Slides for lecture 9
Download
Report
Transcript Slides for lecture 9
CMSC 414
Computer (and Network) Security
Lecture 9
Jonathan Katz
Digital signatures
RSA signatures I
“Textbook RSA”
– Why textbook RSA is completely insecure!
(Two attacks)
RSA signatures for real
Hash functions…
– Collision-resistance
• Birthday attacks
– “Scrambling”
How to fix RSA signatures
– Why does this work?
– Is it actually secure?
Hash functions
SHA-1
– Proposed NIST standard
– 160-bit output
MD5
– Developed by Rivest (RSA)
– 128-bit output
DSA/DSS signatures
“Digital signature standard”
Security based on discrete logarithms
– No (complete) proof of security
Royalty-free
Overall, neither RSA nor DSS has the
advantage
– Depends (in part) on relative strengths of
assumptions
Signing long messages?
How…?
– Hash-and-sign
– Only need to assume that hash function is
collision-resistant
Non-repudiation
Digital signatures achieve non-repudiation
– In contrast to private-key case!
Is this a good or a bad thing?
– Sometimes you want deniability (e.g., no trace
that you logged in)
– Legal ramifications – do you really know what
you are signing?
A few words about PKI
Certification authorities; certificates
– Single point of failure?
Certificate chains
More on this later…
“Why crypto fails”
Two examples of bad crypto:
– Replay of “ok” message from bank to ATM
– PIN on ATM card was authenticated, but
account number on ATM card was not…
“Why crypto fails”
Lack of information about previous failures
Most frauds not caused by “bad” crypto, but by
bad implementation/management
– There is plenty of bad crypto, too!
“Social engineering” attacks
Importance of threat model (i.e., security policy)
– Threat model may change…
Dispute resolution