Table of Contents
CSE 589 -- Lecture 9
Plan for Today
PPT Slide
Digital Signatures
Signing Documents with RSA
Forgery
Once again, using RSA...
Digital Signatures + Encryptionproof of authorship + privacy
PPT Slide
Problems with signature schemes:
A solution: One-way hash functions.
Signatures and One-way Hash Functions
Issues and Attacks
PPT Slide
Classic Secret Key ExchangeDiffie-Hellman
Security Against Eve
Security Against MalloryMan-in-the-Middle Attack
Approach typically taken
Diffie-Hellman with AuthenticationA and B agree on large prime p and g < p primitive mod p.
Authenticated Key ExchangePrivate-Key Setting
Kerberos A key(T,A) B key(T,B) t timestamp K session key L lifetime
What’s going on?
Replay Attacks
Authenticated Key Exchange--Public-Key Setting
PPT Slide
So far
MAC
Some Applications of MACs
Constructing a MAC
PPT Slide
Secure Socket Layer (SSL)used by Navigator/Explorer...
SSL (Step 1)
SSL Step 2
SSL Step 3
SSL Step 4
SSL Step 5
PPT Slide
Secret Splitting
Simplest secret splitting schemeT splits a secret between A and B
Secret Sharing
Shamir -- Interpolating Poly Scheme
Example: M= 11(3,5) threshold scheme
The beauty of it
PPT Slide
Digital Cash
First Try
Withdrawal Protocol
Payment Protocol
Deposit Protocol
Analysis
Solving anonymity problem
RSA blind signatures
Result
How to avoid fooling bank
How to avoid double-spending.
Off-line solution
Withdrawal Protocol
Payment Protocol
Deposit Protocol
PPT Slide
Bit Commitment
Bit Commitment Using Symmetric Crypto
Bit Commitment Using One-Way Functions
Mental Poker
Alice who can’t read it, decrypts with her private key and sends it back to Bob
Why does it work?
For A and B to play poker by email.
PPT Slide
Zero-knowledge Proofs
Zero-knowledge Proofs
Graph Isomorphism
Interactive Proof of Graph Isomorphism
Application to User Identification
PPT Slide
Electronic Elections
Other Amazing and Fun Stuff
PPT Slide
Pseudo-random number generators.
What is a random number?
Pseudo-random number generators.
Linear Congruential Generator
Linear Congruential Generators
Linear congruential generator have good statistical behavior with respect to most reasonable empirical tests.
Linear Feedback Shift Registers
To be a maximal-period LFSR
Properties of LFSRs
Insecurity of LFSR
Last but not least, the Blum,Blum Shub. First, background.
More background
Last bit
Quadratic Residues Problem
Blum-Blum-Shub Generator
Security of BBS generator
Summary: Security Risks of Internet Communication
Summary
|