SlideShare a Scribd company logo
1 of 19
Download to read offline
A SECURE DIGITAL SIGNATURE
APPROACH FOR SMS SECURITY
By: Nileshwari Desai
Roll Num: A 216
CONTENTS
• Introduction
• Technical details
• Law
• SMS
• SMS architecture
• SMS vulnerability & security
• Approach- ECDSA algorithm
• Alternate approach
• Security analysis
• Conclusion
• References
INTRODUCTION
So, what is a digital signature?
• A Digital Signature is the electronic or digital
equivalent of a physical signature. Just as a
physical signature on a paper document
establishes the origin of that document, a digital
signature affixed to a digital document
(computer file) establishes the origin of that
digital document.
TECHNICAL DETAILS (SIMPLIFIED
DESCRIPTION)
• A Digital Signing Certificate contains what is
known as a „key-pair‟ comprising a private key &
a corresponding public key.
• The process of signing a document involves
finding the „hash value‟ of the document and
then using the hash value and the private key to
generate the digital signature which is affixed to
the document along with the public key of the
signer.
LAW
• Digital Signatures are considered equivalent to physical
signatures by law in most countries around the world,
including US, European countries and India.
• In India, the Information Technology Act 2000 provides
the legal sanctity for using Digital Signatures.
• The entire act can be found on the internet. However
section 4 and section 5 should be drawn some attention
to.
Section 4. Legal recognition of
electronic records.
• Where any law provides that information or any
other matter shall be in writing or in the
typewritten or printed form, then,
notwithstanding anything contained in such law,
such requirement shall be deemed to have been
satisfied if such information or matter is—
▫ rendered or made available in an electronic form;
and
▫ accessible so as to be usable for a subsequent
reference.
5. Legal recognition of digital
signatures.
• Where any law provides that information or any
other matter shall be authenticated by affixing
the signature or any document shall be signed or
bear the signature of any person then,
notwithstanding anything contained in such law,
such requirement shall be deemed to have been
satisfied, if such information or matter is
authenticated by means of digital signature
affixed in such manner as may be prescribed by
the Central Government.
SMS
• SMS messages are currently one of the most
widespread forms of communication. We have
seen many unusual or strange applications, such
as devices which allow the switching on and off of
house heating systems using an SMS.
• Alternatively, through SMS, whenever the
temperature of a refrigerator exceeds a certain
threshold, it is possible to automatically
communicate the problem.
• Indeed, through SMS, fridges can even signal
when they are running out of beer.
SMS architecture
SMS SECURITY ISSUES AND
VULNERABILITIES
Two important aspects for any entity using consumer technologies such as SMS
for business purposes:
• SMS is not a secure environment.
• Security breaches often occur more easily by concentrating on
people rather than technology.
SMS is vulnerable to –
1. Snooping: - On device, at the store and forward network elements .
2. SMS Interception:- Over the air, in wired network.
3. Spoofing: - Using commercial tools, own SMS gateway.
4. Modification: - Using conventional hacking techniques.
5. Attacks on GSM, the SMS Carrier Technology: - Often the weakest
link in security is the mobile phone itself. Even leaving the mobile phone
unattended inadvertently could expose your private and confidential
messages to snooping.
SMS SECURITY
• Secrecy
• Integrity
• Availability
• Authenticity
APPROACH FOR SMS SECURITY
• To protect the SMS contents, we usually do the encryption.
• It may be symmetric or asymmetric encryption. But our focus
here is on the non-repudiation.
• If a SMS has sent by user „A‟ to user „B‟, „A‟ must not deny
that he has sent SMS. This feature can be achieved by
imposing digital signature.
• The popular digital signature algorithms are DSA and elliptic
curve based ECDSA.
• The bit size of the public key believed to be needed for ECDSA
is about twice the size of the security level, in bits. By
comparison, at a security level of 80 bits, meaning an attacker
requires the equivalent of about 280 signature generations to
find the private key.
ECDSA ALGORITHM
• User A selects an integer k randomly, 0 < k < n,
calculate k*G = (x, y), r = x mod n;
• Take (r, s) as the digital signature of message m by
A.
• The verification of digital signature:
1. Calculate e1 =h(m1), u= s -1 * e1 mod n,
v= s -1 * r mod n.
2. Calculate
X= u*G + v*P = s -1 ( e1 * G + r * d * G) =
s -1 (e + r * d) * G = k * G = (x1 , y1 )
3. If X = 0, this signature is refused; else
calculates r1 , x1 mod n.
POSSIBLE ATTACK
• The per-message secrets k used to sign two or more messages
should be generated independently of each other.
• In particular, a different per-message secret k should be generated
for each different message signed; otherwise, the private key d can
be recovered.
• If a secure random or pseudorandom number generator is used,
then the chance of generating a repeated k value is negligible.
5. SECURITY ANALYSIS
• In the typical digital signature schemes such as
ECDSA, a public key only corresponds to one
secret key.
• Given the secret key d, let the public key P be
derived according to the equation P=dB, and let
the signature T be derived using a random
number ‘k’ following the equation T = k*B.
• If an attacker attempts to derive the secret-key
from the public key, he has to encounter the
difficulty of solving the ECDLP.
VULNERABILITY WITH SAT
• It‟s necessary to check the vulnerability of the
existing elliptic curve based digital signature
algorithms.
• These algorithms are based on the hardness of
elliptic discrete logarithm problem which is still a
NP-Complete problem.
• For this purpose we prefer to do it using Boolean
Satisfiability Problem (SAT), as we have polynomial
time solution for 2-SAT and 3-SAT.
CONCLUSION & FUTURE WORK
• The elliptic curve discrete logarithm problem is significantly
more difficult than the integer factorization problem. For the
most part, the well-known RSA system must use 1024 bit
keys, only then can it attain computationally reasonable
security where as the ECC needs only 160 bit keys. So, at the
same level of security, the speed of ECC is several times faster
than RSA system; it can also saves on key storage space.
• Elliptic curve discrete logarithm problem based systems are
considered as secure systems but in quantum computer‟s
environment these systems may not be secured.
• In future, it‟s necessary to check the vulnerability of the
system (attempt to break) and develop a secure
environment.
REFERENCES
• [1] Mary Agoyi, Devrim Seral, “SMS Security: An Asymmetric
Encryption Approach”, Sixth International Conference on Wireless
and Mobile Communications, 2010@IEEE, pp. 448-452.
• [2] Neetesh Saxena, Narendra S. Chaudhari, “A Secure Digital
Signature Approach for SMS Security”, Department of Computer Sc.
& Engineering Indian Institute of Technology, Indore, India, A
Special Issue from IJCA - www.ijcaonline.org
• [3] Digital Signatures A cryptovision whitepaper Version 1.0
cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen
digital signature for SMS security

More Related Content

What's hot

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

What's hot (20)

Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
Cryptography Cryptography
Cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Ao318992
Ao318992Ao318992
Ao318992
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Viewers also liked

Working@distance
Working@distanceWorking@distance
Working@distanceSara Wyke
 
Technology & education 2003 ed.
Technology & education 2003 ed.Technology & education 2003 ed.
Technology & education 2003 ed.keierlebta
 
Restaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La VanguardiaRestaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La Vanguardia7Portes
 
מצגת גאורגיה
מצגת גאורגיהמצגת גאורגיה
מצגת גאורגיהMichele Niazov
 
Save energy for a better future
Save energy   for a better futureSave energy   for a better future
Save energy for a better futurejohngorai
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glanceplancess
 
Employee empowerment
Employee empowermentEmployee empowerment
Employee empowermentRanjeet Singh
 
Digital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for businessDigital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for businessBui Hang
 
Steven Voz - Marketing Excutive
Steven Voz - Marketing ExcutiveSteven Voz - Marketing Excutive
Steven Voz - Marketing ExcutiveSteven Thanh
 
Ustream_Pakutui
Ustream_PakutuiUstream_Pakutui
Ustream_PakutuiTomomi Ota
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]georgb2789
 
Gerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis TapiaGerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis TapiaJose Luis Tapia
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingGiuseppe Calò
 
Grails Goto Plugins
Grails Goto PluginsGrails Goto Plugins
Grails Goto Pluginsericsword
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011arnesjogren
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوينShatha Mohammed
 
Medias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneveMedias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneveSerena Baldelli
 
Restaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La VanguardiaRestaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La Vanguardia7Portes
 

Viewers also liked (20)

Working@distance
Working@distanceWorking@distance
Working@distance
 
Technology & education 2003 ed.
Technology & education 2003 ed.Technology & education 2003 ed.
Technology & education 2003 ed.
 
Restaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La VanguardiaRestaurant 7 Portes a La Vanguardia
Restaurant 7 Portes a La Vanguardia
 
מצגת גאורגיה
מצגת גאורגיהמצגת גאורגיה
מצגת גאורגיה
 
Save energy for a better future
Save energy   for a better futureSave energy   for a better future
Save energy for a better future
 
Plancess at a glance
Plancess at a glancePlancess at a glance
Plancess at a glance
 
Employee empowerment
Employee empowermentEmployee empowerment
Employee empowerment
 
Digital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for businessDigital trends in Vietnam 2013, Strategy for business
Digital trends in Vietnam 2013, Strategy for business
 
Steven Voz - Marketing Excutive
Steven Voz - Marketing ExcutiveSteven Voz - Marketing Excutive
Steven Voz - Marketing Excutive
 
Ustream_Pakutui
Ustream_PakutuiUstream_Pakutui
Ustream_Pakutui
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Gerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis TapiaGerencia basada en el mercado por Jose Luis Tapia
Gerencia basada en el mercado por Jose Luis Tapia
 
Sire
SireSire
Sire
 
Scrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestlingScrivere un report con i video per zona wrestling
Scrivere un report con i video per zona wrestling
 
Grails Goto Plugins
Grails Goto PluginsGrails Goto Plugins
Grails Goto Plugins
 
Culture shock presentation_2011
Culture shock presentation_2011Culture shock presentation_2011
Culture shock presentation_2011
 
مفاتيح التدوين
مفاتيح التدوينمفاتيح التدوين
مفاتيح التدوين
 
Innovations
InnovationsInnovations
Innovations
 
Medias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneveMedias sociaux hôpitaux universitaires geneve
Medias sociaux hôpitaux universitaires geneve
 
Restaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La VanguardiaRestaurante 7 Portes en La Vanguardia
Restaurante 7 Portes en La Vanguardia
 

Similar to digital signature for SMS security

Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxskknowledge
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 

Similar to digital signature for SMS security (20)

How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2
Sw2Sw2
Sw2
 
Security
SecuritySecurity
Security
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Ss
SsSs
Ss
 
Week12
Week12Week12
Week12
 
Network security
Network securityNetwork security
Network security
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 

More from Nilu Desai

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
Adversarial search
Adversarial searchAdversarial search
Adversarial searchNilu Desai
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloudNilu Desai
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock preventionNilu Desai
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 

More from Nilu Desai (7)

data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
collaborative study on the cloud
collaborative study on the cloudcollaborative study on the cloud
collaborative study on the cloud
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
deadlock prevention
deadlock preventiondeadlock prevention
deadlock prevention
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

digital signature for SMS security

  • 1. A SECURE DIGITAL SIGNATURE APPROACH FOR SMS SECURITY By: Nileshwari Desai Roll Num: A 216
  • 2. CONTENTS • Introduction • Technical details • Law • SMS • SMS architecture • SMS vulnerability & security • Approach- ECDSA algorithm • Alternate approach • Security analysis • Conclusion • References
  • 3. INTRODUCTION So, what is a digital signature? • A Digital Signature is the electronic or digital equivalent of a physical signature. Just as a physical signature on a paper document establishes the origin of that document, a digital signature affixed to a digital document (computer file) establishes the origin of that digital document.
  • 4. TECHNICAL DETAILS (SIMPLIFIED DESCRIPTION) • A Digital Signing Certificate contains what is known as a „key-pair‟ comprising a private key & a corresponding public key. • The process of signing a document involves finding the „hash value‟ of the document and then using the hash value and the private key to generate the digital signature which is affixed to the document along with the public key of the signer.
  • 5. LAW • Digital Signatures are considered equivalent to physical signatures by law in most countries around the world, including US, European countries and India. • In India, the Information Technology Act 2000 provides the legal sanctity for using Digital Signatures. • The entire act can be found on the internet. However section 4 and section 5 should be drawn some attention to.
  • 6. Section 4. Legal recognition of electronic records. • Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is— ▫ rendered or made available in an electronic form; and ▫ accessible so as to be usable for a subsequent reference.
  • 7. 5. Legal recognition of digital signatures. • Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document shall be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Central Government.
  • 8. SMS • SMS messages are currently one of the most widespread forms of communication. We have seen many unusual or strange applications, such as devices which allow the switching on and off of house heating systems using an SMS. • Alternatively, through SMS, whenever the temperature of a refrigerator exceeds a certain threshold, it is possible to automatically communicate the problem. • Indeed, through SMS, fridges can even signal when they are running out of beer.
  • 10. SMS SECURITY ISSUES AND VULNERABILITIES Two important aspects for any entity using consumer technologies such as SMS for business purposes: • SMS is not a secure environment. • Security breaches often occur more easily by concentrating on people rather than technology. SMS is vulnerable to – 1. Snooping: - On device, at the store and forward network elements . 2. SMS Interception:- Over the air, in wired network. 3. Spoofing: - Using commercial tools, own SMS gateway. 4. Modification: - Using conventional hacking techniques. 5. Attacks on GSM, the SMS Carrier Technology: - Often the weakest link in security is the mobile phone itself. Even leaving the mobile phone unattended inadvertently could expose your private and confidential messages to snooping.
  • 11. SMS SECURITY • Secrecy • Integrity • Availability • Authenticity
  • 12. APPROACH FOR SMS SECURITY • To protect the SMS contents, we usually do the encryption. • It may be symmetric or asymmetric encryption. But our focus here is on the non-repudiation. • If a SMS has sent by user „A‟ to user „B‟, „A‟ must not deny that he has sent SMS. This feature can be achieved by imposing digital signature. • The popular digital signature algorithms are DSA and elliptic curve based ECDSA. • The bit size of the public key believed to be needed for ECDSA is about twice the size of the security level, in bits. By comparison, at a security level of 80 bits, meaning an attacker requires the equivalent of about 280 signature generations to find the private key.
  • 13. ECDSA ALGORITHM • User A selects an integer k randomly, 0 < k < n, calculate k*G = (x, y), r = x mod n; • Take (r, s) as the digital signature of message m by A. • The verification of digital signature: 1. Calculate e1 =h(m1), u= s -1 * e1 mod n, v= s -1 * r mod n. 2. Calculate X= u*G + v*P = s -1 ( e1 * G + r * d * G) = s -1 (e + r * d) * G = k * G = (x1 , y1 ) 3. If X = 0, this signature is refused; else calculates r1 , x1 mod n.
  • 14. POSSIBLE ATTACK • The per-message secrets k used to sign two or more messages should be generated independently of each other. • In particular, a different per-message secret k should be generated for each different message signed; otherwise, the private key d can be recovered. • If a secure random or pseudorandom number generator is used, then the chance of generating a repeated k value is negligible.
  • 15. 5. SECURITY ANALYSIS • In the typical digital signature schemes such as ECDSA, a public key only corresponds to one secret key. • Given the secret key d, let the public key P be derived according to the equation P=dB, and let the signature T be derived using a random number ‘k’ following the equation T = k*B. • If an attacker attempts to derive the secret-key from the public key, he has to encounter the difficulty of solving the ECDLP.
  • 16. VULNERABILITY WITH SAT • It‟s necessary to check the vulnerability of the existing elliptic curve based digital signature algorithms. • These algorithms are based on the hardness of elliptic discrete logarithm problem which is still a NP-Complete problem. • For this purpose we prefer to do it using Boolean Satisfiability Problem (SAT), as we have polynomial time solution for 2-SAT and 3-SAT.
  • 17. CONCLUSION & FUTURE WORK • The elliptic curve discrete logarithm problem is significantly more difficult than the integer factorization problem. For the most part, the well-known RSA system must use 1024 bit keys, only then can it attain computationally reasonable security where as the ECC needs only 160 bit keys. So, at the same level of security, the speed of ECC is several times faster than RSA system; it can also saves on key storage space. • Elliptic curve discrete logarithm problem based systems are considered as secure systems but in quantum computer‟s environment these systems may not be secured. • In future, it‟s necessary to check the vulnerability of the system (attempt to break) and develop a secure environment.
  • 18. REFERENCES • [1] Mary Agoyi, Devrim Seral, “SMS Security: An Asymmetric Encryption Approach”, Sixth International Conference on Wireless and Mobile Communications, 2010@IEEE, pp. 448-452. • [2] Neetesh Saxena, Narendra S. Chaudhari, “A Secure Digital Signature Approach for SMS Security”, Department of Computer Sc. & Engineering Indian Institute of Technology, Indore, India, A Special Issue from IJCA - www.ijcaonline.org • [3] Digital Signatures A cryptovision whitepaper Version 1.0 cryptovision GmbH Munscheidstr. 14 45886 Gelsenkirchen