SlideShare a Scribd company logo
1 of 18
Dhaka bangladesh
What is a digital signature
โ€ข A digital signature allows the holder of the secret key (the signing key)
to sign a document
โ€ข Everyone who knows the verification key can verify that the signature
is valid (correctness)
โ€ข No one can forge a signature even given the verification key even
though he is given a signature
Structure of digital signature
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
Structure of digital signature scheme (DSS)
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข Correctness
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1
โ€ข Unforgeability
โ€ข To be continued
DSS VS MAC
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜)
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘”
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜
โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก
โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
Mac forgery game
M โ† {}
๐‘šโ€ฒ
๐‘กโ€ฒ
k โˆˆ๐‘… 0,1 ๐‘ 
(๐‘š, ๐‘ก)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1
๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
Signature forgery game
M โ† {}
๐‘šโ€ฒ
๐‘ ๐‘–๐‘”โ€ฒ
๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘ 
)
(๐‘š, ๐‘ ๐‘–๐‘”)
Wins if
โ€ข ๐‘š โˆ‰ ๐‘€
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1
๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ)
M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times
as the adversary wants
๐‘ฃ๐‘˜
Definition of signature scheme
โ€ข Correctness:
โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1
โ€ข Unforgeability
โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡,
โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
Relation between macs and signatures
โ€ข Every signature scheme is a message authentication code.
โ€ข A mac scheme is not necessarily a signature.
โ€ข Without the key, it may be impossible to verify a mac.
Signatures are expensive
โ€ข They require public-key operations for each signature you wish to do.
โ€ข Hash functions are relatively cheap
Hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a
collision resistant hash function, then the following
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜
โ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
Security of hash and sign
โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the
following
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” ๐บ๐‘’๐‘›โ€ฒ
1๐‘ 
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜
โ€ฒ
(๐ป ๐‘š )
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ
๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
โ€ข Essentially the same proof as hash and mac
โ€ข Breaking security of this scheme means
โ€ข Finding a collision
โ€ข Finding a signature on an unsigned message
Interesting property of plaintext RSA
โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š
โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’๐‘‘
RSA signature scheme
โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
Insecure RSA signature scheme
โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  }
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’
= ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
Secure RSA signature scheme
โ€ข Assumptions
โ€ข Random oracle ๐ป (Hash function modeled as a random oracle
โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ
, ๐‘๐‘˜โ€ฒ
โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘ 
}
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š)
โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘›
โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’
๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›)
(๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
Schnorr signature scheme
โ€ข Based on
โ€ข Group G
โ€ข Generator ๐‘” for G
โ€ข Random oracle ๐ป
โ€ข Discrete logarithm
Schnorr signature scheme
โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป
โ€ข ๐บ๐‘’๐‘› 1๐‘ 
โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ
โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜
โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”)
โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘”
โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž
โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž
โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š
โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ|
โ€ข ๐‘ข โ† ๐‘”๐‘
โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š)
โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž)
โ€ข Output (๐‘Ž, ๐‘ )

More Related Content

Similar to digital Information.pptx

Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–MITSUNARI Shigeo
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11MITSUNARI Shigeo
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionPeter Waher
ย 
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 -  WT* is JWT? by Maciej Trederapidays LIVE Australia 2020 -  WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Trederapidays
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationDeep Learning Italia
ย 
Hash functions
Hash functionsHash functions
Hash functionssameezahur
ย 

Similar to digital Information.pptx (12)

Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
Lifted-ElGamalๆš—ๅทใ‚’็”จใ„ใŸไปปๆ„้–ขๆ•ฐๆผ”็ฎ—ใฎไบŒ่€…้–“็ง˜ๅฏ†่จˆ็ฎ—ใƒ—ใƒญใƒˆใ‚ณใƒซใฎmaliciousใƒขใƒ‡ใƒซใซใŠใ‘ใ‚‹ๅŠน็Ž‡ๅŒ–
ย 
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ๆš—่ชๆœฌ่ชญๆ›ธไผš11
ย 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
ย 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
ย 
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 -  WT* is JWT? by Maciej Trederapidays LIVE Australia 2020 -  WT* is JWT? by Maciej Treder
apidays LIVE Australia 2020 - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Trederapidays LIVE Paris - WT* is JWT? by Maciej Treder
apidays LIVE Paris - WT* is JWT? by Maciej Treder
ย 
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Trederapidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
apidays LIVE Hong Kong - WT* is JWT? by Maciej Treder
ย 
apidays LIVE New York - WT* is JWT? by Maciej Treder
apidays LIVE New York -  WT* is JWT? by Maciej Trederapidays LIVE New York -  WT* is JWT? by Maciej Treder
apidays LIVE New York - WT* is JWT? by Maciej Treder
ย 
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Trederapidays LIVE LONDON - WT* is JWT? by Maciej Treder
apidays LIVE LONDON - WT* is JWT? by Maciej Treder
ย 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
ย 
Face verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creationFace verification techniques: how to speed up dataset creation
Face verification techniques: how to speed up dataset creation
ย 
Hash functions
Hash functionsHash functions
Hash functions
ย 

More from AliAshraf68199

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.pptAliAshraf68199
ย 
digital Information BD.pptx
digital Information BD.pptxdigital Information BD.pptx
digital Information BD.pptxAliAshraf68199
ย 
digital10.pptx
digital10.pptxdigital10.pptx
digital10.pptxAliAshraf68199
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxAliAshraf68199
ย 

More from AliAshraf68199 (6)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
ย 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
ย 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.ppt
ย 
digital Information BD.pptx
digital Information BD.pptxdigital Information BD.pptx
digital Information BD.pptx
ย 
digital10.pptx
digital10.pptxdigital10.pptx
digital10.pptx
ย 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
ย 

Recently uploaded

BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
ย 
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...amitlee9823
ย 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
ย 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
ย 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
ย 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
ย 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
ย 
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Callshivangimorya083
ย 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
ย 
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Delhi Call girls
ย 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
ย 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
ย 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
ย 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
ย 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
ย 
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
ย 

Recently uploaded (20)

BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
ย 
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call ๐Ÿ‘— 7737669865 ๐Ÿ‘— Top Class Call Girl Ser...
ย 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
ย 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
ย 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
ย 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
ย 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
ย 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
ย 
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 โ˜Žโœ”๐Ÿ‘Œโœ” Whatsapp Hard And Sexy Vip Call
ย 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
ย 
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9205541914 ๐Ÿ”( Delhi) Escorts S...
ย 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
ย 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
ย 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
ย 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
ย 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
ย 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
ย 
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )๐Ÿ” 9953056974๐Ÿ”(=)/CALL GIRLS SERVICE
ย 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
ย 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
ย 

digital Information.pptx

  • 2. What is a digital signature โ€ข A digital signature allows the holder of the secret key (the signing key) to sign a document โ€ข Everyone who knows the verification key can verify that the signature is valid (correctness) โ€ข No one can forge a signature even given the verification key even though he is given a signature
  • 3. Structure of digital signature โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1}
  • 4. Structure of digital signature scheme (DSS) โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข Correctness โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘š) = 1 โ€ข Unforgeability โ€ข To be continued
  • 5. DSS VS MAC โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ (๐‘ ๐‘˜, ๐‘ฃ๐‘˜) โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ†’ ๐‘ ๐‘–๐‘” โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ†’ {0,1} โ€ข ๐บ๐‘’๐‘› 1๐‘› โ†’ ๐‘˜ โ€ข ๐‘š๐‘Ž๐‘๐‘˜ ๐‘š โ†’ ๐‘ก โ€ข v๐‘’๐‘Ÿ๐‘˜ ๐‘š, ๐‘ก โ†’ {0,1}
  • 6. Mac forgery game M โ† {} ๐‘šโ€ฒ ๐‘กโ€ฒ k โˆˆ๐‘… 0,1 ๐‘  (๐‘š, ๐‘ก) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘ฃ๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ ๐‘š, ๐‘ก = 1 ๐‘กโ€ฒ โ† ๐‘š๐‘Ž๐‘๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants
  • 7. Signature forgery game M โ† {} ๐‘šโ€ฒ ๐‘ ๐‘–๐‘”โ€ฒ ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘›(1๐‘  ) (๐‘š, ๐‘ ๐‘–๐‘”) Wins if โ€ข ๐‘š โˆ‰ ๐‘€ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” = 1 ๐‘ ๐‘–๐‘”โ€ฒ โ† ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜(๐‘šโ€ฒ) M โ† ๐‘€ โˆช {๐‘šโ€ฒ} Repeat as many times as the adversary wants ๐‘ฃ๐‘˜
  • 8. Definition of signature scheme โ€ข Correctness: โ€ข Pr ๐‘‰๐‘’๐‘Ÿ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = 1 ๐‘ ๐‘˜, ๐‘ฃ๐‘˜ โ† ๐บ๐‘’๐‘› 1๐‘  = 1 โ€ข Unforgeability โ€ข For all PPT adversary ๐ด, there exists negligible function ๐œ‡, โ€ข Pr ๐ด ๐‘ค๐‘–๐‘›๐‘  ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘Ž๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘“๐‘œ๐‘Ÿ๐‘”๐‘’๐‘Ÿ๐‘ฆ ๐‘”๐‘Ž๐‘š๐‘’ โ‰ค ๐œ‡(๐‘›)
  • 9. Relation between macs and signatures โ€ข Every signature scheme is a message authentication code. โ€ข A mac scheme is not necessarily a signature. โ€ข Without the key, it may be impossible to verify a mac.
  • 10. Signatures are expensive โ€ข They require public-key operations for each signature you wish to do. โ€ข Hash functions are relatively cheap
  • 11. Hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ โ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1
  • 12. Security of hash and sign โ€ข Let (๐บ๐‘’๐‘›โ€ฒ, ๐‘†๐‘–๐‘”๐‘›โ€ฒ, ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ) be a signature scheme and let ๐ป be a collision resistant hash function, then the following โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” ๐บ๐‘’๐‘›โ€ฒ 1๐‘  โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ โ€ฒ (๐ป ๐‘š ) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆโ€ฒ ๐ป ๐‘š , ๐‘ ๐‘–๐‘” = 1 โ€ข Essentially the same proof as hash and mac โ€ข Breaking security of this scheme means โ€ข Finding a collision โ€ข Finding a signature on an unsigned message
  • 13. Interesting property of plaintext RSA โ€ข ๐‘ ๐‘˜, ๐‘๐‘˜ โ† ๐พ๐‘’๐‘ฆ๐บ๐‘’๐‘› 1๐‘  โ‡’ ๐ธ๐‘›๐‘๐‘๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š โ€ข Due to the fact that ๐‘š๐‘’ ๐‘‘ = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’๐‘‘
  • 14. RSA signature scheme โ€ข Let (๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘›, ๐ธ๐‘›๐‘, ๐ท๐‘’๐‘) denote the RSA encryption scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” {๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ, ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘ ๐‘–๐‘” โ‰” ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐‘ ๐‘–๐‘” = ๐‘š
  • 15. Insecure RSA signature scheme โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ, ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐‘š = ๐‘š๐‘‘ ๐‘’ = ๐‘š๐‘’โ‹…๐‘‘ = ๐‘š
  • 16. Secure RSA signature scheme โ€ข Assumptions โ€ข Random oracle ๐ป (Hash function modeled as a random oracle โ€ข ๐‘› = ๐‘๐‘ž where ๐‘, ๐‘ž are prime โ€ข ๐บ๐‘’๐‘› 1๐‘  โ‰” { ๐‘ฃ๐‘˜ โ† ๐‘๐‘˜, ๐‘ ๐‘˜ โ† ๐‘ ๐‘˜โ€ฒ โˆฃ ๐‘ ๐‘˜โ€ฒ , ๐‘๐‘˜โ€ฒ โ† ๐พ๐‘’๐‘ฆ๐‘”๐‘’๐‘› 1๐‘  } โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜ ๐‘š, ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ‰” ๐ป ๐‘š = ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) โ€ข ๐ธ๐‘›๐‘๐‘ฃ๐‘˜ ๐ท๐‘’๐‘๐‘ ๐‘˜ ๐ป(๐‘š) = (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› โ€ข (๐ป(๐‘š))๐‘‘ ๐‘’ ๐‘š๐‘œ๐‘‘ ๐‘› = ๐ป(๐‘š)๐‘’โ‹…๐‘‘ ๐‘š๐‘œ๐‘‘ ๐œ™(๐‘›) (๐‘š๐‘œ๐‘‘ ๐‘›) = ๐ป(๐‘š)
  • 17. Schnorr signature scheme โ€ข Based on โ€ข Group G โ€ข Generator ๐‘” for G โ€ข Random oracle ๐ป โ€ข Discrete logarithm
  • 18. Schnorr signature scheme โ€ข Requirement: Group ๐บ, ๐บ = ๐‘ž, generator ๐‘”, random oracle ๐ป โ€ข ๐บ๐‘’๐‘› 1๐‘  โ€ข ๐‘ ๐‘˜ โˆˆ๐‘… ๐บ โ€ข ๐‘ฃ๐‘˜ โ† ๐‘”๐‘ ๐‘˜ โ€ข ๐‘‰๐‘’๐‘Ÿ๐‘–๐‘“๐‘ฆ๐‘ฃ๐‘˜(๐‘š, ๐‘ ๐‘–๐‘”) โ€ข ๐‘Ž, ๐‘  โ† ๐‘ ๐‘–๐‘” โ€ข u โ† ๐‘”๐‘  โ‹… ๐‘ฃ๐‘˜โˆ’๐‘Ž โ€ข Output ๐ป ๐‘ข, ๐‘š = ๐‘Ž โ€ข ๐‘†๐‘–๐‘”๐‘›๐‘ ๐‘˜ ๐‘š โ€ข ๐‘ โˆˆ๐‘… ๐‘|๐บ| โ€ข ๐‘ข โ† ๐‘”๐‘ โ€ข ๐‘Ž โ† ๐ป(๐‘ข, ๐‘š) โ€ข ๐‘  โ† ๐‘Ž โ‹… ๐‘ ๐‘˜ + ๐‘ (๐‘š๐‘œ๐‘‘ ๐‘ž) โ€ข Output (๐‘Ž, ๐‘ )