Introduction to Cryptography and Security Mechanisms.ppt
《Introduction to Cryptography and Security Mechanisms.ppt》由会员分享,可在线阅读,更多相关《Introduction to Cryptography and Security Mechanisms.ppt(49页珍藏版)》请在麦多课文档分享上搜索。
1、Introduction to Cryptography and Security Mechanisms,Dr Keith Martin McCrea 349 01784 443099 keith.martinrhul.ac.uk,Before we start,Introduction to Cryptography and Security Mechanisms 2005,3,Quiz 1,If two parties engage in a process that results in mutual entity authentication then at the end of th
2、e process the two parties can be reasonably confident that: A All subsequent messages that they exchange come from one another B The next messages that they exchange come from one another C The messages that they have just exchanged came from one another D Some messages that they recently exchanged
3、were created by one another at some time in the past,Introduction to Cryptography and Security Mechanisms 2005,4,Quiz 2,If an attacker intercepts a response that is issued during a successful challenge/response exchange and then tries to replay it a later date when a fresh challenge is issued, which
4、 of the following is the most likely reason for why the attacker will not succeed in being authenticated? A The attacker does not know the correct PIN B A response is only ever valid once C The response needs to be accompanied by evidence of freshness D The response might match the fresh challenge,
5、but the probability of this happening is low,Introduction to Cryptography and Security Mechanisms 2005,5,Quiz 3,Which of the following is not a problem with logical time-stamps (sequence numbers)? A Synchronising logical time at either end of the communication link B Preventing attackers from workin
6、g out the next logical time-stamp C Maintaining the integrity of logical time-stamps D Deciding on procedures for coping with lost messages,Introduction to Cryptography and Security Mechanisms: Unit 9 Digital Signatures,Dr Keith Martin McCrea 349 01784 443099 keith.martinrhul.ac.uk,Introduction to C
7、ryptography and Security Mechanisms 2005,7,Learning Outcomes,Explain the concept of a digital signature Recognise that not all digital signatures rely on public key cryptography Appreciate the role that hash functions play in creating digital signatures Demonstrate how digital signatures can be crea
8、ted and verified using RSA Differentiate between digital signatures with appendix and digital signatures with message recovery Distinguish between the properties of digital and hand-written signatures Identify some of the main ways in which digital signature schemes can be attacked,Introduction to C
9、ryptography and Security Mechanisms 2005,8,Sections,Digital signature overview Hash functions Digital signature algorithms Security issues,1. Digital signature overview,Introduction to Cryptography and Security Mechanisms 2005,10,Informal definition,Informally, a digital signature is a technique for
10、 establishing the origin of a particular message in order to settle later disputes about what message (if any) was sent. The purpose of a digital signature is thus for an entity to bind its identity to a message. We use the term signer for an entity who creates a digital signature, and the term veri
11、fier for an entity who receives a signed message and attempts to check whether the digital signature is “correct” or not. Digital signatures have many attractive properties and it is very important to understand exactly what assurances they provide and what their limitations are. While data confiden
12、tiality has been the driver behind historical cryptography, digital signatures could be the major application of cryptography in the years to come.,Introduction to Cryptography and Security Mechanisms 2005,11,Electronic signatures,The European Community Directive on electronic signatures refers to t
13、he concept of an electronic signature as:,data in electronic form attached to, or logically connected with, other electronic data and which serves as a method of authentication,What different things can you think of that might satisfy this rather vague notion of an electronic signature?,Introduction
14、 to Cryptography and Security Mechanisms 2005,12,Advanced electronic signatures,The European Community Directive on electronic signatures also refers to the concept of an advanced electronic signature as:,an electronic signature that is: uniquely linked to the signatory capable of identifying the si
15、gnatory created using means under the sole control of the signatory linked to data to which it relates in such a way that subsequent changes in the data is detectable,Introduction to Cryptography and Security Mechanisms 2005,13,Security requirements,Data origin authentication of the signer A digital
16、 signature validates the message in the sense that assurance is provided about the integrity of the message and of the identity of the entity that signed the message. Non-repudiation A digital signature can be stored by anyone who receives the signed message as evidence that the message was sent and
17、 of who sent it. This evidence could later be presented to a third party who could use the evidence to resolve any dispute that relates to the contents and/or origin of the message.,We will define a digital signature on a message to be some data that provides:,Introduction to Cryptography and Securi
18、ty Mechanisms 2005,14,Input to a digital signature,The message Since a digital signature needs to offer data origin authentication (and non-repudiation) it is clear that the digital signature itself must be a piece of data that depends on the message, and cannot be a completely separate identifier.
19、It may be sent as a separate piece of data to the message, but its computation must involve the message. A secret parameter known only by the signer Since a digital signature needs to offer non-repudiation, its calculation must involve a secret parameter that is known only by the signer. The only po
20、ssible exception to this rule is if the other entity is totally trusted by all parties involved in the signing and verifying of digital signatures.,Introduction to Cryptography and Security Mechanisms 2005,15,Properties of a digital signature,Easy for the signer to sign a message There is no point i
21、n having a digital signature scheme that involves the signer needing to use slow and complex operations to compute a digital signature. Easy for anyone to verify a message Similarly we would like the verification of a digital signature to be as efficient as possible. Hard for anyone to forge a digit
22、al signature It should be practically impossible for anyone who is not the legitimate signer to compute a digital signature on a message that appears to be valid. By “appears to be valid” we mean that anyone who attempts to verify the digital signature is led to believe that they have just successfu
23、lly verified a valid digital signature on a message.,Introduction to Cryptography and Security Mechanisms 2005,16,Arbitrated digital signatures,MACKS,Signer,Verifier,Arbitrator,KS,KV,KV,KS,message,message,MACKV,MACKS,1,2,3,4,Introduction to Cryptography and Security Mechanisms 2005,17,Arbitrated dig
24、ital signatures,Explain why arbitrated digital signatures meet the security requirements have the properties that we required for a digital signature. How does the verifier check the first MAC, computed using KS? What is the main (practical) problem with implementing arbitrated signatures?,Introduct
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- INTRODUCTIONTOCRYPTOGRAPHYANDSECURITYMECHANISMSPPT

链接地址:http://www.mydoc123.com/p-376646.html