欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    密码学Digital Signature.ppt

    • 资源ID:67249291       资源大小:159.50KB        全文页数:56页
    • 资源格式: PPT        下载积分:16金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要16金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    密码学Digital Signature.ppt

    DigitalSignature曹天杰Tianjie Cao College of Computer Science andTechnology,China University of Mining and Technology,Xuzhou,China中国矿业大学计算机科学与技术学院2003.6.61DefinitionsDefinitionsDigitalSignature-adatastringwhichassociatesamessagewithsomeoriginatingentityDigitalSignatureGenerationAlgorithmamethodforproducingadigitalsignatureDigitalsignatureverificationalgorithm-amethodforverifyingthatadigitalsignatureisauthentic(i.e.,wasindeedcreatedbythespecifiedentity).DigitalSignatureScheme-consistsofasignaturegenerationalgorithmandanassociatedverificationalgorithm2ApplicationsDigitalSignaturescanprovideAuthenticationDataIntegrityNon-RepudiationOneApplicationCertificationofpublickeysinlargenetworks3ClassificationDigitalsignatureschemeswithappendixrequiretheoriginalmessageasinputtotheverificationalgorithm.Digitalsignatureschemeswithmessagerecoverydonotrequiretheoriginalmessageasinputtotheverificationalgorithm.Inthiscase,theoriginalmessageisrecoveredfromthesignatureitself.4Classification(cont)Taxonomyofdigitalsignaturessignature schemesmessage recoveryappendixdeterministicrandomizedrandomizeddeterministic5TypesofSignaturesDirect digital signatureinvolvesonlythecommunicatingpartiesAssumedthatreceiverknowspublickeyofsender.Signaturemaybeformedby(1)encryptingentiremessagewithsendersprivatekeyor(2)encryptinghashcodeofmessagewithsendersprivatekey.Furtherencryptionofentiremessage+signaturewithreceiverspublickeyorsharedprivatekeyensuresconfidentiality.6TypesofSignaturesProblemswithdirectsignatures:Validityofschemedependsonthesecurityofthesendersprivatekeysendermaylaterdenysendingacertainmessage.PrivatekeymayactuallybestolenfromXattimeT,sotimestampmaynothelp.7TypesofSignaturesArbitrated digital signatureinvolvesatrustedthirdpartyorarbiter1.Everysignedmessagefromsender,X,toreceiver,Y,goestoanarbiter,A,first.2.Asubjectsmessage+signaturetonumberofteststocheckorigin&content3.AdatesthemessageandsendsittoYwithindicationthatithasbeenverifiedtoitssatisfaction8ArbitratedDigitalSignaturesRequiresanunconditionallyTTPaspartofthesignaturegenerationandsignatureverification.EachentitysharesasymmetrickeywiththeTTPSymmetrickeycryptographyresultsinaveryfastalgorithmHowever,thisspeedupisovershadowedbytheTTPaswellascommunicationoverhead9ArbitratedDigitalSignaturesSignatureGeneration(byA)ATTPIA,u=EkA(h(m)s=EkT(h(m)|IA)10ArbitratedDigitalSignaturesSignatureVerification(byB)BTTPIB,v=EkB(s)EkB(h(m)|IA)11DigitalSignatureStandardsRSADigitalSignature-ISO9796-ANSIX9.31-CCITTX.509ElGamalNISTFIPS186DigitalSignatureStandard(DSS)12PublicKeyCryptographySignatureschemesLet P be the set of all messagesA be the set of signaturesK be the set of all keys13BasicMechanismofSignatureSchemesK:Akeygenerationalgorithmtorandomlyselectapublickeypair.SigK:Asignaturealgorithmthattakesmessage+privatekeyasinputandgeneratesasignatureforthemessageasoutputVerK:Asignatureverificationalgorithmthattakessignature+publickeyasinputandgeneratesinformationbitaccordingtowhethersignatureisconsistentasoutput.14AttackmodelsTotal Breaking Attack-Theattackerknowsthepublickey.Hetriestorecoverthecorrespondingsecretkey.Forgery Attack-Theattackerknowsthepublickey.Hetriestofindthesignatureforagivenmessage.Existential Forgery Attack-Theattackerknowsthepublickey.Hetriestofindapairofamessageanditssignature.Chosen Message Attack(CMA)-Theattackerisabletosignmessagesbutdoesnotknowthekeyused.Hetriestoperformthe(existential)forgeryortoobtainthesecretkey.15ForgeryAttackTheattackertriestofindthesignaturesfromagivenmessagemandthepublickey.Forgeryattackermessagempublickeysignaturesofm(d:secretkey)16ExistentialForgeryAttackExistentialForgeryAttackerpublickey(m,s):pairofmessageandsignature.Theattackertriestofindapairofamessageanditssignaturefromthepublickey.Themessageofthepairmayhavenomeanings.(d:secretkey)17ChosenMessageAttackTheattackertriestofindapair(m,s)fromseveralpairsofsignature(mi,si)andthepublickey.ChosenMessageAttackerpublickey(m,s):pairofmessageandsignature.(d:secretkey)SigningOraclemessagesmSd(m):signaturesIftheattackercanchoosenewmessagesdependenttoobtainedsignatures,itiscalledtheadaptivechosenmessageattack.18TheRSAdigitalsignatureLetn=pq,where pand qareprimes.LetP=A=Zn,anddefine K=(n,p,q,e,d):ed=1modf(n).Foreachkey K=(n,p,q,e,d),definesigK(m)=mdmodnandverK(m,y)=true y e=mmodn,where(m,y)Zn.Publickey=(n,e),Privatekey(n,d).19ExistentialForgeryofRSALet(S1,S2)bethesignaturesofthemessages(M1,M2),namelyS1=M1dmodn,S2=M2dmodn.ThenS=S1*S2modnisthesignatureofM=M1*M2modn,becauseS=S1*S2=M1dM2d=(M1*M2)dmodn.ThemessageMmustberandomizedbeforesigning.ThemessageMisusuallysignedbyS=h(M)dmodn,wherehisthehashfunctionh:0,1*-Z/nZ.(h(M)=h(M1)*h(M2)modndoesnothold)20TheElGamalsignatureschemeLetpbeaprimeandg Zpaprimitiveelement.LetP=Zp*,A=Zp*xZp-1andK=(p,g,x,y):y=gxmodp.Thevalues p,g,yarethepublickey.xistheprivatekey.21TheElGamalsignatureschemeSigningLetmZp*beamessage.ForK=(p,g,x,y):y=gxmodp,andsecretrandomnumberk Zp-1*,define:sigK(m,k)=(s,t),wheres=gkmodpt=(m-xs)k-1 modp-1(kt+xs=m modp-1)VerificationverK(m,(s,t)=true stys=gmmodp.stys=gkt gxs=gmmodp kt+xs=m modp-122ToyexampleLetp=467,g=2,x=127.Theny=2127mod467=132.Letmessagem=100,Choosek=213.Thenk-1mod466=431.Thesignatureis:s=2213mod467=29t=(m-xs)k-1mod(p-1)=(100-127x29)431mod466=51Verification:2100?132292951mod46723ThesecurityoftheElGamalsignatureIftheDiscreteLogarithmproblemcanbesolvedthenElGamalsignaturescanbeforged.Theconversemaynotbetrue.Theexponentkmustbeprivatecannotbeusedtwicebest:chosenatrandom.24DSAAvariantoftheElGamalandSchnorrSignatureSchemesPublickeycryptographicsystemusedforgeneratingandverifyingdigitalsignaturesCannotbeusedfordataencryptionorkeyexchangeBasedonfamiliarnumbertheoryconceptsMakesuseoftheSecureHashAlgorithm(SHA-1)25KeyGenerationAlgorithmGeneratingpublicandprivatekeys:1)Selectaprimenumberq2159q2160|q|=160bits2)Selectaprimenumberp2511p21024|p|=Lbits512L1024L0mod64p10modq26KeyGenerationAlgorithmGeneratingpublicandprivatekeys:3)Calculateaqthrootof1,=g(p1)/qmodp1g1Zp*4)Selectarandom“personal”privatekeyx1x(q1)5)Calculate“personal”publickeyyy=xmodp27KeyGenerationAlgorithmGlobalPublicKeyComponentsq,p,UsersPrivateKeyxUsersPublicKeyyUserspublickeyiscalculatedfromhis/herprivatekey28SignatureGenerationAlgorithmSigningamessagem:1)Selectarandomsecretintegerk0kqshouldbeuniqueforeachmessagesigned2)Calculatess=(kmodp)modq0sq3)Calculatett=(SHA-1(m)+(x s)k-1modq0tq4)Thesignatureofmproducesthepair(s,t)tobeusedintheverificationprocess29SignatureGenerationAlgorithmMessagemSHA-1MessageDigestSigns=(kmodp)modqt=(SHA-1(m)+(x s)k-1modqPrivateKeyxDigitalSignature(s,t)30VerificationAlgorithmVerifyingasignature(s,t):1)Verify0sqand0tq2)Calculatee1u1=SHA-1(m)t-1modq3)Calculatee2u2=st-1modq4)Calculatevv=(u1y u2)modpmodq5)Acceptthesignatureiff:v=s31VerificationAlgorithmMessagemSHA-1MessageDigestVerifyu1=SHA-1(m)t-1modqu2=st-1modqv=(u1y u2)modpmodqPublicKeysq,p,yDigitalSignature(s,t)v=sv sSignatureVerificationSucceededSignatureVerificationFailed32ProofLetw=t-1modqu1=(SHA-1(m)w)modqu2=(s w)modqFromsignaturegenerationwehave:t=(k-1(SHA-1(m)+x s)modqSo,w=t-1modq=(k-1(SHA-1(m)+x s)-1)modq=(k(SHA-1(m)+x s)-1)modqRearranging:(SHA-1(m)+x s)wmodq=kmodq33Proof(continued)Fromkeygeneration,wehave:y=xmodpSo,v=(u1y u2)modp)modq=(SHA-1(m)wy s w)modp)modq=(SHA-1(m)w x s w)modp)modq=(SHA-1(m)+x s)w)modp)modq=(k)modp)modq (q=1modp)=s34ExampleKeyGenerationp=124540019q=17389(p1)/q=7162g=110217528=g(p1)/qmodp=10083255x=12496y=xmodp=11994626535Example(continued)KeyGenerationPublicKey:p=124540019q=17389=10083255“Personal”PrivateKey:x=12496“Personal”PublicKey:y=11994626536Example(continued)SignatureGenerationk=9557s=(kmodp)modq=34 t=(SHA-1(m)+(x s)k-1modq=13049k-1modq=7631SHA-1(m)=5246(contrivedforexample)Signatureformis(s=34,t=13049)37Example(continued)SignatureVerificationu1=SHA-1(m)t-1=12716u2=st-1modq=8999v=(e1y e2)modpmodq=34Sincev=s=34,theverificationissuccessfulandthesignatureisvalidated38SecurityofDSAAdversaryDoesnotknowprivatekeyofsignerCannotgeneratevalidsignatureGiventheuserspublickey,itiscomputationallyinfeasibletodeterminetheusersprivatekeyDiscretelogarithmproblem39Criticism:RSAvs.DSARSA:usedforbothencryptionanddigitalsignaturessignatureverificationfasterthansignaturegenerationDSA:onlyfordigitalsignaturessignaturegenerationfasterthansignatureverification40CriticismfromRSADSAlackedRSAsflexibilityDSAtoonewandnotanalyzedenoughDSAsignatureverificationwastooslowComputerandhardwarevendorsalreadystandardizedontheRSAalgorithmProcessNISTusedtochooseDSAwastoosecretiveandarbitrarytoomuchinfluencefromNSA41CriticismoftheKeypwasinitiallyfixedat512bitsNotsecureenoughAllowedupto1024bitsOctober2001:NISTrecommendedthatpbe1024bits“neitherastandardnoraguideline”Presentlyconsideredsecurewith1024bits42TheEllipticCurveDigitalSignatureAlgorithm(ECDSA)isbeingproposedasanANSIX9.62standardLikeDSAbasedonElGamalsignatureschemeBetterthanDSAWithmuchsmallerkeylengthitprovidessamelevelofsecurityasthoseofRSAandDSASpeedcanbeoptimizedECDSA43ECDSA(contd)Publickeys:(E,P,n,Q)Privatekeys:dwhereE isanEllipticCurveP isapointonthecurvewhoseorderisnd isanintegerrandomlyselectedintheinterval1,n-1Q isanotherpointonthecurvesuchthat44ECDSA(contd)Signature:whereh(m)isSecureHashofthemessagem(SHA-1)k isarandomintegerintheinterval1,n-1(s,t)issignatureiscomponentsofanECpoint(integers)45ECDSA(contd)Verification:wherew=t-1 (modn)46Amechanismwhichcanbeusedtosign,atmost,onemessage;otherwise,signaturescanbeforgedAnewpublickeyisrequiredforeachmessagePublicinformation(validation parameters)isnecessaryforverificationSignaturegenerationandverificationareveryefficientUsefulinapplicationssuchassmartcards,wherelowcomputationalcomplexityisrequiredOne-timesignatureschemes47One-timeprivatekey:,eachofbitlengthlOne-timepublickey:,eachofbitlengthlsuchthatwhereE isasymmetric-keyencryptionscheme(e.g.DES),isthebinaryrepresentationofi.TheRabinone-timesignaturescheme48Signature:wherem ismessageissignatureh ishashfunctionE isasymmetric-keyencryptionscheme(e.g.DES)TheRabinscheme(contd)49Verification:Selectn distinctrandomnumberssuchthat1,2nRequesttheprivatekeysVerifytheauthenticityofkeybycheckingwhereVerifythatUnlikeotherdigitalsignatureschemes,verificationcanbedoneonlyonce.TheRabinscheme(contd)50TheRabinscheme(contd)keysize:n=80,l=64,Resolutionofdisputes:signerA,verifierBandTTPBprovidemandsignatureTTPgetprivatekeyk1,.k2nfromATTPverifyauthenticityoftheprivatekeyTTPcomputeui=Eki(h(m),1i2n.Ifui=siforatmostnvaluesofi,itisforgerybyB.Ifn+1ormorevaluesmatch,itisvalidsignatureRationalefordisputeresolutionprotocolAcandisavowwithPr=1/C2nn51TheRabinscheme(contd)RationalefordisputeresolutionprotocolIfB hasattemptedtoforgeAssignatureonanewmessagem0,B eitherneedstodetermineatleastonemorekeyk0 sothatatleastn+1 valuesofi giveui=si,ordeterminem0 suchthath(m)=h(m0).IfA attemptstocreateasignaturewhichitcanlaterdisavow,A mustensurethatui=siforpreciselyn valuesofi andhopethatB choosesthesen values,theprobabilityofwhichisonlywithPr=1/C2nn52BlindsignatureschemeDefinition:AsendsapieceofinformationtoB.BsignsandreturnsthesignaturetoA.Fromthissignature,AcancomputeBssignatureonapriorimessagemofAschoice.Atthecompletionoftheprotocol,Bknowsneitherm,northesignatureassociatedwithit.Application:e-cash53Blindsignaturescheme(cont)ChaumSenderA;SignerBBsRSApublicandprivatekeyareasusual.kisarandomsecretintegerchosenbyA,satisfying0knProtocolactions(blinding)A:compm*=mkemodn,toBNote:(mke)d=mdk(signing)Bcomps*=(m*)dmodn,toA(unblinding)A:computess=k-1s*modn54Blindsignaturescheme(cont)cut-and-choosetechnique(1)BOBpreparesndocuments,eachusingadifferentcovername,givinghimselfdiplomaticimmunity.(2)BOBblindseachofthesedocumentswithadifferentblindingfactor.(3)BOBsendsthenblindeddocumentstoALICE.(4)ALICEchoosesn1documentsatrandomandasksBOBfortheblindingfactorsforeachofthosedocuments.(5)BOBsendsALICEtheappropriateblindingfactors.(6)ALICEopens(i.e.,sheremovestheblindingfactor)n1documentsandmakessuretheyarecorrectandnotpensionauthorizations.(7)ALICEsignstheremainingdocumentandsendsittoBOB.(8)Agentremovestheblindingfactorandreadshisnewcovername:“TheCrimsonStreak.”Thesigneddocumentgiveshimdiplomaticimmunityunderthatname.55ReferencesFIPS PUB 186-256

    注意事项

    本文(密码学Digital Signature.ppt)为本站会员(s****8)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开