数字签名与消息认证

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

座 3. Part Three Digital Signature and
Certification
Authority
4. Part Four Legal Responsibility
5. Part Six Supplementary Articles
Digital Signature Law is an
the validity of his signature
Requirements
信 息 安
• The signature depends on the signer and the document to be signed.
• Easy to compute: it is easy for a signer to sign a document
Infrastructure of E-COM




Supply Chain
讲 Online Payment

Trading Platform
Credit System
Information Exchange Platform
Digital Signature Law is Infrastructure


二、基本签名算法




Fundamental schemes

息 安
– Signature schemes based on errorcorrecting codes
全 讲
– Signature schemes based on two hard problems

– Signature schemes based on elliptic curves
安 全
• Security requirements

– Unforgeability: one cannot create a

signature that is claimed to be another’s
– Undeniability: the signer cannot later deny

• Forgery tye

Leabharlann Baidu
– Existential forgery
– Selective forgery
The Model of Digital Signature
信 息 安 Signer’s 全 secret key 讲 座
Message
Sign Function
Verification Function
Signer’s public key
Signature Message
Message
Check Message=?Message
Digital signature: usage
信 • Off-line: Signing a document for emulating

the hand-written signature
What security service can digital
signature provide?



• Data Integrity

• Authentication

• Non-forgeability

• Non-repudiation
签名的一个重要应用 第三方信任的模型


证书认证中心(CA)

• Universal verifiability: every one can verify

validity of a signature (with respect to the

signer and the document)
• Easy to store: the signature should be short
讨论议题 ——数字签名

➢数字签名的概念

安 全
➢基本签名算法


➢特殊签名算法
➢研究动向


一、数字签名的概念




Digital signature
信 • Goal: Use the digital technique to
息 emulate the “hand-written signature”
China Digital Signature Law have become effective


April 1 2005 China Digital Signature Law has become effective

全 1. Part One Overview
讲 2. Part Two Electronic Data




Fig. 信任的层次结构

公正的被信任者


经认定可以

被信任的中

间角色

A
B
用户群
结论

网络空间的信任建立问题是信息安全讨

论的核心问题,网络空间的信任建立

方法很大程度上借鉴了传统生活中建
全 讲 座
立信任的方法。正如手写签名在传统 生活中的重要作用一样,数字签名是 网络空间中建立信任的一块基石。
安 • On-line: identity authentication (+session key

distribution)

challenge c

Alice
r=Sig(KRBob, c)
Bob
If Ver(KUBob, r, c)=true then accept that “Bob is talking to me”
Algorithm foundation

Two Famous Digital Signature Schemes

1. RSA Digital signature scheme (based on the

factorization problem)

2. ElGamal digital signature and Meta-ElGamal

signature schemes (based on the discrete logarithm)

Some popular algorithms
enough
Attacks on digital signature

• Attack type

– Key-only attack (ciphertext-only)

– Known-message attack (known-plaintext)

– Chosen-message attack (chosen-plaintext)
相关文档
最新文档