0% found this document useful (0 votes)
17 views13 pages

Digital Signature

Digital signatures are essential for ensuring message authenticity and protecting against disputes between parties. They must verify the author, timestamp, and content while being verifiable by third parties. Various attacks on digital signatures exist, necessitating specific requirements to prevent forgery and denial of sending messages, with schemes like the Elgamal signature scheme providing a framework for secure digital signatures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Digital Signature

Digital signatures are essential for ensuring message authenticity and protecting against disputes between parties. They must verify the author, timestamp, and content while being verifiable by third parties. Various attacks on digital signatures exist, necessitating specific requirements to prevent forgery and denial of sending messages, with schemes like the Elgamal signature scheme providing a framework for secure digital signatures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

Digital Signatures

Message authentication code protects two parties who exchange messages


from any third party. However, it does not protect the two parties against
each other. Several forms of dispute between the two are possible.
For example, suppose that John sends an authenticated message to Mary.
Consider the following disputes that could arise.
1. Mary may forge a different message and claim that it came from John.
Mary would simply have to create a message and append an authentication
code using the key that John and Mary share.
2. John can deny sending the message. Because it is possible for Mary to forge
a message, there is no way to prove that John did in fact send the message.
Digital Signatures
Here is an example of the first scenario:
An electronic funds transfer takes place, and the receiver increases the
amount of funds transferred and claims that the larger amount had arrived
from the sender.
An example of the second scenario:
an electronic mail message contains instructions to a stockbroker for a
transaction that subsequently turns out badly. The sender pretends that
the message was never sent.
In situations where there is not complete trust between sender and
receiver, something more than authentication is needed.
The most attractive solution to this problem is the digital signature.
Digital Signatures
Figure 13.1 is a generic model of the process of making and using digital
signatures.
Digital Signature
Properties
The digital signature must have the following properties:
• It must verify the author and the date and time of the signature.
• It must authenticate the contents at the time of the signature.
• It must be verifiable by third parties, to resolve disputes.
Thus, the digital signature function includes the authentication function.
Digital Signature
Attacks and Forgeries
[GOLD88] lists the following types of attacks, in order of increasing severity.
Here A denotes the user whose signature method is being attacked, and C
denotes the attacker.
1.Key-only attack: C only knows A’s public key.
2.Known message attack: C is given access to a set of messages and their
signatures.
3.Generic chosen message attack: C chooses a list of messages before
attempting to breaks A’s signature scheme, independent of A’s public key. C
then obtains from A valid signatures for the chosen messages. The attack is
generic, because it does not depend on A’s public key; the same attack is
used against everyone.
Digital Signature
Attacks and Forgeries
4.Directed chosen message attack: Similar to the generic attack, except that
the list of messages to be signed is chosen after C knows A’s public key but
before any signatures are seen.
5.Adaptive chosen message attack: C is allowed to use A as an “oracle.” This
means that C may request from A signatures of messages that depend on
previously obtained message-signature pairs.
Digital Signature
Attacks and Forgeries
[GOLD88] then defines success at breaking a signature scheme as an
outcome in which C can do any of the following with a non-negligible
probability:
• Total break: C determines A’s private key.
• Universal forgery: C finds an efficient signing algorithm that provides an
equivalent way of constructing signatures on arbitrary messages.
• Selective forgery: C forges a signature for a particular message chosen by
C.
• Existential forgery: C forges a signature for at least one message. C has no
control over the message. Consequently, this forgery may only be a minor
nuisance to A.
Digital Signature
Requirements
On the basis of the properties and attacks just discussed, we can formulate
the following requirements for a digital signature.
• The signature must be a bit pattern that depends on the message being
signed.
• The signature must use some information unique to the sender to prevent
both forgery and denial.
• It must be relatively easy to produce the digital signature.
• It must be relatively easy to recognize and verify the digital signature.
• It must be computationally infeasible to forge a digital signature, either by
constructing a new message for an existing digital signature or by
constructing a fraudulent digital signature for a given message.
• It must be practical to retain a copy of the digital signature in storage.
A secure hash function, embedded in a scheme such as that of Figure 13.1, provides
a basis for satisfying these requirements.
Direct Digital
Signatures
involve only sender & receiver
assumed receiver has sender’s public-key
Confidentiality can be provided by encrypting the entire message plus
signature with a shared secret key (symmetric encryption).
Note that it is important to perform the signature function first and then
an outer confidentiality function.
In case of dispute, some third party must view the message and its
signature.
 If the signature is calculated on an encrypted message, then the third
party also needs access to the decryption key to read the original message.
However, if the signature is the inner operation, then the recipient can
store the plaintext message and its signature for later use in dispute
resolution.
Direct Digital
Signatures
The validity of the scheme just described depends on the security of the sender’s
private key.
If a sender later wishes to deny sending a particular message, the sender can claim
that the private key was lost or stolen and that someone else forged his or her
signature.
Administrative controls relating to the security of private keys can be employed to
thwart or at least weaken this ploy, but the threat is still there, at least to some
degree.
One example is to require every signed message to include a timestamp (date and
time) and to require prompt reporting of compromised keys to a central authority.
Another threat is that some private key might actually be stolen from X at time T.
The opponent can then send a message signed with X’s signature and stamped
with a time before or equal to T.
The universally accepted technique for dealing with these threats is the use of a
digital certificate and certificate authorities.
Elgamal Digital
Signature Scheme
The Elgamal encryption scheme is designed to enable encryption by a
user’s public key with decryption by the user’s private key.
The Elgamal signature scheme involves the use of the private key for
encryption (digital signature generation)and the public key for
decryption(digital signature verification).
Elgamal Digital Signature
Scheme
Example:

You might also like