Digital Signature - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Digital Signature

Description:

Digital Signature. Hash Function Usage. Used Alone. File integrity verification ... DSA (digital signature algorithm)-based approach. Digital Signature Algorithm ... – PowerPoint PPT presentation

Number of Views:86
Avg rating:3.0/5.0
Slides: 16
Provided by: vanetsVus
Category:

less

Transcript and Presenter's Notes

Title: Digital Signature


1
Digital Signature
  • Yuan Xue

2
Hash function
  • Hash function H
  • h H(M)
  • M is a message of variable length
  • h is a fixed-length hash value
  • H satisfies the following properties
  • One-way property
  • Weak collision resistance
  • Strong collision resistance
  • Widely used hash functions
  • MD5
  • SHA family (e.g. SHA-1, SHA-2)
  • Usage
  • Standalone
  • With encryption algorithms
  • Message Authentication
  • Digital Signature

3
Hash Function Usage
  • Used Alone
  • File integrity verification
  • Public key fingerprint
  • Passwd storage
  • Combined with encryption functions
  • Message Authentication
  • HMAC
  • Digital Signature

4
Confidentiality and authentication
Authentication
Authentication, digital signature
5
Authentication, digital signature, confidentiality
Authentication (no encryption needed!)
Authentication, confidentiality
6
HMAC
  • Hash function works with a symmetric key to
    provide message authentication
  • Two methods

MAC
(1) MAC E K, H(M)
(2) MAC H MS ? Idea for HMAC
7
HMAC Structure
  • K K padded with 0
  • on the left (b bits in total)
  • ipad 00110110
  • repeated b/8 times
  • opad 01011100
  • repeated b/8 times

36 in hex repeated
5C in hex repeated
HMAC(K,M) H(K?opad)H(K?ipad)M
8
Digital Signature Overview
  • Message Authentication Code
  • Digital Signature
  • Message authentication non-repudiation

9
Digital Signature
  • Two approaches
  • Encryption of hash value via private key provides
    digital signature
  • Any asymmetric encryption algorithm could be used
  • E.g. RSA
  • Many asymmetric encryption algorithms have export
    restriction
  • DSA (digital signature algorithm)-based approach

10
Digital Signature Algorithm
  • Algorithm
  • Based on discrete log operation
  • Global variables
  • p, q, g
  • Private key x
  • Public key y gx mod p
  • User per-msg secret num k
  • Digital Signature Algorithm
  • An asymmetric key algorithm
  • Can not be used for encryption
  • Can ONLY be used for digital signature

11
Key Exchange Algorithm
  • Distribution of Secret Key using Public Key
    Algorithm
  • Simple distribution
  • With Authentication
  • Diffie-Hellman

12
Diffie-Hellman Key Exchange
a is a primitive root of prime number p then a
mod p, a2 mod p, , ap-1 mod p are distinct and
consist of the integers from 1 through p-1 For
any b and a primitive root a of p, unique
exponent I can be found such that b ai mod p
(0lti lt p-1)
13
Public-Key Algorithm Summary
14
MAC and DS Summary
  • Message Authentication Code
  • CBC-based
  • Hash-based
  • Encrypt the hash code
  • Hash the message key
  • HMAC
  • Digital Signature
  • Encrypt the hash code
  • Digital signature standard

Symmetric Key Encryption
Asymmetric Key Encryption
15
Comparison
  • Computation efficiency
  • Hash gt symmetric encryption gt asymmetric
    encryption
  • Message Authentication Code
  • CBC-based
  • Hash-based
  • Encrypt the hash code
  • Hash the message key
  • HMAC
  • Digital Signature
  • Encrypt the hash code
  • Digital signature standard

faster
Write a Comment
User Comments (0)
About PowerShow.com