中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Digital Signature
Digital signature 曹天杰 Tianjie Cao ticao@cumt.edu.cn College of Computer Science and Technology, China University of Mining and Technology, Xuzhou China 中国矿业大学计算机科学与技术学院 2003.6.6
1 Digital Signature 曹天杰 Tianjie Cao tjcao@cumt.edu.cn College of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China 中国矿业大学计算机科学与技术学院 2003.6.6
Definitions Definitions Digital Signature-a data string which associates a message with some originating entity Digital Signature Generation Algorithm -a method for producing a digital signature Digital signature verification algorithm-a method for verifying that a digital signature is authentic (i. e, was indeed created by the specified entity Digital Signature Scheme-consists of a signature generation algorithm and an associated verification algorithm
2 Definitions • Definitions – Digital Signature - a data string which associates a message with some originating entity – Digital Signature Generation Algorithm – a method for producing a digital signature – Digital signature verification algorithm - a method for verifying that a digital signature is authentic (i.e., was indeed created by the specified entity). – Digital Signature Scheme - consists of a signature generation algorithm and an associated verification algorithm
Applications Digital Signatures can provide authentication Data Integrity Non-Repudiation One application Certification of public keys in large networks
3 Applications Digital Signatures can provide • Authentication • Data Integrity • Non-Repudiation One Application • Certification of public keys in large networks
Classification Digital signature schemes with appendix require the original message as input to the verification algorithm Digital signature schemes with message recovery do not require the original message as input to the verification algorithm. In this case, the original message is recovered from the signature itself
4 Classification • Digital signature schemes with appendix require the original message as input to the verification algorithm. • Digital signature schemes with message recovery do not require the original message as input to the verification algorithm. In this case, the original message is recovered from the signature itself
Classification(cont) Taxonomy of digital signatures randomized message recovery deterministic signature schemes randomized appendix deterministic
5 Classification (cont) • Taxonomy of digital signatures signature schemes message recovery appendix deterministic randomized randomized deterministic
Types of Signatures Direct digital signature involves only the communicating parties assumed that receiver knows public key of sender v Signature may be formed by(1)encrypting entire message with sender's private key or(2) encrypting hash code of message with sender's private key v Further encryption of entire message signature with receiver's public key or shared private key ensures confidentiality
6 Types of Signatures • Direct digital signature – involves only the communicating parties ✓Assumed that receiver knows public key of sender. ✓Signature may be formed by (1) encrypting entire message with sender’s private key or (2) encrypting hash code of message with sender’ s private key. ✓Further encryption of entire message + signature with receiver’s public key or shared private key ensures confidentiality
Types of Signatures Problems with direct signatures v Validity of scheme depends on the security of the sender's private key sender may later deny sending a certain message v Private key may actually be stolen from X at time T, so timestamp may not help
7 Types of Signatures • Problems with direct signatures: ✓Validity of scheme depends on the security of the sender’s private key sender may later deny sending a certain message. ✓Private key may actually be stolen from X at time T, so timestamp may not help
Types of signatures Arbitrated digital signature involves a trusted third party or arbiter v Every signed message from sender, X,to receiver. Y, goes to an arbiter. A, first v A subjects message t signature to number of tests to check origin content v a dates the message and sends it to y with indication that it has been verified to its satisfaction
8 Types of Signatures • Arbitrated digital signature – involves a trusted third party or arbiter ✓Every signed message from sender, X, to receiver, Y, goes to an arbiter, A, first. ✓A subjects message + signature to number of tests to check origin & content ✓A dates the message and sends it to Y with indication that it has been verified to its satisfaction
Arbitrated digital signatures Requires an unconditionally ttp as part of the signature generation and signature verification Each entity shares a symmetric key with the tTP Symmetric key cryptography results in a very fast algorithm However, this speedup is overshadowed by the TtP as well as communication overhead
9 Arbitrated Digital Signatures • Requires an unconditionally TTP as part of the signature generation and signature verification. • Each entity shares a symmetric key with the TTP • Symmetric key cryptography results in a very fast algorithm • However, this speedup is overshadowed by the TTP as well as communication overhead
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)CRYPTO12.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-L&D.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-DES.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Block ciphers-AES.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Introduction(主讲:曹天杰).ppt
- 《软件工程》课程学习资料:软件工程思想(林锐).pdf
- 《C++语言基础教程》课程电子教案(PPT教学课件)第6章 类和对象(二).ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第5章 类和对象(一).ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第4章 函数和作用域.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第3章 语句.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第2章 数据类型和表达式.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第1章 C++语言概述.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第9章 C++的I/O流类库.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第8章 多态性和虚函数.ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)第7章 继承性和派生类.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第一章 绘图基础知识(刘军安).ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第五章 线型、颜色及图层.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第八章 标注文字.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第十章 使用块、外部参照和设计中心.ppt
- 湖南工程学院:《中文版AutoCAD 2004基础教程》课程教学资源(PPT课件讲稿)第十一章 绘制基本三维对象.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)HashFunctions.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Lecture 3 Number Theory Basics I.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)NTHEORY 2 Group Theory and Number.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Attacks, Services, and Mechanisms.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)overview.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Public Key Cryptography1.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)Public Key Cryptography2.ppt
- 中国矿业大学:《密码学》课程教学资源(PPT讲稿)认证协议(Authentication Protocol)security protocols.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)前言.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第1章 操作系统概论.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第2章 Linux概述.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Linux程序设计简介.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)(英文版)Linux Development Environment.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)Linux核心体系结构简介.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第3章 进程管理.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第4章 Linux进程管理.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第4章 存储管理.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第6章 Linux存储管理.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第七章 文件管理.ppt
- 《操作系统原理》课程教学资源(PPT课件讲稿)第八章 Linux文件管理.ppt