Signcryption
Signcryption
A Presentation by :
Arunjith. B
R7A-13
SNGCE
On : 25/08/2009
Out Line
1. INTRODUCTION
1. 1) Why Signcryption
Two Schemes :
Digital Signature
Public Key encryption
Why Signcryption?
Based on discrete algorithm problem
I’m s e n d in g a m e s s a g e to y o u
A lic e Bob
Parameters for Signcryption
Parameters public p – a large prime number
to all q – a large prime factor of p-1
g – an integer with order q modulo p chosen
randomly from [1,…,p-1]
Hash – a one-way hash function whose
output has, say, at least 128 bits
KH – a keyed one-way hash function
(E, D) – the encryption and decryption
algorithms of a private key cipher
Alice’s keys xa – Alice’s private key, chosen uniformly at
random from [1,…,q-1]
ya – Alice’s public key (ya = gxa mod p)
Bob’s keys xb – Bob’s private key, chosen uniformly at
random from [1,…,q-1]
yb – Bob’s public key (yb = gxb mod p)
x a number chosen uniformly at random from
the range 1,…,q-1
Signcryption – How It Works
Steps to Signcrypt Messages
A lic e
chooses a value x from the large range 1,…,q-1
uses Bob’s public key and the value x, and computes the
hash of it It gives her a 128 bit string
6 4 -b it
Signcryption – How It Works
Steps to Signcrypt Messages ...(Continued)
A lic e
6 4 -b it 6 4 -b it
E c K H r
M essage M essage
Signcryption – How It Works
Steps to Signcrypt Messages(Continued)
A l i c e computes the value of s - like in SDSS
She does this using:
• the value of x
• her private key xa
• the value of r
s = x/ (r + xa) mod q
r + x m o d q
a
R e s u lt
x / R e s u lt s
x
Signcryption – How It Works
Steps to Signcrypt Messages(Continued)
A lic e
Now Alice has three different values (c, r and s)
She has to send these three values to Bob to complete the
transaction
She can do this in a couple of ways:
• send them all at one time
• send them separately using secure transmission
channels, which would increase security
s e n d (c , r , s ) g e t (c , r , s )
A lic e Bob
Signcryption – How It Works
Steps to Unsigncrypt Messages
Bob
r s
p
k
H ASH
1 2 8 -b i t
g
xb ya
Signcryption – How It Works
Steps to Unsigncrypt Messages(Continued)
B ob
This 128-bit hash result is split into two 64-bit halves
(k1,k2) (key pair)
This key pair would be identical to the key pair that was
generated while signcrypting the message
Bob uses the key k1 to decrypt the cipher text c, which
will give him the message m
m = Dk1(c)
c
k 1
M essage
k D
6 4 -b it
k 2
1 2 8 -b it
6 4 -b it
Signcryption – How It Works
Steps to Unsigncrypt Messages(Continued)
Bob
Bob does a one-way keyed hash function (KH) on m using
the key k2 and compares the result with the value r he has
received from Alice
If match the message m was signed and sent by Alice
If not match the message wasn't signed by Alice or was
intercepted and modified by an intruder
Bob accepts the message m if and only if KHk2(m) = r
c
k 1
M essage
k D
6 4 -b it
k2
1 2 8 -b it = r?
K H R e s u lt
6 4 -b it
Features of Digital Signcryption
Unique Unsigncryptability
• message m of arbitrary length is Signcrypted using
Signcryption algorithm
Efficiency
Computation involved when applying the Signcryption,
Unsigncryption algorithms and communication overhead is
much smaller than signature-then-encryption schemes
Signcryption Security
Unforgeability:
• Bob is in the best position to be able to forge any Signcrypted
message from Alice!
Confidentiality:
• An attacker has all three components of the Signcrypted
message: c, r and s!
Higher Security
S h a re T ra d e r
Tow er S h a re T ra d e r
B a n k S e rv e r
S h a re T ra d e r
Disadvantages of Signcryption
A p p lic a tio n
S e rv e r Tow er
E -C o m m e rc e S e rv e r
Conclusion…
Two birds in one stone
http://www.sis.uncc.edu/~yzheng/papers/
¨
http://www.cs.bham.ac.uk/~mdr/teaching/modules04/securi
ty/students/ss3/introduction%20to%20signcryption.htm
http://www.bambooweb.com/articles