digita digital l signa signatu tures es instructor ahmad
play

Digita Digital l Signa Signatu tures es Instructor: Ahmad - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaways


  1. Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Digita Digital l Signa Signatu tures es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course. Sharif University Introduction to Modern Cryptography Spring 2015 1 / 59

  2. Outline  Syntax and Definition  Building a Digital Signature  Full Domain Hash (FDH) Sharif University Introduction to Modern Cryptography Spring 2015 2 / 59

  3. Syntax and Definition Sharif University Introduction to Modern Cryptography Spring 2015 3 / 59

  4. Signing by hand Sharif University Introduction to Modern Cryptography Spring 2015 4 / 59

  5. Signing electronically Sharif University Introduction to Modern Cryptography Spring 2015 5 / 59

  6. Signing electronically Sharif University Introduction to Modern Cryptography Spring 2015 6 / 59

  7. What about a MAC? Sharif University Introduction to Modern Cryptography Spring 2015 7 / 59

  8. Digital signatures Sharif University Introduction to Modern Cryptography Spring 2015 8 / 59

  9. Usage Sharif University Introduction to Modern Cryptography Spring 2015 9 / 59

  10. Dissemination of public keys Sharif University Introduction to Modern Cryptography Spring 2015 10 / 59

  11. Signatures versus MA schemes Sharif University Introduction to Modern Cryptography Spring 2015 11 / 59

  12. Security of a DS scheme Sharif University Introduction to Modern Cryptography Spring 2015 12 / 59

  13. uf-cma adversaries Sharif University Introduction to Modern Cryptography Spring 2015 13 / 59

  14. Security of a DS scheme Sharif University Introduction to Modern Cryptography Spring 2015 14 / 59

  15. Formalization: UF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 15 / 59

  16. A difference with MACs Sharif University Introduction to Modern Cryptography Spring 2015 16 / 59

  17. Strong unforgeability Sharif University Introduction to Modern Cryptography Spring 2015 17 / 59

  18. Formalization: SUF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 18 / 59

  19. Building a Digital Signature Sharif University Introduction to Modern Cryptography Spring 2015 19 / 59

  20. RSA signatures Sharif University Introduction to Modern Cryptography Spring 2015 20 / 59

  21. Plain RSA signatures: Idea Sharif University Introduction to Modern Cryptography Spring 2015 21 / 59

  22. Plain RSA signature scheme Sharif University Introduction to Modern Cryptography Spring 2015 22 / 59

  23. Security of plain RSA signatures Sharif University Introduction to Modern Cryptography Spring 2015 23 / 59

  24. Attacks on plain RSA Sharif University Introduction to Modern Cryptography Spring 2015 24 / 59

  25. Homomorphic properties of RSA Sharif University Introduction to Modern Cryptography Spring 2015 25 / 59

  26. Another attack on plain RSA Sharif University Introduction to Modern Cryptography Spring 2015 26 / 59

  27. Other issues Sharif University Introduction to Modern Cryptography Spring 2015 27 / 59

  28. Throwing in a hash function Sharif University Introduction to Modern Cryptography Spring 2015 28 / 59

  29. What we need from H Sharif University Introduction to Modern Cryptography Spring 2015 29 / 59

  30. Preventing previous attacks Sharif University Introduction to Modern Cryptography Spring 2015 30 / 59

  31. RSA PKCS#1 signatures Sharif University Introduction to Modern Cryptography Spring 2015 31 / 59

  32. Does 1-wayness prevent forgery? Sharif University Introduction to Modern Cryptography Spring 2015 32 / 59

  33. 𝑰 𝑸𝑳𝑫𝑻 revisited Sharif University Introduction to Modern Cryptography Spring 2015 33 / 59

  34. Goal Sharif University Introduction to Modern Cryptography Spring 2015 34 / 59

  35. Full Domain Hash (FDH) Sharif University Introduction to Modern Cryptography Spring 2015 35 / 59

  36. Full-Domain-Hash (FDH) [BR96] Sharif University Introduction to Modern Cryptography Spring 2015 36 / 59

  37. UF-CMA in RO model Sharif University Introduction to Modern Cryptography Spring 2015 37 / 59

  38. Security of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 38 / 59

  39. Programming the RO Sharif University Introduction to Modern Cryptography Spring 2015 39 / 59

  40. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 40 / 59

  41. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 41 / 59

  42. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 42 / 59

  43. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 = 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 43 / 59

  44. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 44 / 59

  45. The case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 45 / 59

  46. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 46 / 59

  47. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 47 / 59

  48. The inverter for the case 𝒓 𝒕 = 𝟏 and 𝒓 𝒊 > 𝟐 Sharif University Introduction to Modern Cryptography Spring 2015 48 / 59

  49. The case 𝒓 𝒕 > 𝟏 Sharif University Introduction to Modern Cryptography Spring 2015 49 / 59

  50. Replying to Sign queries Sharif University Introduction to Modern Cryptography Spring 2015 50 / 59

  51. Simplification Sharif University Introduction to Modern Cryptography Spring 2015 51 / 59

  52. Inverter for the case 𝒓 𝒕 > 𝟏 Sharif University Introduction to Modern Cryptography Spring 2015 52 / 59

  53. Analysis intuition Sharif University Introduction to Modern Cryptography Spring 2015 53 / 59

  54. Fundamental Lemma variant Sharif University Introduction to Modern Cryptography Spring 2015 54 / 59

  55. Analysis Sharif University Introduction to Modern Cryptography Spring 2015 55 / 59

  56. Analysis Sharif University Introduction to Modern Cryptography Spring 2015 56 / 59

  57. Security of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 57 / 59

  58. Better analysis of FDH in RO model Sharif University Introduction to Modern Cryptography Spring 2015 58 / 59

  59. Questions? Sharif University Introduction to Modern Cryptography Spring 2015 59 / 59

Recommend


More recommend