9.digital Signatures Complete
9.digital Signatures Complete
course of…
1adh84naf89hq32nvsd8
puwqhevhphvdfp9ufew7u
2rasdfohaqsedhfdasjf;
Paper Electronic
Signature is a part of Signature is not a part of
physical document physical document. The
algorithm “bind” the
signature to the message.
V/s
Compare it to other authentic Verification algorithm
signatures
Note
Attack Types
Forgery Types
Attack Types
Key-Only Attack
Known-Message Attack
the attacker is given valid signatures for a variety of messages
known by the attacker but not chosen by the attacker.
Chosen-Message Attack
the attacker first learns signatures on arbitrary messages of the
attacker's choice.
Forgery Types
Existential Forgery
Selective Forgery
29
Continued
Example
1. P=11,Q=13, N=143, and (143)=120.
2. e=103, then d=7 (for 103×7 mod 120=1 ).
3. Sign for M=3: S=37 mod 143=42.
4. Verification: M= Se mod N = 42103 mod 143=3.
31
Continued
35
Continued
Key Generation
The key generation procedure here is exactly the same as
the one used in the cryptosystem.
Design of ElGamal digital siganture system: choose: prime p, integers
1 e1 d p, e1 be a primitive element of Zp*;
Compute: e2 = e1 d mod p
Sign Function:
39
ELGAMAL SIGNATURES
Example choose: p = 11, q = 2, x = 8
compute: y = 28 mod 11 = 3
Signing of w = 5,
signature: (6, 3)
Digital signatures 41
1. First suppose Eve tries to forge signature for a new message w , without knowing x.
•If Eve first chooses a value a and tries to find the corresponding b, it has to compute the discrete
logarithm
lg q w y -a,
a
• If Eve first chooses b and then tries to find a, she has to solve the equation
y a a b q xa q rb q w (mod p).
It is not known whether this equation can be solved for a efficiently.
2. If Eve chooses a and b and tries to determine w, then she has to compute discrete logarithm
lg q y a a b.
Hence, Eve can not sign a “random” message this way.
FORGING AND MISUSING OF ELGAMAL SIGNATURES
There are ways how to produce, using ElGamal signature scheme, validforged signatures, but
they do not allow an opponent to forge signatures on messages of his/her choice.
For example, if 0 Ł i, j Ł p -2 and gcd(j, p -1) = 1, then for
the pair
There are several ways ElGamal signatures can be broken if they are used not carefully enough.
For example, the random r used in the signature should be kept secret. Otherwise the system can
be broken and signatures forged. Indeed, if r is known, then x can be computed by
x = (w - rb) a -1 mod (p -1)