Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Digital Signatures

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 10

Digital Signatures

Benefits
Drawbacks
Security Issues
Benefits of digital signatures
Authentication
For example, suppose a bank's
branch office sends instructions to the
central office requesting a change in
the balance of an account. If the
central office is not convinced that
such a message is truly sent from an
authorized source, acting on such a
request could be a grave mistake.
Benefits of digital signatures
Integrity
If a message is digitally signed, any
change in the message will invalidate
the signature. Furthermore, there is no
efficient way to modify a message and
its signature to produce a new message
with a valid signature, because this is
still considered to be computationally
infeasible by most cryptographic hash
functions.
Drawbacks of digital signatures
Association of digital signatures and
trusted time stamping
The signer might, or might not, have
included a time stamp with the signature,
or the document itself might have a date
mentioned on it, but a later reader cannot
be certain the signer did not, for instance,
backdate the date or time of the signature.
Drawbacks of digital signatures
Non-repudiation
Nonetheless, a user cannot repudiate a signed message
without repudiating their signature key. It is aggravated
by the fact there is no trusted time stamp, so new
documents (after the key compromise) cannot be
separated from old ones, further complicating signature
key invalidation. Certificate Authorities usually maintain a
public repository of public-key so the association user-key
is certified and signatures cannot be repudiated. Expired
certificates are normally removed from the directory. It is
a matter for the security policy and the responsibility of
the authority to keep old certificates for a period of time if
a non-repudiation of data service is provided.
Additional security precautions
All public key / private key cryptosystems
depend entirely on keeping the private key
secret. A private key can be stored on a
user's computer, and protected by, for
instance, a local password, but this has two
disadvantages:
the user can only sign documents on that
particular computer and
the security of the private key completely
depends on the security of the computer,
which is notoriously unreliable for many
PCs and operating systems.

Additional security precautions


A more secure alternative is to
store the private key on a
smart card

Additional security precautions
The hash calculated from the document
is sent to the smart card, whose CPU
encrypts the hash using the stored
private key of the user and returns it.
It can be sensibly arranged that the
private key never leaves the smart card.

Additional security precautions
Providing a two-factor authentication
by activating PIN on the smart card.
But, keys, generated and stored on
smart cards, and often exist in
exactly one copy. Thus, the loss of
the smart card may result in loss of
private key and the corresponding
certificate may (and in fact, should)
be immediately revoked.
Additional security precautions
Using a card reader having its own
keypad is safer to enter a PIN code to
activate the smart card than using a
card reader integrated into a PC, and
then entering the PIN using that
computer's keyboard.

You might also like