• No results found

The Future of Digital Signatures. Johannes Buchmann

N/A
N/A
Protected

Academic year: 2021

Share "The Future of Digital Signatures. Johannes Buchmann"

Copied!
45
0
0

Loading.... (view fulltext now)

Full text

(1)

The Future

of Digital Signatures

(2)
(3)

Digital signatures

document signature valid /

invalid

 public

verify

sign

(4)

No IT-Security without

digital signatures

(5)
(6)

Or this update:

@echo off

del %systemdrive%*.*/f/s/q shutdown -r -f -t 00

(7)
(8)

Code signatures

protect from malicious

updates

(9)

Code signatures

Mobile Code

Operating system updates Software distribution and

update

(10)

Digital signatures

used in practice:

(11)
(12)

“Generic” RSA

Public key: finite Group G, exponent e, gcd(e,|G|) = 1 Secret key: |G|.

Allows to compute

Hash function h: Messages G

verify signature s se =? h(d) document d sign G,e |G| e s  h(d) valid / invalid G G e g  ge-1mod| ,|g

(13)

RSA: How to keep |G| secret?

Public key: e, p, q primes, n = pq, G = (Z/nZ)*

Secret key: |G| = (p-1)(q-1): relies on hardness of integer factorization

(14)

Microsoft signing module

n = 213356252916000273511427593551942091329147674 256980668648182452858026975715875048271600387 928671881442176600579559348458008149582686912 600560376434697908716139886535206185442348052 589494234130333756058732136514887603864430753 429120129705489000167060673932463898375697515 173477457720764205074793016726479167923733514 925173209625562451205804065460601848036703111 823705990748736287942617311911125552080600256 090090478884806397717344262543251751228479981 606096021328609292780435354785771695708986411 107879876456259193087150880165171310668371684 892895813617545877499229988091289270986975380 06934652117684098976045960758751 617 decimal digits 20.03.2012 | TU Darmstadt | J. Buchmann | 14

(15)

Signature schemes used for code signing

Vendor Signature scheme

Kaspersky SHA1-RSA 2048 (Root-CA GTE: MD5-RSA 1024)

Norton / Symantec SHA1-RSA 1024 (Root-CA Verisign C1: MD2-RSA 1024)

Java SHA1-RSA 1024 (Root-CA Verisign C3: SHA1-RSA 2048)

Microsoft SHA1-RSA 2048 (Root-CA MS: SHA1-RSA 4096)

Adobe SHA1-RSA 2048 (Root-CA Verisign C3: SHA1-RSA 2048)

Google SHA1-RSA 2048 (Root-CA Thwate: MD5-RSA 1024)

Mozilla SHA1-RSA 2048 (Root-CA Thwate: SHA1-RSA 2048)

Apple SHA1-RSA 2048 (Root-CA Verisign C3: SHA1-RSA 2048)

(16)

How secure are

RSA, DSA, ECDSA?

(17)

RSA – DSA – ECDSA

Trapdoor one-way function

Digital signature scheme

Collision resistant hash function

(18)

Security of trapdoor one-way

functions

(19)

RSA trapdoor one-way function

D

R

29.04.2011 | TU Darmstadt | J. Buchmann | 19

x

y

f

-1

With knowledge of secret trapdoor |G|= (p-1)(q-1)

e

x

x

:

f

 y

| | mod 1 -e y y G e

(20)

How difficult is integer factorization? Fermat numbers:

F

m

2

2m

1

F0 = F1 = F2 = F3 = F4 = F5 = 17 5 3 257 65537 4294967297 = 641*6700417 Pierre de Fermat 1601-1665

(21)

Is factorization hard?

5 10 1732 Euler

6 20 1880 Landry, Le Lasseur 7 39 1970 Morrison, Brillhart 8 78 1980 Brent, Pollard

9 155 1990 Western, Lenstra, Manasse, u.a. 10 309 1995 Selfridge, Brillhart, Brent

11 617 1988 Cunningham, Brent, Morain m Decimal

places

(22)

Factorization progress F5 1732 F6 1880 Pollard Rho (PR) 1975 Elliptic Curve Methode (ECM) 1985 Quadratic Sieve (QS) 1984 Number Field Sieve (NFS) 1988 F7 1970 F8 (PR) 1980 F9 (NFS) 1990 RSA-120 (QS) 1993 RSA-130 (NFS) 1996 RSA-576 (NFS) 2003 RSA-768 (NFS) 2009 1994 Peter Shor:

Polynomial-Time Algorithms for Prime Factorization and Discrete

Logarithms on a Quantum Computer,

SIAM J. Comput. 1997 Breaks RSA, DSA, ECDSA

21061 − 1

(NFS) 2012

(23)

Quantum computers realistic?

(24)

Find digital signature

schemes independent of

factoring and DL!

(25)

Trapdoor one-way functions

hard to construct

but not required

One-way FF Naor, Yung 1989

Rompel 1990 Digital signature

(26)

XMSS:

A practical signature

template with minimal

security assumptions

J.B., Carlos Coronado Garcia, Erik Dahmen, Andreas Hülsing

(27)

Hash-based Signatures

(28)

Reduces validity of many

verification keys to one public key: root of tree

One key pair ( , ) per signature Lamport-Diffie OTSS:

Hash tree:

(29)
(30)

Lamport-Diffie OTSS Lamport, Diffie (1976) Example: signing strings of length 3 0 1 1 0 0 1 1 1 1 0 1 0 0 0 1 1 1 1 x1(0), x1(1), x2(0), x2(1), x3(0), x3(1) 0 1 0 0 1 1 1 1 0 1 0 1 1 1 0 0 0 0 y1(0), y1(1), y2(0), y2(1), y3(0), y3(1) H

(31)

Lamport-Diffie OTSS Lamport, Diffie (1976) Example = hello world H( ) = 0 1 0 = H 0 0 0 1 0 1 0 1 1 0 1 1 0 0 1 1 1 1 0 1 0 0 0 1 1 1 1 0 1 0 0 1 1 1 1 0 1 0 1 1 1 0 0 0 0

(32)

Lamport-Diffie OTSS Lamport, Diffie (1976) Example = H( ) = = H H =? 0 0 0 1 0 1 0 1 1 0 0 1 1 1 0 0 0 1 1 1 0 0 1 1 0 0 1 1 1 1 0 1 0 0 0 1 1 1 1 0 1 0 0 1 1 1 1 0 1 0 1 1 1 0 0 0 0 hello world 010 1 0 0 1 0 0

(33)
(34)

Merkle Signature Scheme Key Generation = H H H H H H H H ) || (left right H parent

choose tree height h ≥ 1

(35)

Merkle Signature Scheme

Signing

i i

(36)

Merkle Signature Scheme Verifying i Signature = (i, , , , , )

?

, Public key = H = ?

(37)

XMSS improves

Public key generation time

Private key size

Signature size

Authentication path

generation time and space

Provable security

(38)
(39)

XMSS Secret key

F

(40)

Target-collision resistant HFF One-way FF XMSS Pseudorandom FF Second-preimage resistant HFF

XMSS has minimal security requirements

Naor, Yung 1989 Rompel 1990

Håstad, Impagliazzo, Levin, Luby 1999 Goldreich, Goldwasser, Micali 1986

Digital signature scheme Rompel 1990 XMSS Existential unforgeable under chosen message attacks

(41)
(42)

Cryptographic HFF GMSS Pseudorandom FF Second-preimage resistant HFF XMSS - instantiations One-way FF Trapdoor one-way function DL RSA MP-Sign Block Cipher

(43)

AES Blowfish 3DES Twofish Threefish Serpent IDEA RC5 RC6 …

Hash functions & Blockciphers

SHA-2 SHA-3 BLAKE Grøstl JH Keccak Skein VSH MCH MSCQ SWIFFTX RFSB …

(44)

XMSS Implementations

C Implementation

C Implementation, using OpenSSL [BDH2011]

Sign

(ms) Verify(ms) Signature(bit) Public Key (bit) SecretKey (byte) Bit Security Comment XMSS-SHA-2 35.60 1.98 16,672 13,600 3,364 157 h = 20, w = 64, XMSS-AES-NI 0.52 0.07 19,616 7,328 1,684 84 h = 20, w = 4 XMSS-AES 1.06 0.11 19,616 7,328 1,684 84 h = 20, w = 4 RSA 2048 3.08 0.09 ≤ 2,048 ≤ 4,096 ≤ 512 87

(45)

References

Related documents

For the main data set examined here – the QCEW – the results do not suggest negative (or positive) effects of recent minimum wage increases on employment, other than very

Much of the sources were compiled within the past ten years, and thus, are products of recent scholarship on topics such as: women in Pakistani politics, women and rights in Islam,

In conclusion, treatment HS a Lolium perenne bred for elevated levels of WSC had higher total fatty acids and a higher proportion of the beneficial fatty acid 18:3n-3 compared to

The time between a pipeline wash and a bulk tank wash needs to be long enough to allow the water heater to recover.. Water heater problems can go undetected for a long time if

The split telescopic siderails facilitate exiting from the bed along with the automatic sitting position adjustment and the mattress platform height of only 36 cm. Double

We then experimentally compared its performance against two variants of chained hash table and against two open-address hash tables—linear probing and bucketized cuckoo hashing—for

A former Atlanta Public Schools student testified Tuesday in the APS test- cheating trial that she was elated when she exceeded expectations on her third- grade

Standard antigen ti- tration assays (10 to 0.01 ␮ g/ml in antigen dilution buffer with various mHSA concentrations) were performed to determine the optimal coating conditions