapping verk (w, s) = true. verk : M S true, false × → { } such that the following two conditions are satisfied: IV054 1. Digital signatures 11/58 IV054 1. Digital signatures 12/58 A COMMENT ON DIGITAL SIGNATURE SCHEMES ADDITIONAL PROPERTIES Of DIGITAL SIGNATURES Sometimes it is required that a digital signature scheme contains also a keys generation phase, Digital signatures can also provide so-called non-repudiation. That means that the signer cannot It is a phase that creates uniformly and randomly a secret successfully claim that he did not signed a message, (signing) key (from a set of potential secret keys) and outputs this secret key and the corresponding public while also claiming that his private key remains secret. (verification) key. IV054 1. Digital signatures 13/58 IV054 1. Digital signatures 14/58 BREAKING DIGITAL SIGNATURE SYSTEMS ATTACKS MODELS on DIGITAL SIGNATURES An encryption system is considered as broken if Basic attack models one can determine (at least a part of) plaintexts from at least some cryptotexts (and at least KEY-ONLY ATTACK: The attacker is only given the public verification key. sometimes). KNOWN SIGNATURES ATTACK: The attacker is given valid signatures for several messages known, but not chosen, by the attacker. A digital signature system is considered as broken CHOSEN SIGNATURES ATTACK: The attacker is given valid signatures for several if one can (at least sometimes) forge (at least messages chosen by the attacker. ADAPTIVE CHOSEN SIGNATURES ATTACKS: The attacker is given valid some) signatures. signatures for several messages chosen by the attacker where messages chosen may depend on previous signatures given for chosen messages. In both cases, a more ambitious goal is to find the private key. IV054 1. Digital signatures 15/58 IV054 1. Digital signatures 16/58 LEVELS of BREAKING of DIGITAL SIGNATURES A DIGITAL SIGNATURE of one BIT Let us start with a very simple, but much illustrative (though non-practical), example how to sign a single bit.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us