1 / 9

Information Security

Information Security. message M. one-way hash. fingerprint f = H ( M ). Outline and Reading. Digital signatures Definition ( §10.2.2) RSA signature and verification ( §10.2.3) One-way hash functions Definition ( §10.3.1) Applications ( §10.3.2) Key distribution

branxton
Download Presentation

Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security messageM one-way hash fingerprintf = H(M) Information Security

  2. Outline and Reading • Digital signatures • Definition (§10.2.2) • RSA signature and verification (§10.2.3) • One-way hash functions • Definition (§10.3.1) • Applications (§10.3.2) • Key distribution • Certificates (§10.3.5) • Revocation (§10.3.5) Information Security

  3. Digital Signatures Scenario: • Alice sends a message M to Bob • Bob receives M, and wants to verify that Alice is the author of M. Messages sent on papers: • Alice signs the message M and sends the handwritten signature with M to Bob. • When Bob sees Alice’s autograph, he knows that M is sent by Alice. Messages sent through networks: • Digital signatures • Alice computes a digital signature S computed based on M and send S with M to Bob • By examining S, Bob can verify that the author of M is Alice, because only Alice can compute such a S from M (in a reasonable amount of time) Two components needed for digital signature • An algorithm for Alice to compute S (Alice signs the message) • An algorithm for Bob to examine S (Bob reads the signature) • A recently passed law in the US gives digital signatures the same validity of handwritten signatures Information Security

  4. Digital Signatures • Public-key cryptosystem • D(E(M))=M • E(D(M))=M • A public-key cryptosystem yields a digital signature scheme provided encrypt(KE, decrypt(KD, M)) = M Signature: Alice (author) computes S=decrypt(KD,M) using her private key KD and sends the pair (M,S)to Bob Verification: Bob (reader) computes M´=encrypt(KE,S) using Alice’s public key KE and checks that M´ = M Information Security

  5. Setup: n = pq, withpandqprimes e relatively prime tof(n) = (p- 1) (q- 1) dinverse of e in Zf(n) Keys: Public key: KE = (n, e) Private key: KD = d Signature: Message M in Zn Signature S=Mdmodn Verification: Check that M=Semodn Setup: p = 5, q = 11n = 511 = 55 f(n) = 410 = 40 e = 3 d = 27 (327 = 81 = 240 + 1) Keys: Public key: KE = (55, 3) Private key: KD = 27 Signature: M = 51 S = 5127mod55 = 6 Verification: S = 63mod55 = 216 mod 55 = 51 RSA Digital Signature Information Security

  6. Certificates • Public-key cryptography is based on the knowledge by each participant of the public key of the other participants • If Alice wants to send a confidential message to Bob, she needs to know Bob’s public key • When Alice receives an message M with digital signature S from Bob, she needs to know Bob’s public key to verify S • It is complicated to securely distribute the public keys of all the participants • How does Alice get Bob’s public key? • Bob sends it to Alice. • But how can Alice verify that the public key she receives is in fact Bob’s public key? • What if Eve intercepts the communication and replaces Bob’s public key with hers? • Eve can trick Alice into believing that she is Bob. (Eve impersonates Bob) • Charlie is trusted by all participants. Each participants knows Charlie’s public key. • Bob registers with Charlie, and Charlie sends Bob an message (Certificate) with his digital signature saying “Bob’s public key is ….” • Bob sends Alice the Alice certificate that Charlie sent him • Alice verifies that the certificate is sent by Charlie by checking the digital signature using Charlie’s public key Information Security

  7. Certificates • A certificate is a message of the type (name, public key) signed by a third-party • Public-key infrastructure (PKI) • An entity trusted by all the participants, called certification authority (CA), issues to each participant a certificate (Name, KE) that authoritatively binds the participants to their public keys • Only the CA’s public key needs to be distributed securely • Before sending an encrypted message to Bob or verifying a message digitally signed by Bob, Alice determines Bob’s public key KE by using Bob’s certificate (Bob, KE) Information Security

  8. Web Server Certificates • A Web server certificate is used to authenticate the public key of a Web server • Fields of a Web server certificate • Serial number • Hash and signature schemes (e.g., MD5 and RSA) • Issuer (certification authority) • Period of validity (from, to) • Subject (URL and organization) • Public key • The SSL (secure socket layer) protocol uses Web server certificates to provide encryption and authentication in a secure Web connection (https) Information Security

  9. Certificate Revocation • In certain circumstances, a certificate may have to be revoked before its expiration date • The private key of the subject has been compromised • The certificate was incorrectly issued by the CA • Certificate Revocation List (CRL) • Time-stamped list of all the unexpired certificates that have been revoked by the CA • Periodically published and signed by the CA • When presented with a certificate, one should • Verify the CA’s signature on the certificate • Check that the certificate has non been revoked by searching in the latest available CRL • By default, Web browsers do not check the revocation status of a Web server certificate, which poses a security risk Information Security

More Related