SlideShare a Scribd company logo
1 of 19
Download to read offline
A SECURE DIGITAL SIGNATURE
APPROACH FOR SMS SECURITY
By: Nileshwari Desai
Roll Num: A 216
CONTENTS
• Introduction
• Technical details
• Law
• SMS
• SMS architecture
• SMS vulnerability & security
• Approach- ECDSA algorithm
• Alternate approach
• Security analysis
• Conclusion
• References
INTRODUCTION
So, what is a digital signature?
• A Digital Signature is the electronic or digital
equivalent of a physical signature. Just as a
physical signature on a paper document
establishes the origin of that document, a digital
signature affixed to a digital document
(computer file) establishes the origin of that
digital document.
TECHNICAL DETAILS (SIMPLIFIED
DESCRIPTION)
• A Digital Signing Certificate contains what is
known as a „key-pair‟ comprising a private key &
a corresponding public key.
• The process of signing a document involves
finding the „hash value‟ of the document and
then using the hash value and the private key to
generate the digital signature which is affixed to
the document along with the public key of the
signer.
LAW
• Digital Signatures are considered equivalent to physical
signatures by law in most countries around the world,
including US, European countries and India.
• In India, the Information Technology Act 2000 provides
the legal sanctity for using Digital Signatures.
• The entire act can be found on the internet. However
section 4 and section 5 should be drawn some attention
to.
Section 4. Legal recognition of
electronic records.
• Where any law provides that information or any
other matter shall be in writing or in the
typewritten or printed form, then,
notwithstanding anything contained in such law,
such requirement shall be deemed to have been
satisfied if such information or matter is—
▫ rendered or made available in an electronic form;
and
▫ accessible so as to be usable for a subsequent
reference.
5. Legal recognition of digital
signatures.
• Where any law provides that information or any
other matter shall be authenticated by affixing
the signature or any document shall be signed or
bear the signature of any person then,
notwithstanding anything contained in such law,
such requirement shall be deemed to have been
satisfied, if such information or matter is
authenticated by means of digital signature
affixed in such manner as may be prescribed by
the Central Government.
SMS
• SMS messages are currently one of the most
widespread forms of communication. We have
seen many unusual or strange applications, such
as devices which allow the switching on and off of
house heating systems using an SMS.
• Alternatively, through SMS, whenever the
temperature of a refrigerator exceeds a certain
threshold, it is possible to automatically
communicate the problem.
• Indeed, through SMS, fridges can even signal
when they are running out of beer.
SMS architecture
SMS SECURITY ISSUES AND
VULNERABILITIES
Two important aspects for any entity using consumer technologies such as SMS
for business purposes:
• SMS is not a secure environment.
• Security breaches often occur more easily by concentrating on
people rather than technology.
SMS is vulnerable to –
1. Snooping: - On device, at the store and forward network elements .
2. SMS Interception:- Over the air, in wired network.
3. Spoofing: - Using commercial tools, own SMS gateway.
4. Modification: - Using conventional hacking techniques.
5. Attacks on GSM, the SMS Carrier Technology: - Often the weakest
link in security is the mobile phone itself. Even leaving the mobile phone
unattended inadvertently could expose your private and confidential
messages to snooping.
SMS SECURITY
• Secrecy
• Integrity
• Availability
• Authenticity
APPROACH FOR SMS SECURITY
• To protect the SMS contents, we usually do the encryption.
• It may be symmetric or asymmetric encryption. But our focus
here is on the non-repudiation.
• If a SMS has sent by user „A‟ to user „B‟, „A‟ must not deny
that he has sent SMS. This feature can be achieved by
imposing digital signature.
• The popular digital signature algorithms are DSA and elliptic
curve based ECDSA.
• The bit size of the public key believed to be needed for ECDSA
is about twice the size of the security level, in bits. By
comparison, at a security level of 80 bits, meaning an attacker
requires the equivalent of about 280 signature generations to
find the private key.
ECDSA ALGORITHM
• User A selects an integer k randomly, 0 < k < n,
calculate k*G = (x, y), r = x mod n;
• Take (r, s) as the digital signature of message m by
A.
• The verification of digital signature:
1. Calculate e1 =h(m1), u= s -1 * e1 mod n,
v= s -1 * r mod n.
2. Calculate
X= u*G + v*P = s -1 ( e1 * G + r * d * G) =
s -1 (e + r * d) * G = k * G = (x1 , y1 )
3. If X = 0, this signature is refused; else
calculates r1 , x1 mod n.
POSSIBLE ATTACK
• The per-message secrets k used to sign two or more messages
should be generated independently of each other.
• In particular, a different per-message secret k should be generated
for each different message signed; otherwise, the private key d can
be recovered.
• If a secure random or pseudorandom number generator is used,
then the chance of generating a repeated k value is negligible.
5. SECURITY ANALYSIS
• In the typical digital signature schemes such as
ECDSA, a public key only corresponds to one
secret key.
• Given the secret key d, let the public key P be
derived according to the equation P=dB, and let
the signature T be derived using a random
number ‘k’ following the equation T = k*B.
• If an attacker attempts to derive the secret-key
from the public key, he has to encounter the
difficulty of solving the ECDLP.
VULNERABILITY WITH SAT
• It‟s necessary to check the vulnerability of the
existing elliptic curve based digital signature
algorithms.
• These algorithms are based on the hardness of
elliptic discrete logarithm problem which is still a
NP-Complete problem.
• For this purpose we prefer to do it using Boolean
Satisfiability Problem (SAT), as we have polynomial
time solution for 2-SAT and 3-SAT.
CONCLUSION & FUTURE WORK
• The elliptic curve discrete logarithm problem is significantly
more difficult than the integer factorization problem. For the
most part, the well-known RSA system must use 1024 bit
keys, only then can it attain computationally reasonable
security where as the ECC needs only 160 bit keys. So, at the
same level of security, the speed of ECC is several times faster
than RSA system; it can also saves on key storage space.
• Elliptic curve discrete logarithm problem based systems are
considered as secure systems but in quantum computer‟s
environment these systems may not be secured.
• In future, it‟s necessary to check the vulnerability of the
system (attempt to break) and develop a secure
environment.
REFERENCES
• [1] Mary Agoyi, Devrim Seral, “SMS Security: An Asymmetric
Encryption Approach”, Sixth International Conference on Wireless
and Mobile Communications, 2010@IEEE, pp. 448-452.
• [2] Neetesh Saxena, Narendra S. Chaudhari, “A Secure Digital
Signature Approach for SMS Security”, Department of Computer Sc.
& Engineering Indian Institute of Technology, Indore, India, A
Special Issue from IJCA - www.ijcaonline.org
• [3] Digital Signatures A cryptovision whitepaper Version 1.0
cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen
digital signature for SMS security

More Related Content

What's hot

Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Ao318992
Ao318992Ao318992
Ao318992
IJMER
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 

What's hot (20)

Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
Cryptography Cryptography
Cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Ao318992
Ao318992Ao318992
Ao318992
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Viewers also liked

Technology & education 2003 ed.
Technology & education 2003 ed.Technology & education 2003 ed.
Technology & education 2003 ed.
keierlebta
 
Restaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La VanguardiaRestaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La Vanguardia
7Portes
 
מצגת גאורגיה
מצגת גאורגיהמצגת גאורגיה
מצגת גאורגיה
Michele Niazov
 
Steven Voz - Marketing Excutive
Steven Voz - Marketing ExcutiveSteven Voz - Marketing Excutive
Steven Voz - Marketing Excutive
Steven Thanh
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
georgb2789
 
Gerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis TapiaGerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis Tapia
Jose Luis Tapia
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
Giuseppe Calò
 
Grails Goto Plugins
Grails Goto PluginsGrails Goto Plugins
Grails Goto Plugins
ericsword
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
arnesjogren
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
Shatha Mohammed
 

Viewers also liked (20)

Working@distance
Working@distanceWorking@distance
Working@distance
 
Technology & education 2003 ed.
Technology & education 2003 ed.Technology & education 2003 ed.
Technology & education 2003 ed.
 
Restaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La VanguardiaRestaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La Vanguardia
 
מצגת גאורגיה
מצגת גאורגיהמצגת גאורגיה
מצגת גאורגיה
 
Save energy for a better future
Save energy   for a better futureSave energy   for a better future
Save energy for a better future
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glance
 
Employee empowerment
Employee empowermentEmployee empowerment
Employee empowerment
 
Digital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for businessDigital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for business
 
Steven Voz - Marketing Excutive
Steven Voz - Marketing ExcutiveSteven Voz - Marketing Excutive
Steven Voz - Marketing Excutive
 
Ustream_Pakutui
Ustream_PakutuiUstream_Pakutui
Ustream_Pakutui
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Gerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis TapiaGerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis Tapia
 
Sire
SireSire
Sire
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
 
Grails Goto Plugins
Grails Goto PluginsGrails Goto Plugins
Grails Goto Plugins
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
 
Innovations
InnovationsInnovations
Innovations
 
Medias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneveMedias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneve
 
Restaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La VanguardiaRestaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La Vanguardia
 

Similar to digital signature for SMS security

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
Rebecca Jones
 

Similar to digital signature for SMS security (20)

How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2
Sw2Sw2
Sw2
 
Security
SecuritySecurity
Security
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Ss
SsSs
Ss
 
Week12
Week12Week12
Week12
 
Network security
Network securityNetwork security
Network security
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 

More from Nilu Desai

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
Nilu Desai
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
Nilu Desai
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloud
Nilu Desai
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
Nilu Desai
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock prevention
Nilu Desai
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
Nilu Desai
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
Nilu Desai
 

More from Nilu Desai (7)

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloud
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock prevention
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

digital signature for SMS security

  • 1. A SECURE DIGITAL SIGNATURE APPROACH FOR SMS SECURITY By: Nileshwari Desai Roll Num: A 216
  • 2. CONTENTS • Introduction • Technical details • Law • SMS • SMS architecture • SMS vulnerability & security • Approach- ECDSA algorithm • Alternate approach • Security analysis • Conclusion • References
  • 3. INTRODUCTION So, what is a digital signature? • A Digital Signature is the electronic or digital equivalent of a physical signature. Just as a physical signature on a paper document establishes the origin of that document, a digital signature affixed to a digital document (computer file) establishes the origin of that digital document.
  • 4. TECHNICAL DETAILS (SIMPLIFIED DESCRIPTION) • A Digital Signing Certificate contains what is known as a „key-pair‟ comprising a private key & a corresponding public key. • The process of signing a document involves finding the „hash value‟ of the document and then using the hash value and the private key to generate the digital signature which is affixed to the document along with the public key of the signer.
  • 5. LAW • Digital Signatures are considered equivalent to physical signatures by law in most countries around the world, including US, European countries and India. • In India, the Information Technology Act 2000 provides the legal sanctity for using Digital Signatures. • The entire act can be found on the internet. However section 4 and section 5 should be drawn some attention to.
  • 6. Section 4. Legal recognition of electronic records. • Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is— ▫ rendered or made available in an electronic form; and ▫ accessible so as to be usable for a subsequent reference.
  • 7. 5. Legal recognition of digital signatures. • Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Central Government.
  • 8. SMS • SMS messages are currently one of the most widespread forms of communication. We have seen many unusual or strange applications, such as devices which allow the switching on and off of house heating systems using an SMS. • Alternatively, through SMS, whenever the temperature of a refrigerator exceeds a certain threshold, it is possible to automatically communicate the problem. • Indeed, through SMS, fridges can even signal when they are running out of beer.
  • 10. SMS SECURITY ISSUES AND VULNERABILITIES Two important aspects for any entity using consumer technologies such as SMS for business purposes: • SMS is not a secure environment. • Security breaches often occur more easily by concentrating on people rather than technology. SMS is vulnerable to – 1. Snooping: - On device, at the store and forward network elements . 2. SMS Interception:- Over the air, in wired network. 3. Spoofing: - Using commercial tools, own SMS gateway. 4. Modification: - Using conventional hacking techniques. 5. Attacks on GSM, the SMS Carrier Technology: - Often the weakest link in security is the mobile phone itself. Even leaving the mobile phone unattended inadvertently could expose your private and confidential messages to snooping.
  • 11. SMS SECURITY • Secrecy • Integrity • Availability • Authenticity
  • 12. APPROACH FOR SMS SECURITY • To protect the SMS contents, we usually do the encryption. • It may be symmetric or asymmetric encryption. But our focus here is on the non-repudiation. • If a SMS has sent by user „A‟ to user „B‟, „A‟ must not deny that he has sent SMS. This feature can be achieved by imposing digital signature. • The popular digital signature algorithms are DSA and elliptic curve based ECDSA. • The bit size of the public key believed to be needed for ECDSA is about twice the size of the security level, in bits. By comparison, at a security level of 80 bits, meaning an attacker requires the equivalent of about 280 signature generations to find the private key.
  • 13. ECDSA ALGORITHM • User A selects an integer k randomly, 0 < k < n, calculate k*G = (x, y), r = x mod n; • Take (r, s) as the digital signature of message m by A. • The verification of digital signature: 1. Calculate e1 =h(m1), u= s -1 * e1 mod n, v= s -1 * r mod n. 2. Calculate X= u*G + v*P = s -1 ( e1 * G + r * d * G) = s -1 (e + r * d) * G = k * G = (x1 , y1 ) 3. If X = 0, this signature is refused; else calculates r1 , x1 mod n.
  • 14. POSSIBLE ATTACK • The per-message secrets k used to sign two or more messages should be generated independently of each other. • In particular, a different per-message secret k should be generated for each different message signed; otherwise, the private key d can be recovered. • If a secure random or pseudorandom number generator is used, then the chance of generating a repeated k value is negligible.
  • 15. 5. SECURITY ANALYSIS • In the typical digital signature schemes such as ECDSA, a public key only corresponds to one secret key. • Given the secret key d, let the public key P be derived according to the equation P=dB, and let the signature T be derived using a random number ‘k’ following the equation T = k*B. • If an attacker attempts to derive the secret-key from the public key, he has to encounter the difficulty of solving the ECDLP.
  • 16. VULNERABILITY WITH SAT • It‟s necessary to check the vulnerability of the existing elliptic curve based digital signature algorithms. • These algorithms are based on the hardness of elliptic discrete logarithm problem which is still a NP-Complete problem. • For this purpose we prefer to do it using Boolean Satisfiability Problem (SAT), as we have polynomial time solution for 2-SAT and 3-SAT.
  • 17. CONCLUSION & FUTURE WORK • The elliptic curve discrete logarithm problem is significantly more difficult than the integer factorization problem. For the most part, the well-known RSA system must use 1024 bit keys, only then can it attain computationally reasonable security where as the ECC needs only 160 bit keys. So, at the same level of security, the speed of ECC is several times faster than RSA system; it can also saves on key storage space. • Elliptic curve discrete logarithm problem based systems are considered as secure systems but in quantum computer‟s environment these systems may not be secured. • In future, it‟s necessary to check the vulnerability of the system (attempt to break) and develop a secure environment.
  • 18. REFERENCES • [1] Mary Agoyi, Devrim Seral, “SMS Security: An Asymmetric Encryption Approach”, Sixth International Conference on Wireless and Mobile Communications, 2010@IEEE, pp. 448-452. • [2] Neetesh Saxena, Narendra S. Chaudhari, “A Secure Digital Signature Approach for SMS Security”, Department of Computer Sc. & Engineering Indian Institute of Technology, Indore, India, A Special Issue from IJCA - www.ijcaonline.org • [3] Digital Signatures A cryptovision whitepaper Version 1.0 cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen