Unit 5 - Part 1
Unit 5 - Part 1
Unit 5 - Part 1
• Inclusion
• A conventional signature is included in the document; it is part of the
document.
• When we write a check, the signature is on the check; it is not a
separate document.
• But when we sign a document digitally, we send the signature as a
separate document.
– The sender sends two documents: the message and the signature. The recipient
receives both documents and verifies that the signature belongs to the supposed
sender. If this is proven, the message is kept; otherwise, it is rejected.
Conventional Signatures and Digital Signatures
• Verification Method
• For a conventional signature, when the recipient receives a document,
she compares the signature on the document with the signature on file.
If they are the same, the document is authentic.
– The recipient needs to have a copy of this signature on file for comparison.
• For a digital signature, the recipient receives the message and the
signature. A copy of the signature is not stored anywhere.
– The recipient needs to apply a verification technique to the combination of the
message and the signature to verify the authenticity.
Conventional Signatures and Digital Signatures
• Relationship
• For a conventional signature, there is normally a one-to-many
relationship between a signature and documents.
– A person uses the same signature to sign many documents.
• For a digital signature, there is a one-to-one relationship between a
signature and a message. Each message has its own signature.
– The signature of one message cannot be used in another message.
• If Bob receives two messages, one after another, from Alice, he cannot
use the signature of the first message to verify the second. Each
message needs a new signature.
Conventional Signatures and Digital Signatures
• Duplicity
• In conventional signature, a copy of the signed document can be
distinguished from the original one on file.
• In digital signature, there is no such distinction unless there is a factor of
time (such as a timestamp) on the document.
– For example, suppose Alice sends a document instructing Bob to pay Eve. If Eve
intercepts the document and the signature, she can replay it later to get money
again from Bob.
Process
First, a secret key is known by only two entities (Alice and Bob, for example). So if
Alice needs to sign another document and send it to Ted, she needs to use another
secret key.
Second, as we will see, creating a secret key for a session involves authentication,
which uses a digital signature.
Third, Bob could use the secret key between himself and Alice, sign a document,
send it to Ted, and pretend that it came from Alice.
Note
• attacks
– key-only attack
– known message attack
– generic chosen message attack
– directed chosen message attack
– adaptive chosen message attack
• break success levels
– total break
– selective forgery
– existential forgery
Digital Signature Requirements
• have discussed:
– digital signatures
– ElGamal & Schnorr signature schemes
– digital signature algorithm and standard