Yuan Xue - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Yuan Xue

Description:

Diffie-Hellman. Distribution of Public Key. Introduction to GnuPG ... Diffie-Hellman. Y. Y. Y. RSA. Key Exchange. Digital Signature. Encryption/ Decryption ... – PowerPoint PPT presentation

Number of Views:25
Avg rating:3.0/5.0
Slides: 12
Provided by: vanetsVus
Category:
Tags: hellman | xue | yuan

less

Transcript and Presenter's Notes

Title: Yuan Xue


1
Lecture 14
  • Yuan Xue
  • Oct 17 2007

2
Outline
  • Review of Hash function
  • Digital Signature
  • DSS (DSA)
  • Key Management
  • Distribution of Secret Key using Public Key
    Algorithm
  • Diffie-Hellman
  • Distribution of Public Key
  • Introduction to GnuPG

3
Review of Hash function
  • Hash function H
  • h H(M)
  • M is a message of variable length
  • h is a fixed-length hash value
  • H satisfies the following properties
  • One-way property
  • Weak collision resistance
  • Strong collision resistance
  • Widely used hash functions
  • MD5
  • SHA family (e.g. SHA-1, SHA-2)
  • Usage
  • Standalone
  • With encryption algorithms
  • Message Authentication
  • Digital Signature

4
HMAC
  • Hash function works with a symmetric key to
    provide message authentication
  • Two methods

MAC
(1) MAC E K, H(M)
(2) MAC H MS ? Idea for HMAC
5
HMAC Structure
36 in hex repeated
5C in hex repeated
HMAC(K,M) H(K?opad)H(K?ipad)M
6
Digital Signature Overview
  • Message Authentication Code
  • Digital Signature
  • Message authentication non-repudiation

7
Digital Signature
  • Two approaches
  • Encryption of hash value via private key provides
    digital signature
  • Any asymmetric encryption algorithm could be used
  • E.g. RSA
  • Many asymmetric encryption algorithms have export
    restriction
  • DSA (digital signature algorithm)-based approach

8
Digital Signature Algorithm
  • Algorithm
  • Based on discrete log operation
  • Global variables
  • p, q, g
  • Private key x
  • Public key y gx mod p
  • User per-msg secret num k
  • Digital Signature Algorithm
  • An asymmetric key algorithm
  • Can not be used for encryption
  • Can ONLY be used for digital signature

9
Key Management
  • Distribution of Secret Key using Public Key
    Algorithm
  • Simple distribution
  • With Authentication
  • Diffie-Hellman
  • Distribution of Public Key
  • Public-key Authority
  • Public-key Certificate
  • Web of Trust (GnuPG)

10
Diffie-Hellman Key Exchange
a is a primitive root of prime number p then a
mod p, a2 mod p, , ap-1 mod p are distinct and
consist of the integers from 1 through p-1 For
any b and a primitive root a of p, unique
exponent I can be found such that b ai mod p
(0lti lt p-1)
11
Public-Key Algorithm Summary
Write a Comment
User Comments (0)
About PowerShow.com