Protocols For Public-Key Cryptosystems
Protocols For Public-Key Cryptosystems
Ralph C. Merkle
ELXSi International
Sunnyvale,Ca.
take full advantage of the unique pro- liar with the general ideas behind pub-
public key distribution and for digital For many of the following examples
signatures are briefly compared with we assume there are two communicants,
each other and with the conventional al- called A and B, and an opponent E. A
to CACM.
122
CH1522-2C/80/OOOO-O122$O0.75@1980 IEEE
The major drawback of this protocol
2. Centralized ~ Distribution
is its vulnerability to both centralized
the only reasonable method of handling will compromise all users of the system.
environment before the discovery of pub- keys destroys the key distribution
lic key distribution methods. Only con- mechanism for all users.
used, which presently offers a perfor- centralized key distribution can be in-
mance advantage. (Presently known pub- creased by using two or more centers,
lic key systems are less efficient than each with its own keys [1]. Destruction
Whether or not this will continue is not not affect the other centers.
now known. Discovery of new public key Security can also be improved if
systems seems almost inevitable, and all the user keys are encrypted with a
discovery of more efficient ones prob- master key by the center. The master
prf2ViOUSly agreed on central keys, A between each user and the center to es-
and B can then communicate with no tablish the original keys. This problem
further assistance from the key distri- is nontrivial because no electronic com-
This protocol is simple and re- physical methods, e.g., registered mail,
quires only conventional encryption offer only moderate security. The use
123
The disadvantage of this protocol
all messages. A randomly computes enci- The now classic protocol [1] for
phering and deciphering keys EA and DA, secure and authenticated communications
and sends EA to B (and E). B picks the between A and B is: A and B generate EA
random key, k, and transmits EA(k) to A and EB and make them public, while keep-
(and E). A computes DA(EA(k)) = k. A ing DA and DB secret. The public enci-
then discards both EA and DA, and B dis- phering keys of all users are entered in
cards The key in future communica- a public filer allowing easy and authen-
‘A “
tions is k. It is used to encrypt al1 ticated access to EX for any user, X.
encryption function. Once A and B have mon key k, then each sends a (session)
finished talking, they both discard k. key to the other by encrypting it with
If they later resume the conversation the others public key. The two keys
the process is repeated to agree on a thus agreed on are combined and used to
new key k“. encrypt further messages.
This protocol is very simple, and At the end of this protocol, A and
has a great deal to recommend it. B have agreed on a common key, k, which
exist before A and B start communicat- This protocol suffers from two
ing, and nothing is retained after they weaknesses. Firstr entries in the pub-
have finished. It is impossible for E lic file might be altered. This can be
to compromise any keys either before the dealt with both by good physical securi-
conversation takes place, or after it is ty, or by using new protocols (see sec-
over, for the keys exist only during the tions 5 and 6) for authenticating the
124
can be published in newspapers
‘CA
Secondr secret deciphering keys can and magazines, and sent over all avail-
be solved by good physical security. its correct reception would be very dif-
ficult.
each other’s certificates. This proto- was vulnerable to the criticism that D
CA
col assures A and B that each has the can be compromised, resulting in system
other’s public enciphering key, and not wide loss of authentication. This prob-
the public enciphering key of some im- lem can be solved by using tree authen-
on the assumptions that the secret deci- authenticate entries in the public file.
phering keys of A, B, and CA have not However, instead of signing each entry
been compromised; that A and B have in the public file, this protocol ap-
correct copies of (to check the plies a one way hash function, H, to the
‘CA
signed certificates) ; and that CA has entire public file. Even though H is
not issued a bad certificate, either applied to the entire public file, the
125
If all users of the system know R, then
all users can authenticate the correct- Where F is a one way function.
ness of the (whole) public file by com- If A wishes to confirm B-s public
puting R = H(public file). Any attempt enciphering key, then A need only know
to introduce changes into the public the first half of the public filet
file will imply R # H(altered public (which is where YB appears) and Ii(second
file), an easily detected fact. half of public file) which is only 100
This method effectively eliminates bits long. A can compute H(public file)
the possibility of compromising DCA be- knowing only this information, and yet A
cause no secret deciphering key exists. only knew half the entries in the public
scrutiny, and because making alterations really need to know all of the first
in the public file is effectively impos- half of the public file, for
selectively authenticate individual en- All A needs to know is the first quarter
tries in the public file without having of the public file (which has YB), and
to know the whole public file by using H(second quarter of public file).
denoted Yi, and B’s entry is YB); we can along the path from R to YB and will be
define H(public file) = H(x) as: called the authentication path.
These definitions are illustrated
H(z) = F( H(first half of ~), in figure 1, which shows the authentica-
H(second half of ~) ) tion path for Y5.
126
The only practical method of
For a more detailed discussion the
compromising this protocol is to
reader is referred to [13].
compromise DA or DB. A user’s security
Using tree authentication, user A
is thus dependent on himself and no one
has an authentication path which can be
else.
used to authenticate user A*s public en-
L27
must somehow generate a sequence of bits
disputes are different. Failure to
(a digital signature) which will con-
understand this point has led to confu-
vince B (and if need be a judge) that A
sion in the literature [17,20].
authorized the order. It must be easy
We now turn to specific digital
for B to validate the digital signature,
signature protocols.
but impossible for him (or anyone other
tosystems but it will be convenient ro- relies on the observation that if A and
ing a signature will then be done by municating with CA, then A can “signw a
bits) then the signature is rejected as This approach is defended by some [17’].
128
message. B (or a judge) can compute been confused with each other for this
correctness of the signed message. A is key digital signature protocol has actu-
held responsible for a signed message if ally been of this second protocol, and
and only if it can be verified by apply- failed to consider the first protocol at
[16,17,20] on two grounds: First, the under the second protocol A can make DA
public file might have been tampered public and effectively disavow the
with. Methods of authenticating the signed message. For this reason, some
public file, discussed previously under critics have argued that this protocol
key be compromised and made public. easy to design a system in which this is
with A’s compromised D A, and A will be The major difference between the
It seems clear that A will only division of risk: in the second proto-
agree to this digital signature protocol col B will be left holding the bag if
if he can provide very good physical A’s signing key is compromised. Clear-
The fact that altering the dispute messages signed after the reported loss
and the preceding two protocols have loss must involve the concept of time.
129
We introduce time into the following been dealt with fairly.
protocol by using time-keepers who can The major disadvantage of this pro-
digitally time-stamp information given tocol , as compared with the basic digi-
to them. We assume that both A and B tal signature protocol, is the require-
have agreed on a set of acceptable ment that B obtain both a time-stamp and
time-keepers whose time-stamps will be a validity-check, presumably in real
accepted in dispute resolution. time. These requirements force the use
If A can report that ‘A has been of a communications network, which both
lost, then he must report this fact to increases expense and decreases relia-
some agent who will be responsible for bility.
answering queries about the current If B is willing to obtain the
status of DA, i.e., has it been lost or time-stamp and the validity-check after
not. For simplicity, we shall assume the transaction has been completed,
this role is played by the central au- i.e., within a few days, an off-line
thority, CA. CA will sign messages system can be used. This modified pro-
stating that A-s secret deciphering key tocol could be used by B either as a
has not been compromised as of the fail-soft protocol during communications
current time. These signed messages outages, or as the standard protocol if
will be called “validity-checks. ” communication costs are too high.
In the time stamp protocol, user A Off-line operation is cheaper ahd
signs message m by computing DA(m) and more reliable, but it exposes B to some
sending it to B. B then has a time- risk: A might have recently reported
keeper time stamp the message and ob- the loss of and B would not know
‘A
tains a validity-check from CA. If DA about it. If physical security for
has aiready been reported lost B rejects secret deciphering keys is good, this
the signature, otherwise he accepts. risk should be minimal.
In dispute resolution, the judge
130
signed message m. The witness, w, would vious solution is for updates to be di-
compute DW(”I, W, physically saw A agree gitally signed by an appropriate network
to and sign message m.”) . It would be administrator, and for the nodes to
necessary for A and B to agree in ad- check the digital signature prior to ex-
vance on acceptable witnesses. ecuting them.
tocol is that it reduces B’s risk. The another application of digital signa-
primary disadvantage is that it forces A tures in operating system security. A
to find a (physically present) witness major risk to the security of an operat-
to confirm the transaction. ing system is the possibility that the
nodes over the network itself. The ob- is physically unable to execute unsigned
131
15. BIBLIOGRAPHY
code in privileged mode, then it is pos-
computer “right now have not been modi- 1. Diffie, W., and Hellman, M. New
fied since they were given there final directions in cryptography. IEEE Trans.
checkout and signed by the programmer. on Inform. IT-22, 6(Nov. 1976), 644-654.
mean that the operating system is 2. Evans A., Kantrowitz, W., and Weiss,
secure, but it does eliminate a major E. A user authentication system not re-
Bachelor’s thesis.
number of cryptographic protocols. Cer- 4. Liptonr S.M., and Matyas, S.M. Mak-
tainly, these are not the only ones pos- ing the digital signature legal--and
sible; however, they are valuable tools safeguarded. Data Communications (Feb.
Further constructive work in this theory. DSN Progress Report, JPL, (Jan.
formative conversations he had with Dov 7. Merkle, R., and Hellman, M. Hiding
man, Raynold Kahn Loren Kohnfelder, knapsacks. IEEE Trans. on Inform. IT-
132
16. Saltzer, J. On Digital Signatures,
8. Rivest, R.L., Shamir, A.t and Adle-
private communication.
man, L. A method for obtaining digital
IEEE Vol. 67, No. 3, Mar. 1979 pp. 397- Large Networks of Computers. CACM 21,12
155-166.
133
23. Ehrsam, W.F., Matyas, S.M., Meyer,
Intl. CSL - 98
Y1 ‘2 Y’3 Y4
FIG. I
134