版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
Chapter
13數(shù)字簽名《計(jì)算機(jī)與網(wǎng)絡(luò)安全》The
most
important
development
from
the
work
onpublic-key
cryptography
is
the
digital
signature.
Message
authentication
protects
two
partieswho
exchange
messages
fromany
third
party.
However,
it
does
not
protect
the
two
parties
against
each
other.
A
digital
signature
is
analogous
tothe
handwritten
signature,
and
provides
a
setof
security
capabilities
that
would
be
difficult
to
implement
in
any
other
way.
Itmust
have
thefollowing
properties:?
It
must
verify
the
author
and
the
date
and
timeof
the
signature?
It
must
to
authenticate
the
contentsatthe
time
of
the
signature?
It
must
be
verifiable
by
third
parties,to
resolve
disputesThus,
the
digital
signature
functionincludes
the
authentication
function.數(shù)字簽名RSA數(shù)字簽名ElGamal數(shù)字簽名Schnorr數(shù)字簽名數(shù)字簽名標(biāo)準(zhǔn)11/11/20202華中農(nóng)業(yè)大學(xué)信息學(xué)院The
most
important
development
from
the
work
onpublic-key
cryptography
is
the
digital
signature.
Message
authentication
protects
two
partieswho
exchange
messages
fromany
third
party.
However,
it
does
not
protect
the
two
parties
against
each
other.
A
digital
signature
is
analogous
tothe
handwritten
signature,
and
provides
a
setof
security
capabilities
that
would
be
difficult
to
implement
in
any
other
way.
Itmust
have
thefollowing
properties:?
It
must
verify
the
author
and
the
date
and
timeof
the
signature?
It
must
to
authenticate
the
contentsatthe
time
of
the
signature?
It
must
be
verifiable
by
third
parties,to
resolve
disputesThus,
the
digital
signature
functionincludes
the
authentication
function.§13.1數(shù)字簽名11/11/20203華中農(nóng)業(yè)大學(xué)信息學(xué)院消息認(rèn)證可以保護(hù)信息交換不受第三方的攻擊,但不能處理通信雙方自身發(fā)生的攻擊。數(shù)字簽名提供了這種能力:?驗(yàn)證簽名者、簽名的日期和時(shí)間?認(rèn)證消息內(nèi)容?可由第三方仲裁,以解決爭執(zhí)因此,數(shù)字簽名具有認(rèn)證功能On
the
basis
of
the
properties
on
the
previous
slide,
we
can
formulate
the
requirements
for
a
digital
signature
as
shown.
Avariety
of
approacheshas
been
proposed
for
the
digital
signature
function.
These
approaches
fall
into
two
categories:
direct
and
arbitrated.數(shù)字簽名應(yīng)滿足的條件11/11/20204華中農(nóng)業(yè)大學(xué)信息學(xué)院簽名值必須依賴于所簽的消息必須使用對于發(fā)送者唯一的信息?以防止偽造和否認(rèn)產(chǎn)生簽名比較容易識(shí)別和驗(yàn)證簽名比較容易偽造數(shù)字簽名在計(jì)算上是不可行的。包括?已知數(shù)字簽名,偽造新的消息?已知消息,偽造數(shù)字簽名保存數(shù)字簽名的拷貝是可行的Direct
DigitalSignatures
involve
the
direct
applicationof
public-key
algorithms
involving
only
the
communicating
parties.
A
digital
signature
maybe
formed
by
encrypting
the
entire
message
with
the
sender’s
private
key,
or
by
encrypting
ahash
code
of
the
message
with
the
sender’s
privatekey.
Confidentiality
can
be
provided
by
further
encryptingthe
entire
message
plus
signature
using
either
public
or
private
keyschemes.
It
isimportant
to
perform
the
signature
functionfirst
and
then
an
outer
confidentialityfunction,
since
in
case
of
dispute,
some
third
party
must
view
themessage
and
its
signature.
But
these
approaches
are
dependent
on
the
security
of
the
sender’s
private-key.
Will
have
problems
if
it
is
lost/stolenand
signatures
forged.
Need
time-stamps
and
timely
key
revocation.直接數(shù)字簽名11/11/20205華中農(nóng)業(yè)大學(xué)信息學(xué)院只涉及收發(fā)雙方假定接收方已知發(fā)送方的公鑰
發(fā)送方可以用自己的私鑰對整個(gè)消息內(nèi)容或消息內(nèi)容的hash值進(jìn)行加密,完成數(shù)字簽名??梢杂媒邮照叩墓€來加密以提供保密性先簽名后加密,很重要。缺點(diǎn):安全性依賴于發(fā)送方私鑰的安全性The
problems
associated
with
direct
digital
signatures
can
be
addressed
by
using
an
arbiter,
in
a
variety
of
possible
arrangements,
as
showninStallings
Table
13.1.The
arbiter
plays
asensitive
and
crucial
role
in
this
sortof
scheme,
and
all
parties
must
haveagreat
deal
of
trust
that
the
arbitration
mechanismisworking
properly.These
schemes
can
be
implemented
with
either
private
or
public-keyalgorithms,
and
the
arbiter
may
or
may
not
see
the
actual
message
contents.仲裁數(shù)字簽名11/11/20206華中農(nóng)業(yè)大學(xué)信息學(xué)院仲裁者A?驗(yàn)證任何簽名的消息?給消息加上日期并發(fā)送給接收者需要對仲裁者有合適的信任級(jí)別即可在私鑰體制中實(shí)現(xiàn),又可在公鑰體制中實(shí)現(xiàn)仲裁者可以或者不可以閱讀消息13.2
RSA簽名體系
RSA簽名體系的消息空間和密文空間都是Zn={0,1,2,…,n?1},這里n=p×q。此簽名體系是一種確定的數(shù)字簽名體系。1.RSA簽名體系的密鑰產(chǎn)生每個(gè)實(shí)體A進(jìn)行以下操作:(1)隨機(jī)選擇兩個(gè)大素?cái)?shù)p和q;(2)計(jì)算n=p×q和Φ(n)=(p?1)(q?1);(3)隨即選擇e,滿足1<e<Φ(n),gcd(e,Φ(n))=1;(4)用歐幾里得算法計(jì)算d,滿足1<d<Φ(n),ed
=1
mod(n)。設(shè)A的公鑰為(n,e),私鑰為(n,d)。2.簽名算法(1)計(jì)算s=md
mod
n;(2)發(fā)送(m,s)。3.驗(yàn)證算法(1)計(jì)算m′=se
mod
n;
(2)驗(yàn)證m′是否等于m,若不等于,則拒絕;4.安全性分析
如果攻擊者能夠進(jìn)行模n的大整數(shù)分解,則它可計(jì)算
Φ(n),從而利用歐幾里得算法得到簽名者的私鑰。所以簽名者必須小心地選擇p和q。13.3
ElGamal簽名方案
ElGamal簽名是一種隨機(jī)附屬簽名機(jī)制,它可以對任意長度的二進(jìn)制消息格式進(jìn)行簽名。數(shù)字簽名算法
(DSA)是它的一種變種。舉例:P287安全性分析11/11/202014華中農(nóng)業(yè)大學(xué)信息學(xué)院Authentication
Protocols
are
used
to
convince
parties
of
each
others
identity
and
to
exchange
session
keys.
Theymay
be
one-way
or
mutual.Central
to
the
problemof
authenticated
key
exchange
are
two
issues:
confidentiality
and
timeliness.
To
prevent
masquerade
and
to
preventcompromise
of
session
keys,
essential
identification
and
session
key
information
must
be
communicated
in
encrypted
form.
This
requires
the
priorexistence
of
secret
orpublic
keys
that
can
be
used
for
this
purpose.
The
second
issue,
timeliness,
is
important
because
of
the
threat
of
messagereplays.Stallings
discussesa
number
of
protocols
that
appeared
secure
but
were
revised
after
additional
analysis.
These
examples
highlight
the
difficulty
ofgettingthings
right
in
the
area
of
authentication.§13.4
Schnorr數(shù)字簽名11/11/202015華中農(nóng)業(yè)大學(xué)信息學(xué)院ElGamal簽名方案的另一個(gè)變種是Schnorr簽名。
和DSA一樣,Schnorr簽名也使用了上階為q的循環(huán)子群。
二者的密鑰產(chǎn)生過程也極其相似,但Schnorr簽名對p和q的大小沒有限制。DSA
is
the
US
Govt
approved
signature
scheme,
which
is
designed
to
provide
strong
signatures
without
allowing
easy
use
for
encryption.
TheDSS
makes
use
of
the
Secure
Hash
Algorithm
(SHA),
and
presents
a
new
digital
signature
technique,
the
Digital
Signature
Algorithm
(DSA).
TheDSS
was
originally
proposed
in
1991
and
revised
in
1993
in
response
to
public
feedback
concerningthe
security
of
the
scheme.
There
was
afurther
minor
revision
in
1996.
In
2000,
an
expanded
version
of
the
standard
was
issued
as
FIPS
186-2,
which
incorporates
digital
signaturealgorithms
based
on
RSA
and
on
elliptic
curve
cryptography.§13.5數(shù)字簽名標(biāo)準(zhǔn)Digital
Signature
Standard
(DSS)11/11/202018華中農(nóng)業(yè)大學(xué)信息學(xué)院美國政府的簽名方案由NIST和NSA,在20世紀(jì)90年代設(shè)計(jì)1991年,作為FIPS-186發(fā)布1993,1996,2000進(jìn)行了修改采用SHA
hash算法DSS是標(biāo)準(zhǔn)DSA算法。
FIPS186-2(2000)包括可選的RSA和橢圓曲線簽名算法Will
discuss
the
original
DSS
algorithm.
The
DSA
signature
scheme
has
advantages,
being
both
smaller
(320
vs
1024bit)
and
faster
(much
of
thecomputation
is
done
modulo
a160
bit
number),
over
RSA.
Unlike
RSA,
it
cannot
be
used
for
encryption
or
key
exchange.
Nevertheless,
it
is
apublic-key
technique.
The
DSAis
based
on
the
difficulty
of
computing
discrete
logarithms,
and
is
based
on
schemes
originally
presented
byElGamal
[ELGA85]
and
Schnorr
[SCHN91].Digital
Signature
Algorithm
(DSA)11/11/202019華中農(nóng)業(yè)大學(xué)信息學(xué)院產(chǎn)生320
bit的簽名值可以提供512-1024
bit的安全性比RSA小且快僅是一個(gè)數(shù)字簽名方案(不能用于加密)安全性依賴于計(jì)算里算對數(shù)的困難性是ElGamal和Schnorr方案的變體DSA
differs
from
RSAin
how
the
message
signature
is
generated
and
validated,
as
shownin
Stallings
Figure
13.1.RSA
signatures
encrypt
the
message
hash
withthe
private
key
to
create
a
signature,
which
is
thenverified
by
being
decrypted
withthe
public
keyto
compare
toa
recreated
hash
value.DSA
signatures
use
the
message
hash,
global
public
values,
private
key
&
randomk
to
create
a2
part
signature
(s,r).
This
is
verified
bycomputing
a
function
of
the
message
hash,
public
key,
r
ands,
and
comparing
the
result
with
r.
The
proof
that
this
works
is
complex,
but
itachieves
its
aims!Digital
Signature
Algorithm
(DSA)11/11/202020華中農(nóng)業(yè)大學(xué)信息學(xué)院DSA
typically
usesacommon
setof
global
parameters
(p,q,g)
for
acommunity
of
clients,
as
shown.
Theneach
DSA
uses
chooses
arandomprivate
key
x,
and
computes
their
public
key
as
shown.
The
calculation
of
the
public
key
y
given
x
is
relatively
straightforward.
However,
giventhe
public
key
y,
it
is
computationallyinfeasible
to
determine
x,
which
is
the
discrete
logarithm
of
y
to
base
g,
mod
p.DSA密鑰的生成11/11/202021華中農(nóng)業(yè)大學(xué)信息學(xué)院全局公鑰(p,q,g):?選擇q,位長為160
bit?選擇一個(gè)大的素?cái)?shù)p=2L其中L=
512
to
1024
bits且L是64的倍數(shù)q是(p-1)的素因子?選擇g=h(p-1)/q
mod
p其中 h<p-1,
h(p-1)/q
(mod
p)
>
1用戶選擇私鑰并計(jì)算對應(yīng)的公鑰:?隨機(jī)選擇私鑰
0<x<q?計(jì)算公鑰y=gx
(mod
p)To
createasignature,
auser
calculates
two
quantities,
r
and
s,
that
are
functionsof
the
public
key
components
(p,q,g),
the
user’s
private
key
(x),the
hash
code
of
the
message
H(M),
and
an
additional
integerk
that
should
be
generated
randomly
or
pseudo-randomlyand
be
unique
for
eachsigning.
This
is
similar
to
ElGamal
signatures,
with
the
use
of
a
per
message
temporary
signature
key
k,
but
doing
calculations
first
mod
p,
thenmod
q
to
reduce
the
size
of
the
result.
The
signature
(r,s)
is
then
sent
with
the
message
to
the
recipient.
Note
that
computing
r
only
involvescalculation
mod
p
and
does
not
depend
on
message,
hence
can
be
done
in
advance.
Similarlywithrandomlychoosing
k’s
and
computing
theirinverses.DSA簽名的生成11/11/202022華中農(nóng)業(yè)大學(xué)信息學(xué)院為了對消息M進(jìn)行簽名,發(fā)送者:?產(chǎn)生一個(gè)隨機(jī)簽名密鑰k,k<q?注意k必須是一個(gè)隨機(jī)數(shù),用后就扔掉,不再使用。計(jì)算簽名對:r
=
(
gk
(
mod
p
)
)
(mod
q)s
=
(
k-1.H(
M
)
+
x.r)
(mod
q)和消息M一同發(fā)送簽名值(r,s)At
the
receiving
end,
verification
is
performed
using
the
formulas
shown.
The
receiver
generates
aquantity
v
that
is
afunction
of
the
public
keycomponents,
the
sender’s
public
key,
and
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 高新企業(yè)培訓(xùn)課件
- 贛南衛(wèi)生健康職業(yè)學(xué)院《建筑設(shè)計(jì)基礎(chǔ)一》2023-2024學(xué)年第一學(xué)期期末試卷
- 贛南師范大學(xué)《學(xué)校社會(huì)工作》2023-2024學(xué)年第一學(xué)期期末試卷
- 贛東學(xué)院《IP路由與交換技術(shù)》2023-2024學(xué)年第一學(xué)期期末試卷
- 《醫(yī)院銷售技巧培訓(xùn)》課件
- 七年級(jí)道德與法治上冊第一單元成長的節(jié)拍第三課發(fā)現(xiàn)自己第2框做更好的自己說課稿新人教版
- 三年級(jí)科學(xué)上冊第六單元人與大地17砂和黏土教案首師大版
- 科學(xué)課件圖片小學(xué)生
- 三年級(jí)下學(xué)期班主任工作參考計(jì)劃
- 大數(shù)據(jù)時(shí)代會(huì)計(jì)從業(yè)人員素質(zhì)提升策略分析
- 員工入職培訓(xùn)
- 國家開放大學(xué)電大??啤吨袊?dāng)代文學(xué)》期末試題及答案
- 鋪種草皮施工方案(推薦文檔)
- 廣東話粵語姓名拼音大全
- 閘門及啟閉機(jī)安裝專項(xiàng)施工方案
- 應(yīng)征公民體格檢查表(征兵)
- 鋼筋位置及保護(hù)層厚度檢測ppt課件
- 巖石堅(jiān)固性和穩(wěn)定性分級(jí)表
- CNC程序控制管理辦法
- 案例思念休閑吧
- 北京石油機(jī)械廠螺桿鉆具使用說明書-最新
評論
0/150
提交評論