Chapter 13 Digital Signature Schemes Pages 463-468, 485, 488 Digital Signatures

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

CS 4363: Cryptography

CS 6373: Applied Cryptography

Module 13.1

Chapter 13 Digital Signature Schemes


Pages 463-468, 485, 488
Digital Signatures

Ravi Sandhu

© Ravi Sandhu
World-Leading Research with Real-World Impact!
1
Private-Key vs Public-Key
Encryption
slide 3, module 12.1

Alice ciphertext Bob


Sender Receiver
private key
kAB symmetric
1 private key/user pair, O(n2)

??? ciphertext Bob


Sender Receiver
public key
pkB asymmetric skB
1 key pair/user, O(n)

© Ravi Sandhu
World-Leading Research with Real-World Impact!
2
Private-Key MAC vs Public-
Key Digital Signature

Alice tagged message Bob


Sender Receiver
private key
compute kAB symmetric verify
tag 1 private key/user pair, O(n2) tag

Alice signed message ???


Sender Receiver
compute public key verify
signature skA asymmetric pkA signature
1 key pair/user, O(n)

© Ravi Sandhu
World-Leading Research with Real-World Impact!
3
Private-Key MAC vs Public-
Key Digital Signature

 Canonical example: software distribution


 Requires distribution of authentic (but not secret) public keys

 Signatures are publicly verifiable


by anyone at anytime
 Signatures are transferable
travel with the message
 Signatures enable non-repudiation by sender
by virtue of asymmetric keys and public-key verification

 Signatures are 100 to 1000 times slower than MACs

© Ravi Sandhu
World-Leading Research with Real-World Impact!
4
Public-Key Encryption vs
Public-Key Digital Signature

 Public-key encryption
 Sender uses receiver's public key to encrypt
 Receiver uses their own private (secret) key to decrypt

 Public-key signature
 Sender uses their own private (secret) key to sign
 Receiver uses sender’s public key to verify

© Ravi Sandhu
World-Leading Research with Real-World Impact!
5
Public-Key Digital Signature

© Ravi Sandhu
World-Leading Research with Real-World Impact!
6
Public-Key Digital Signature

© Ravi Sandhu
World-Leading Research with Real-World Impact!
7
Hash and Sign Paradigm

© Ravi Sandhu
World-Leading Research with Real-World Impact!
8
Hash and Sign Paradigm

© Ravi Sandhu
World-Leading Research with Real-World Impact!
9
Digital Certificates and
Public-Key Infrastructure

certificate subject subject subject’s


authority identity public key
(CA)

page 485

© Ravi Sandhu
World-Leading Research with Real-World Impact!
10
Certificate Chains

next level root


certificate certificate
authority authority
(CA) (CA) page 488

© Ravi Sandhu
World-Leading Research with Real-World Impact!
11
Certificate Expiry
and Revocation

 Certificate can include expiry date or


Certificate can be short lived

 Revoked certificate can be periodically published in a signed list


Requires each certificate to have a unique id
Hash of the certificate is a good usable id

 Look up certificate validity when the public key is to be used


Feasible in the modern internet

© Ravi Sandhu
World-Leading Research with Real-World Impact!
12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy