SlideShare a Scribd company logo
1 of 25
Download to read offline
DigitalSignature
Thehashvalueofamessageisencryptedwitha
user’sprivatekey(signing)
Anyonewhoknowstheuser’spublickeycan
verifytheintegrityofthemessage(Verification)
Anattackerwhowishestoalterthemessage
wouldneedtoknowtheuser’sprivatekey
EnsuresMessageauthenticationandnon-
repudiation.
DigitalSignatures
digitalsignaturesprovidetheabilityto:
verifyauthor,date&timeofsignature
authenticatemessagecontents
beverifiedbythirdpartiestoresolvedisputes
henceincludeauthenticationfunctionwith
additionalcapabilities
Direct&ArbitratedDigitalSignatures
involveonlysender&receiver
Assumesthatreceiverhassender’spublic-key
digitalsignaturemadebysendersigningentiremessageorhashwith
private-key
canencryptusingreceiverspublic-key
importantthatsignfirstthenencryptmessage&signature
securitydependsonsender’sprivate-key
Arbitrated
In an arbitrated signature there is more trust because the
sender'smessageissenttoanarbitertogetauthenticatedbeforeitis
sentofftothereceiver.
Direct
w
‘
AuthenticationProtocols
Usedtoconvincepartiesabouteachothers
identityandtoexchangesessionkeys
MaybeOne-wayorMutual
UsingSymmetric
Encryption
Usesatwo-levelhierarchyofkeysusuallywitha
trustedKeyDistributionCenter(KDC)
eachpartysharesownmasterkeywithKDC
KDCgeneratessessionkeysusedforconnections
betweenparties
masterkeysareusedtodistributethesetothem
Needham-Schroeder
Protocol
Original third-party key distribution
protocol for session between A and
BmediatedbyKDC
Protocoloverviewis:
1.A->KDC :IDA||IDB||N₁
2.KDC->A :EKa[Ks||IDB||
N₁||EKb[Ks||IDA]]
3.A->B :EKb[Ks||IDA]
4.B->A :EKs[N₂]
5.A->B :EKs[f(N₂)]
Needham-Schroeder
Protocol
usedtosecurelydistributeanewsessionkeyfor
communicationsbetweenA&B
butisvulnerabletoareplayattackifanold
sessionkeyhasbeencompromised
thenmessage3canberesentconvincingBthatis
communicatingwithA
modificationstoaddressthisrequire:
timestamps(Denning81)
usinganextranonce(Neuman93)
Denning’sApproach
1.
A ->KDC
:
IDA||IDB
2.
KDC-> A
:
E(Ka, [Ks||IDB||T||E(Kb,
[Ks||IDA||T])])
3.
A-> B
:
E(Kb, [Ks||IDA||T])
4.
B-> A
:
E(Ks, N₁)
5.
A ->B
:
E(Ks, f(N₁))
T is a timestamp that assures A and B that the session key has only just been generated. Thus, both A and B
knowthatthekeydistributionisafreshexchange.
AandBcanverifytimelinessbycheckingthat
|ClockT|<Dt₁+Dt₂
where Dt₁ is the estimated normal discrepancy between the KDC's clock and the local clock (at A or B) and
Dt₂istheexpectednetworkdelaytime.
Each node can set its clock against some standard reference source. Because the timestamp T is encrypted
using the secure master keys, an opponent, even with knowledge of an old session key, cannot succeed
becauseareplayofstep3willbedetectedbyBasuntimely.
The Denning protocol provide increased degree of security compared to the Needham/Schroeder protocol
butrequiresrelianceonclocksthataresynchronizedthroughoutthenetwork.
The problem occurs when a sender's clock is ahead of the intended recipient's clock. In this case, an
opponent can intercept a message from the sender and replay it later when the timestamp in the message
becomescurrentattherecipient'ssite.Thisreplay(SupressReplay)couldcauseunexpectedresult
DenningsApproach
Neuman’sApproach
Thisapproachpreventssuppress-replayattacksandatthe
sametimefixtheproblemsintheNeedham/Schroeder
protocol.
A->B : IDA||Na
2.B->KDC : IDB||Nb||E(Kb,[IDA||Na||Tb])
3.KDC->A : E(Ka,[IDB||Na||Ks||Tb])||E(Kb,
[IDA||Ks||Tb])||Nb
4.A->B : E(Kb,[IDA||Ks||Tb])||E(Ks,Nb)
1.
2.
Public-KeyEncryptionApproaches
Dening’sApproach
A->AS :IDA||IDB
2.AS->A :E(PRas,[IDA||PUa||T])||E(PRas,
[IDB||PUb||T])
A->B :E(PRas,[IDA||PUa||T])||E(PRas,
[IDB||PUb||T])
||E(PUb,E(PRa,[Ks||T]))
1.
2.
3.
WooandLam’sApproach
1.A->KDC :IDA||IDB
2.KDC->A :E(PRauth,[IDB||PUb])
3.A->B :E(PUb,[Na||IDA])
4.B->KDC :IDA||IDB||E(PUauth,Na)
5.KDC->B :E(PRauth,[IDA||PUa])||E(PUb,E(PRauth,
[Na||Ks||IDB]))
6.B->A :E(PUa,E(PRauth,[(Na||Ks||IDB)||Nb]))
7.A->B :E(Ks,Nb)
One-WayAuthentication
SymmetricEncryptionApproach
1.A->KDC:IDA||IDB||N₁
2.KDC->A:E(Ka,[Ks||IDB||N₁||E(Kb,[Ks||IDA])])
3.A->B:E(Kb,[Ks||IDA])||E(Ks,M)
Public-KeyEncryptionApproaches
Ifconfidentialityistheprimaryconcern,thenthe
followingmaybemoreefficient:
A->B:E(PUb,Ks)||E(Ks,M)
Ifauthenticationistheprimaryconcern,thena
digitalsignaturemaybesufficient
A->B:M||E(PRa,H(M))
One-WayAuthentication
Requiredwhensender&receiverarenotin
communicationsatsametime(eg.email)
Haveheaderinclearsocanbedeliveredby
emailsystem
Maywantcontentsofbodyprotected&sender
authenticated
UsingSymmetric
Encryption
canrefineuseofKDCbutcan’thavefinal
exchangeofnonces,vis:
1.A→KDC:IDA||IDB||N₁
2.KDC→A:EKa[Ks||IDB||N₁||EKb[Ks||IDA]]
3.A→B:EKb[Ks||IDA]||EKs[M]
doesnotprotectagainstreplays
couldrelyontimestampinmessage,though
emaildelaysmakethisproblematic
Public-KeyApproaches
haveseensomepublic-keyapproaches
ifconfidentialityismajorconcern,canuse:
A→B:EKUb[Ks]||EKs[M]
hasencryptedsessionkey,encryptedmessage
ifauthenticationneededuseadigitalsignaturewitha
digitalcertificate:
A→B:M||EKRa[H(M)]||EKRas[T||IDA||KUa]
withmessage,signature,certificate

More Related Content

Similar to Unit 3 Part 1.pptx_20230919_114527_0000.pdf

digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxManuE45
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun tejashree bangera
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.pptjayarao21
 
Digital certificates &amp; its importance
Digital certificates &amp; its importanceDigital certificates &amp; its importance
Digital certificates &amp; its importancesvm
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Ssl certificate
Ssl certificateSsl certificate
Ssl certificatemisra121
 

Similar to Unit 3 Part 1.pptx_20230919_114527_0000.pdf (20)

digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
digital signature agency in jaipur
digital signature agency in jaipurdigital signature agency in jaipur
digital signature agency in jaipur
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
Digital certificates &amp; its importance
Digital certificates &amp; its importanceDigital certificates &amp; its importance
Digital certificates &amp; its importance
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
Ssl certificate
Ssl certificateSsl certificate
Ssl certificate
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
14.3.2013
14.3.201314.3.2013
14.3.2013
 

Recently uploaded

Day care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenDay care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenMeleseWolde3
 
Guide to Physical Therapist Practice presentation
Guide to Physical Therapist Practice presentationGuide to Physical Therapist Practice presentation
Guide to Physical Therapist Practice presentationssuser00bcd3
 
IG2 Risk Assessment.for any copany .docx
IG2 Risk Assessment.for any copany .docxIG2 Risk Assessment.for any copany .docx
IG2 Risk Assessment.for any copany .docxdahomyalshehry
 
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...MasterG
 
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdfThomas GIRARD BDes
 
Master SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's GuideMaster SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's GuideTechEasifyInfotech
 
કારકિર્દીના પંથે-2024 career guidance.pdf
કારકિર્દીના પંથે-2024 career guidance.pdfકારકિર્દીના પંથે-2024 career guidance.pdf
કારકિર્દીના પંથે-2024 career guidance.pdfSAIYEDASAD2
 
5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in Chinaamy56318795
 
Genaihelloallstudyjamheregetstartedwithai
GenaihelloallstudyjamheregetstartedwithaiGenaihelloallstudyjamheregetstartedwithai
Genaihelloallstudyjamheregetstartedwithaijoceko6768
 
129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]Manu Mitra
 
Job Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJob Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJon Stephenson
 
0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdf0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdfThomas GIRARD BDes
 
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdfThomas GIRARD BDes
 
toefl ibt practice test module download_1
toefl ibt practice test module download_1toefl ibt practice test module download_1
toefl ibt practice test module download_1Aswar Amiruddin
 

Recently uploaded (14)

Day care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenDay care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring children
 
Guide to Physical Therapist Practice presentation
Guide to Physical Therapist Practice presentationGuide to Physical Therapist Practice presentation
Guide to Physical Therapist Practice presentation
 
IG2 Risk Assessment.for any copany .docx
IG2 Risk Assessment.for any copany .docxIG2 Risk Assessment.for any copany .docx
IG2 Risk Assessment.for any copany .docx
 
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...
Ralph - Project Presentation Enhancing System Security at Acme Flight Solutio...
 
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
 
Master SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's GuideMaster SEO in 2024 The Complete Beginner's Guide
Master SEO in 2024 The Complete Beginner's Guide
 
કારકિર્દીના પંથે-2024 career guidance.pdf
કારકિર્દીના પંથે-2024 career guidance.pdfકારકિર્દીના પંથે-2024 career guidance.pdf
કારકિર્દીના પંથે-2024 career guidance.pdf
 
5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China5CL-ADBA,5cladba, the best supplier in China
5CL-ADBA,5cladba, the best supplier in China
 
Genaihelloallstudyjamheregetstartedwithai
GenaihelloallstudyjamheregetstartedwithaiGenaihelloallstudyjamheregetstartedwithai
Genaihelloallstudyjamheregetstartedwithai
 
129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]129. Reviewer Certificate in BioNature [2024]
129. Reviewer Certificate in BioNature [2024]
 
Job Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptxJob Hunting - pick over this fishbone for telephone interviews!.pptx
Job Hunting - pick over this fishbone for telephone interviews!.pptx
 
0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdf0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdf
 
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
 
toefl ibt practice test module download_1
toefl ibt practice test module download_1toefl ibt practice test module download_1
toefl ibt practice test module download_1
 

Unit 3 Part 1.pptx_20230919_114527_0000.pdf