SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
Hoang Nguyen Van
Mail: nvhoang@vnua.edu.vn
Department of Computer Science – FITA – VNUA
Information Security Course --------------------------------------------- Fall 2015
Dept. of Computer Science – FITA – VNUA
Trust
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Alice attacks Bob or vice versa
(in terms of information)
Information Security ----------- Fall 2015
Hoang Nguyen Van 7
Trust
Make belief
How
Alice cannot attack Bob
and Bob cannot attack Alice
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
“Unforgeability” = Integrity (or authenticity)
Can MACs help?
(Without access to the secret key, no way to verify a tag)
Only sender can generate a tag (using private information)
Anyone can verify a tag (public verifiability)
(MACs are symmetric)
Information Security ----------- Fall 2015
Hoang Nguyen Van
“Unforgeability” = Integrity (or authenticity)
Can MACs help?
(Without access to the secret key, no way to verify a tag)
Only sender can generate a tag (using private information)
Anyone can verify a tag (public verifiability)
(MACs are symmetric)
Information Security ----------- Fall 2015
Hoang Nguyen Van
asymmetric
Security (informal)
Even after observing signatures on multiple messages, attacker
should be unable to forge a valid signature on a new message.
Information Security ----------- Fall 2015
Hoang Nguyen Van
Definition
G (key-generation algorithm), output a pair of keys (pu,pr) ∈ K1K2
S (signing algorithm): K2xM → T
V (verification algorithm): K1xTxM → {0, 1}
∀ (pu, pr) ∈ K1K2, ∀m ∈ M: V(pu, S(pr,m), m) = 1.
Information Security ----------- Fall 2015
Hoang Nguyen Van
What it means for a DSS to be
secure
Information Security ----------- Fall 2015
Hoang Nguyen Van
What it means for a DSS to be secure
Threat model
Adaptive chosen-message attack
Assume the attacker can induce the sender to sign messages
of the attacker’s choice
Attacker gets the public key (pu)
Security requirements
Existential “unforgeability”
Attacker should be unable to forge valid signature on any
massage not signed by the sender
Information Security ----------- Fall 2015
Hoang Nguyen Van
Chal. Adv.
AkK
(m,t)
m1  M
t1  S(pr,m1)
b=1 if V(pu,m,t) = 1 and (m,t)  { (m1,t1) , … , (mq,tq) }
b=0 otherwise
b
m2 , …, mq
t2 , …, tq
Secure DSS
Def: Π =(G,S,V) is a secure DSS if for all “efficient” A:
AdvDSS[A, Π] = Pr[Chal. outputs 1] is “negligible”.
Information Security ----------- Fall 2015
Hoang Nguyen Van
How to build a secure digital signature
scheme
Information Security ----------- Fall 2015
Hoang Nguyen Van
A simple approach is called plain RSA signature scheme.
Π = (G, S, V)
G = GRSA which outputs pu = <N,e> and pr = <N,d>
S(pr, m) = ERSA(pr, m) = md mod N
V(pu, t, m) = 1 if m = DRSA(pu, t) = te mod N and = 0 otherwise
Plain RSA signature scheme is secure, isn’t it
Information Security ----------- Fall 2015
Hoang Nguyen Van
RSA assumption: Given pu=<N,e>, hard to compute
the eth root of a uniform m ∈ ℤ 𝑁
∗
. ⟹ easy to compute eth
root of some specific message.
The eth root of m modulo N is [md mod N]
(md)e = mde = m[ed mod 𝜙(N)] = m mod N
Example
easy to compute the eth root of m = 1.
Information Security ----------- Fall 2015
Hoang Nguyen Van
A no-message attack
Only use the public key pu=<N,e>
Choose a uniform t ∈ ℤ 𝑁
∗
Compute m = DRSA(pu, t) = te mod N
Output (m, t) ⟹ not secure.
The adv. has “no control” over the message m for which it
forges a valid signature.
Information Security ----------- Fall 2015
Hoang Nguyen Van
Forge a signature on arbitrary message
te = (t1.t2)e = (m1
d.m2
d)e = m1
ed.m2
ed = m1.m2= m mod N
Given m ∈ ℤ 𝑁
∗
Choose m1, m2 ∈ ℤ 𝑁
∗
distinct from m s.t. m=m1.m2 mod N
Obtain signatures t1, t2 on m1, m2
Compute t = t1.t2 mod N
Output (m, t) ⟹ not secure.
Information Security ----------- Fall 2015
Hoang Nguyen Van
Transformation function h: M ⟶ ℤ 𝑁
∗
Π = (G, S, V)
G = GRSA which outputs pu = <N,e> and pr = <N,d>
S(pr, m) = ERSA(pr, h(m)) = [h(m)]d mod N
V(pu, t, m) = 1 if h(m) = DRSA(pu, t) = te mod N and = 0 otherwise
What cryptographic property h should have
Information Security ----------- Fall 2015
Hoang Nguyen Van
What cryptographic property h should have
Not easy to compute the eth root of H(1), ...
Given t, how to find m such that H(m) = te mod N
⟹ computing inverses of h should be hard
Hard to find three message m, m1, m2 such that
h(m) = h(m1).h(m2) mod N
Hard to find collisions in h
Information Security ----------- Fall 2015
Hoang Nguyen Van
Theorem
ℤ 𝑁
∗
How to build h function
Information Security ----------- Fall 2015
Hoang Nguyen Van
In practice, h is instantiated with a (modified)
cryptographic hash function.
How to build h function
In theory, h: M ⟶ ℤ 𝑁
∗
It is crictical that the range of h to be (close to) all of ℤ 𝑁
∗
Must ensure that the range of h is large enough
Information Security ----------- Fall 2015
Hoang Nguyen Van
Given a d.s.s Π = (G,S,V) for short messages of length
n and a hash function h: {0,1}* → {0,1}n
Goal: construct a d.s.s Π1 = (G1,S1,V1) for arbitrary-
length messages
Hash-Sign Paradigm
G1 = G
S1(pr,m) = S(pr, h(m))
V1(pu,t,m) = V(pu, t, h(m))
Information Security ----------- Fall 2015
Hoang Nguyen Van
Theorem
Π Π
Proof
Assume Π attacker outputs forgery (m, t), m ≠ mi
∀ i ∈ {1, …, q}
If h(m) = hi for some i collision in h∎
Otherwise, h(m) ≠ hi Π ∎
Information Security ----------- Fall 2015
Hoang Nguyen Van
Based on identification schemes
Fiat-Shamir Transform
Digital Signature Algorithm (DSA) and Elliptic Curve Digital
Signature Algorithm ( ECDSA) – NIST-1991
Based on hash functions
Lamport’s Signature Scheme (on-time)
Chain-based Signatures (many-time)
Tree-based Signature
see more in textbook
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Problem: Signer denies issuing a signature
Private key is not secure
Use wrong public key
Untill now, we only dicused how to use public key
But, how are public key securely distributed?
Information Security ----------- Fall 2015
Hoang Nguyen Van
Recall: Key Distribution Problem
Information Security ----------- Fall 2015
Hoang Nguyen Van
How to only use public-key cryptosystems to
securely distribute public keys?
Information Security ----------- Fall 2015
Hoang Nguyen Van
No, we didn’t.
And the key notion here is a digital certificate.
Information Security ----------- Fall 2015
Hoang Nguyen Van
Is a signature binding an entity to some public key
Example
Alice has generated a pair of keys (puA, prA)
Bob has also generated a pair of keys (puB, prB)
𝑐𝑒𝑟𝑡 𝐴→𝐵 ≝ S(prA, “Bob’s public key is puB”)
𝑐𝑒𝑟𝑡 𝐴→𝐵 is called a certificate for Bob’s public key issued by Alice
Information Security ----------- Fall 2015
Hoang Nguyen Van
Assumptions
A certificate authority (CA) who is completely trusted by Alice and
Bob.
Bob obtains puCA
Alice asks the CA to sign the binding <Alice, puA>
𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 ≝ S(prCA, <Alice, puA>)
Bob obtains <Alice, puA> and 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴
If V(puCA, 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴, <Alice, puA>)=1 then Bob is assured that
puA is the Alice’s public key
Information Security ----------- Fall 2015
Hoang Nguyen Van
Assumptions
A certificate authority (CA) who is completely trusted by Alice and
Bob.
Bob obtains puCA
Alice asks the CA to sign the binding <Alice, puA>
𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 ≝ S(prCA, <Alice, puA>)
Bob obtains <Alice, puA> and 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴
If V(puCA, 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴, <Alice, puA>)=1 then Bob is assured that
puA is the Alice’s public key
If Bob trusts CA, he can accept puA as Alice’s
legitimate public key.
How does Bob get puCA in the first place?
Information Security ----------- Fall 2015
Hoang Nguyen Van
A key idea
Once a single public key, belonging to a trusted party, is distributed
in a secure fashion, that key can be used to “bootstrap” the secure
distribution of arbitrary many other public keys.
Thus, at least in principle, the problem of secure key distribution
need only be solved once.
The solution is feasible!
Information Security ----------- Fall 2015
Hoang Nguyen Van
How does Bob get puCA in the first place?
Distributed as part of operating system, or web browser
Information Security ----------- Fall 2015
Hoang Nguyen Van
“Web of trust” Model
Alice can obtain public keys from her friends in person
Alice can issues certificates for public keys of her friends
Alice can obtain certificates on her public keys from her
friends.
If Alice knows Bob’s public key and Bob issued certificate
for Charlie, then Charlie can send this certificate to Alice. And
Alice can verify this certificate.
Information Security ----------- Fall 2015
Hoang Nguyen Van
Delegation and certificate chains
Information Security ----------- Fall 2015
Hoang Nguyen Van
PKI in practice
Is not as simple as in theory
Expiration
Revocation
Other issues
see more in textbook
Information Security ----------- Fall 2015
Hoang Nguyen Van 42
Who I can trust?
Information Security ----------- Fall 2015
Hoang Nguyen Van 43
Challenge: can trust without the trusted party?
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van
Information Security ----------- Fall 2015
Hoang Nguyen Van

Mais conteúdo relacionado

Mais de Hoang Nguyen

GANs and Applications
GANs and ApplicationsGANs and Applications
GANs and ApplicationsHoang Nguyen
 
Scrum - An introduction
Scrum - An introductionScrum - An introduction
Scrum - An introductionHoang Nguyen
 
Introduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentIntroduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentHoang Nguyen
 
Conistency of random forests
Conistency of random forestsConistency of random forests
Conistency of random forestsHoang Nguyen
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Information, Data and Decision Making
Information, Data and Decision MakingInformation, Data and Decision Making
Information, Data and Decision MakingHoang Nguyen
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systemsHoang Nguyen
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor SystemsHoang Nguyen
 
Introduction to AOS course
Introduction to AOS courseIntroduction to AOS course
Introduction to AOS courseHoang Nguyen
 
Background Knowledge
Background KnowledgeBackground Knowledge
Background KnowledgeHoang Nguyen
 
Introduction to Information Security Course
Introduction to Information Security CourseIntroduction to Information Security Course
Introduction to Information Security CourseHoang Nguyen
 
Introduction to CNS Course
Introduction to CNS CourseIntroduction to CNS Course
Introduction to CNS CourseHoang Nguyen
 
Testing in the lifecycle
Testing in the lifecycleTesting in the lifecycle
Testing in the lifecycleHoang Nguyen
 

Mais de Hoang Nguyen (20)

GANs and Applications
GANs and ApplicationsGANs and Applications
GANs and Applications
 
Scrum - An introduction
Scrum - An introductionScrum - An introduction
Scrum - An introduction
 
ORM in Django
ORM in DjangoORM in Django
ORM in Django
 
Introduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentIntroduction to Cross-platform App Development
Introduction to Cross-platform App Development
 
Conistency of random forests
Conistency of random forestsConistency of random forests
Conistency of random forests
 
Key Exchange
Key ExchangeKey Exchange
Key Exchange
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
 
Classical ciphers
Classical ciphersClassical ciphers
Classical ciphers
 
Information, Data and Decision Making
Information, Data and Decision MakingInformation, Data and Decision Making
Information, Data and Decision Making
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systems
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
 
Introduction to AOS course
Introduction to AOS courseIntroduction to AOS course
Introduction to AOS course
 
Background Knowledge
Background KnowledgeBackground Knowledge
Background Knowledge
 
Introduction to Information Security Course
Introduction to Information Security CourseIntroduction to Information Security Course
Introduction to Information Security Course
 
Introduction to CNS Course
Introduction to CNS CourseIntroduction to CNS Course
Introduction to CNS Course
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 
Nosql intro
Nosql introNosql intro
Nosql intro
 
Static Testing
Static TestingStatic Testing
Static Testing
 
Testing in the lifecycle
Testing in the lifecycleTesting in the lifecycle
Testing in the lifecycle
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Trust - Digital Signature

  • 1. Hoang Nguyen Van Mail: nvhoang@vnua.edu.vn Department of Computer Science – FITA – VNUA Information Security Course --------------------------------------------- Fall 2015 Dept. of Computer Science – FITA – VNUA Trust
  • 2. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 3. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 4. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 5. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 6. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 7. Alice attacks Bob or vice versa (in terms of information)
  • 8. Information Security ----------- Fall 2015 Hoang Nguyen Van 7 Trust Make belief How Alice cannot attack Bob and Bob cannot attack Alice
  • 9. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 10. Information Security ----------- Fall 2015 Hoang Nguyen Van “Unforgeability” = Integrity (or authenticity) Can MACs help? (Without access to the secret key, no way to verify a tag) Only sender can generate a tag (using private information) Anyone can verify a tag (public verifiability) (MACs are symmetric)
  • 11. Information Security ----------- Fall 2015 Hoang Nguyen Van “Unforgeability” = Integrity (or authenticity) Can MACs help? (Without access to the secret key, no way to verify a tag) Only sender can generate a tag (using private information) Anyone can verify a tag (public verifiability) (MACs are symmetric)
  • 12. Information Security ----------- Fall 2015 Hoang Nguyen Van asymmetric Security (informal) Even after observing signatures on multiple messages, attacker should be unable to forge a valid signature on a new message.
  • 13. Information Security ----------- Fall 2015 Hoang Nguyen Van Definition G (key-generation algorithm), output a pair of keys (pu,pr) ∈ K1K2 S (signing algorithm): K2xM → T V (verification algorithm): K1xTxM → {0, 1} ∀ (pu, pr) ∈ K1K2, ∀m ∈ M: V(pu, S(pr,m), m) = 1.
  • 14. Information Security ----------- Fall 2015 Hoang Nguyen Van What it means for a DSS to be secure
  • 15. Information Security ----------- Fall 2015 Hoang Nguyen Van What it means for a DSS to be secure Threat model Adaptive chosen-message attack Assume the attacker can induce the sender to sign messages of the attacker’s choice Attacker gets the public key (pu) Security requirements Existential “unforgeability” Attacker should be unable to forge valid signature on any massage not signed by the sender
  • 16. Information Security ----------- Fall 2015 Hoang Nguyen Van Chal. Adv. AkK (m,t) m1  M t1  S(pr,m1) b=1 if V(pu,m,t) = 1 and (m,t)  { (m1,t1) , … , (mq,tq) } b=0 otherwise b m2 , …, mq t2 , …, tq Secure DSS Def: Π =(G,S,V) is a secure DSS if for all “efficient” A: AdvDSS[A, Π] = Pr[Chal. outputs 1] is “negligible”.
  • 17. Information Security ----------- Fall 2015 Hoang Nguyen Van How to build a secure digital signature scheme
  • 18. Information Security ----------- Fall 2015 Hoang Nguyen Van A simple approach is called plain RSA signature scheme. Π = (G, S, V) G = GRSA which outputs pu = <N,e> and pr = <N,d> S(pr, m) = ERSA(pr, m) = md mod N V(pu, t, m) = 1 if m = DRSA(pu, t) = te mod N and = 0 otherwise Plain RSA signature scheme is secure, isn’t it
  • 19. Information Security ----------- Fall 2015 Hoang Nguyen Van RSA assumption: Given pu=<N,e>, hard to compute the eth root of a uniform m ∈ ℤ 𝑁 ∗ . ⟹ easy to compute eth root of some specific message. The eth root of m modulo N is [md mod N] (md)e = mde = m[ed mod 𝜙(N)] = m mod N Example easy to compute the eth root of m = 1.
  • 20. Information Security ----------- Fall 2015 Hoang Nguyen Van A no-message attack Only use the public key pu=<N,e> Choose a uniform t ∈ ℤ 𝑁 ∗ Compute m = DRSA(pu, t) = te mod N Output (m, t) ⟹ not secure. The adv. has “no control” over the message m for which it forges a valid signature.
  • 21. Information Security ----------- Fall 2015 Hoang Nguyen Van Forge a signature on arbitrary message te = (t1.t2)e = (m1 d.m2 d)e = m1 ed.m2 ed = m1.m2= m mod N Given m ∈ ℤ 𝑁 ∗ Choose m1, m2 ∈ ℤ 𝑁 ∗ distinct from m s.t. m=m1.m2 mod N Obtain signatures t1, t2 on m1, m2 Compute t = t1.t2 mod N Output (m, t) ⟹ not secure.
  • 22. Information Security ----------- Fall 2015 Hoang Nguyen Van Transformation function h: M ⟶ ℤ 𝑁 ∗ Π = (G, S, V) G = GRSA which outputs pu = <N,e> and pr = <N,d> S(pr, m) = ERSA(pr, h(m)) = [h(m)]d mod N V(pu, t, m) = 1 if h(m) = DRSA(pu, t) = te mod N and = 0 otherwise What cryptographic property h should have
  • 23. Information Security ----------- Fall 2015 Hoang Nguyen Van What cryptographic property h should have Not easy to compute the eth root of H(1), ... Given t, how to find m such that H(m) = te mod N ⟹ computing inverses of h should be hard Hard to find three message m, m1, m2 such that h(m) = h(m1).h(m2) mod N Hard to find collisions in h
  • 24. Information Security ----------- Fall 2015 Hoang Nguyen Van Theorem ℤ 𝑁 ∗ How to build h function
  • 25. Information Security ----------- Fall 2015 Hoang Nguyen Van In practice, h is instantiated with a (modified) cryptographic hash function. How to build h function In theory, h: M ⟶ ℤ 𝑁 ∗ It is crictical that the range of h to be (close to) all of ℤ 𝑁 ∗ Must ensure that the range of h is large enough
  • 26. Information Security ----------- Fall 2015 Hoang Nguyen Van Given a d.s.s Π = (G,S,V) for short messages of length n and a hash function h: {0,1}* → {0,1}n Goal: construct a d.s.s Π1 = (G1,S1,V1) for arbitrary- length messages Hash-Sign Paradigm G1 = G S1(pr,m) = S(pr, h(m)) V1(pu,t,m) = V(pu, t, h(m))
  • 27. Information Security ----------- Fall 2015 Hoang Nguyen Van Theorem Π Π Proof Assume Π attacker outputs forgery (m, t), m ≠ mi ∀ i ∈ {1, …, q} If h(m) = hi for some i collision in h∎ Otherwise, h(m) ≠ hi Π ∎
  • 28. Information Security ----------- Fall 2015 Hoang Nguyen Van Based on identification schemes Fiat-Shamir Transform Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm ( ECDSA) – NIST-1991 Based on hash functions Lamport’s Signature Scheme (on-time) Chain-based Signatures (many-time) Tree-based Signature see more in textbook
  • 29. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 30. Information Security ----------- Fall 2015 Hoang Nguyen Van Problem: Signer denies issuing a signature Private key is not secure Use wrong public key Untill now, we only dicused how to use public key But, how are public key securely distributed?
  • 31. Information Security ----------- Fall 2015 Hoang Nguyen Van Recall: Key Distribution Problem
  • 32. Information Security ----------- Fall 2015 Hoang Nguyen Van How to only use public-key cryptosystems to securely distribute public keys?
  • 33. Information Security ----------- Fall 2015 Hoang Nguyen Van No, we didn’t. And the key notion here is a digital certificate.
  • 34. Information Security ----------- Fall 2015 Hoang Nguyen Van Is a signature binding an entity to some public key Example Alice has generated a pair of keys (puA, prA) Bob has also generated a pair of keys (puB, prB) 𝑐𝑒𝑟𝑡 𝐴→𝐵 ≝ S(prA, “Bob’s public key is puB”) 𝑐𝑒𝑟𝑡 𝐴→𝐵 is called a certificate for Bob’s public key issued by Alice
  • 35. Information Security ----------- Fall 2015 Hoang Nguyen Van Assumptions A certificate authority (CA) who is completely trusted by Alice and Bob. Bob obtains puCA Alice asks the CA to sign the binding <Alice, puA> 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 ≝ S(prCA, <Alice, puA>) Bob obtains <Alice, puA> and 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 If V(puCA, 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴, <Alice, puA>)=1 then Bob is assured that puA is the Alice’s public key
  • 36. Information Security ----------- Fall 2015 Hoang Nguyen Van Assumptions A certificate authority (CA) who is completely trusted by Alice and Bob. Bob obtains puCA Alice asks the CA to sign the binding <Alice, puA> 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 ≝ S(prCA, <Alice, puA>) Bob obtains <Alice, puA> and 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴 If V(puCA, 𝑐𝑒𝑟𝑡 𝐶𝐴→𝐴, <Alice, puA>)=1 then Bob is assured that puA is the Alice’s public key If Bob trusts CA, he can accept puA as Alice’s legitimate public key.
  • 37. How does Bob get puCA in the first place?
  • 38. Information Security ----------- Fall 2015 Hoang Nguyen Van A key idea Once a single public key, belonging to a trusted party, is distributed in a secure fashion, that key can be used to “bootstrap” the secure distribution of arbitrary many other public keys. Thus, at least in principle, the problem of secure key distribution need only be solved once. The solution is feasible!
  • 39. Information Security ----------- Fall 2015 Hoang Nguyen Van How does Bob get puCA in the first place? Distributed as part of operating system, or web browser
  • 40. Information Security ----------- Fall 2015 Hoang Nguyen Van “Web of trust” Model Alice can obtain public keys from her friends in person Alice can issues certificates for public keys of her friends Alice can obtain certificates on her public keys from her friends. If Alice knows Bob’s public key and Bob issued certificate for Charlie, then Charlie can send this certificate to Alice. And Alice can verify this certificate.
  • 41. Information Security ----------- Fall 2015 Hoang Nguyen Van Delegation and certificate chains
  • 42. Information Security ----------- Fall 2015 Hoang Nguyen Van PKI in practice Is not as simple as in theory Expiration Revocation Other issues see more in textbook
  • 43. Information Security ----------- Fall 2015 Hoang Nguyen Van 42 Who I can trust?
  • 44. Information Security ----------- Fall 2015 Hoang Nguyen Van 43 Challenge: can trust without the trusted party?
  • 45. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 46. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 47. Information Security ----------- Fall 2015 Hoang Nguyen Van
  • 48. Information Security ----------- Fall 2015 Hoang Nguyen Van