1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Data security and encryption - Chapter 20: Digital Signatures

68 54 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Data Security and Encryption (CSE348)

  • Lecture # 20

  • Review

  • Chapter 13 – Digital Signatures

  • Slide 5

  • Digital Signatures

  • Slide 7

  • Slide 8

  • Digital Signature Model

  • Slide 10

  • Slide 11

  • Slide 12

  • Slide 13

  • Attacks and Forgeries

  • Slide 15

  • Slide 16

  • Slide 17

  • Slide 18

  • Slide 19

  • Slide 20

  • Slide 21

  • Digital Signature Requirements

  • Slide 23

  • Slide 24

  • Slide 25

  • Direct Digital Signatures

  • Slide 27

  • Slide 28

  • Slide 29

  • Slide 30

  • Slide 31

  • Slide 32

  • ElGamal Digital Signatures

  • Slide 34

  • Slide 35

  • Slide 36

  • ElGamal Digital Signature

  • Slide 38

  • Slide 39

  • Slide 40

  • ElGamal Signature Example

  • Slide 42

  • Schnorr Digital Signatures

  • Slide 44

  • Slide 45

  • Slide 46

  • Slide 47

  • Schnorr Key Setup

  • Slide 49

  • Schnorr Signature

  • Digital Signature Standard (DSS)

  • Digital Signature Algorithm (DSA)

  • Slide 53

  • Slide 54

  • DSA Key Generation

  • Slide 56

  • Slide 57

  • Slide 58

  • Slide 59

  • DSA Signature Creation

  • Slide 61

  • Slide 62

  • Slide 63

  • DSA Signature Verification

  • Slide 65

  • Slide 66

  • Slide 67

  • Summary

Nội dung

The contents of this chapter include all of the following: Digital signatures, ElGamal & Schnorr signature schemes, digital signature algorithm and standard, digital signature model, attacks and forgeries, digital signature requirements, direct digital signatures, ElGamal digital signature.

Data Security and Encryption (CSE348) Lecture # 20 Review • have considered: – Message authentication requirements – Message authentication using encryption – MACs – HMAC authentication using a hash function – CMAC authentication using a block cipher – Pseudorandom Number Generation (PRNG) using Hash Functions and MACs Chapter 13 – Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical powers, or of disinfecting, so to speak, the tainted atmosphere by which they are supposed to be surrounded —The Golden Bough, Sir James George Frazer Digital Signatures • The most important development from the work on public-key cryptography is the digital signature • Message authentication protects two parties who exchange messages from any third party • However, it does not protect the two parties against each other either fraudulently creating, or denying creation, of a message Digital Signatures • A digital signature is analogous to the handwritten signature, and provides a set of security capabilities • That would be difficult to implement in any other way Digital Signatures • Have looked at message authentication – but does not address issues of lack of trust • Digital signatures provide the ability to: – verify author, date & time of signature – authenticate message contents – be verified by third parties to resolve disputes • Hence include authentication function with additional capabilities Digital Signature Model Digital Signature Model  Stallings Figure 13.1 is a generic model of the process of making and using digital signatures  Bob can sign a message using a digital signature generation algorithm  The inputs to the algorithm are the message and Bob's private key 10 Digital Signature Algorithm (DSA)  creates a 320 bit signature  with 512-1024 bit security  smaller and faster than RSA  a digital signature scheme only  security depends on difficulty of computing discrete logarithms  variant of ElGamal & Schnorr schemes 54 DSA Key Generation • Have shared global public key values (p,q,g): – choose 160-bit prime number q – choose a large prime p with 2L-1 < p < 2L • where L= 512 to 1024 bits and is a multiple of 64 • such that q is a 160 bit prime divisor of (p-1) – choose g = h(p-1)/q • where 1

Ngày đăng: 20/09/2020, 14:02

TỪ KHÓA LIÊN QUAN