UNIT IV Digital Signatures and Authentication Protocols
UNIT IV Digital Signatures and Authentication Protocols
Authentication Protocols
• Digital Signatures
– Requirements
– Direct Digital Signature
– Arbitrated Digital Signature
• Authentication Protocols
– Mutual Authentication
– One-Way Authentication
• Digital Signature Standard
– The DSS Approach
– The Digital Signature Algorithm
Key Points
• A digital signature is an authentication mechanism that
enables the creator of a message to attach a code that acts as
a signature.
• The signature is formed by taking the hash of the message
and encrypting the message with the creator's private key.
• The signature guarantees the source and integrity of the
message.
• Mutual authentication protocols enable communicating
parties to satisfy themselves mutually about each other's
identity and to exchange session keys.
• In one-way authentication, the recipient wants some
assurance that a message is from the alleged sender.
• The digital signature standard (DSS) is an NIST standard that
uses the secure hash algorithm (SHA).
Digital Signatures - Requirements
• If the arbiter does live up to this trust, then X is assured that no one can
forge his signature and Y is assured that X cannot disavow his signature.
Arbitrated Digital Signature Techniques
• Table ( b) shows a scenario that provides the arbitration as before but also
assures confidentiality.
• In this case it is assumed that X and Y share the secret key Kxy.
• Now, X transmits an identifier, a copy of the message encrypted with Kxy,
and a signature to A.
• The signature consists of the identifier plus the hash value of the
encrypted message, all encrypted using Kxa.
• As before, A decrypts the signature and checks the hash value to validate
the message. In this case, A is working only with the encrypted version of
the message and is prevented from reading it. A then transmits everything
that it received from X, plus a timestamp, all encrypted with Kay, to Y.
• Although unable to read the message, the arbiter is still in a position to
prevent fraud on the part of either X or Y.
Arbitrated Digital Signature Techniques
• All the problems just discussed can be resolved by going to a public-key
scheme, one version of which is shown in Table ( c )
• In this case, X double encrypts a message M first with X's private key, PRx
and
• then with Y's public key, PUy. This is a signed, secret version of the
message.
• This signed message, together with X's identifier, is encrypted again with
PRx and, together with IDX, is sent to A. The inner, double-encrypted
message is secure from the arbiter (and everyone else except Y).
However, A can decrypt the outer encryption to assure that the message
must have come from X (because only X has
• PRx). A checks to make sure that X's private/public key pair is still valid
and, if so, verifies the message.
• Then A transmits a message to Y, encrypted with PRa. The message
includes IDX, the double-encrypted message, and a timestamp.
Arbitrated Digital Signature Techniques
• It can be argued that the timestamp approach should not be used for
connection oriented applications because of the inherent difficulties with
this technique.
• First, some sort of protocol is needed to maintain synchronization among
the various processor clocks.
• This protocol must be both fault tolerant, to cope with network errors,
and secure, to cope with hostile attacks.
• Second, the opportunity for a successful attack will arise if there is a
temporary loss of synchronization resulting from a fault in the clock
mechanism of one of the parties.
• Finally, because of the variable and unpredictable nature of network
delays, distributed clocks cannot be expected to maintain precise
synchronization. Therefore, any timestamp-based procedure must allow
for a window of time sufficiently large to accommodate network delays
yet sufficiently small to minimize the opportunity for attack.
Authentication Protocols - Mutual Authentication
•T is a timestamp that assures A and B that the session key has only just been
generated. Thus, both A and B know that the key distribution is a fresh exchange.
• A and B can verify timeliness by checking that |Clock T| < ∆t1 + ∆t2 where ∆t1 is
the estimated normal discrepancy between the KDC's clock and the local clock (at
A or B) and ∆t2 is the expected network delay time.
•Timestamp T is encrypted using the secure master keys, an opponent, even with
knowledge of an old session key, cannot succeed because a replay of step 3 will be
detected by B as untimely
Symmetric Encryption Approaches
• The Denning protocol provide an increased degree of security
compared to the Needham/ Schroeder protocol.
• requires reliance on clocks that are synchronized throughout
the network.
• The risk is based on the fact that the distributed clocks can
become unsynchronized as a result of sabotage on or faults in
the clocks or the synchronization mechanism.
• The problem occurs when a sender's clock is ahead of the
intended recipient's clock. In this case, an opponent can
intercept a message from the sender and replay it later when
the timestamp in the message becomes current at the
recipient's site. This replay could cause unexpected results.
Gong refers to such attacks as suppress-replay attacks
Symmetric Encryption Approaches
• One way to counter suppress-replay attacks is to
enforce the requirement that parties regularly check
their clocks against the KDC's clock.
• The other alternative, which avoids the need for clock
synchronization, is to rely on handshaking protocols
using nonces.
• This latter alternative is not vulnerable to a suppress-
replay attack because the nonces the recipient will
choose in the future are unpredictable to the sender.
Symmetric Encryption Approaches
Public-Key Encryption Approaches
• A protocol using timestamps is provided in
1. A AS: IDA||IDB
2. AS A: E(PRas, [IDA||PUa||T])||E(PRas, [IDB||
PUb||T])
3. A B: E(PRas, [IDA||PUa||T])||E(PRas, [IDB||
PUb||T]) ||E(PUb, E(PRa, [Ks||T]))
• This protocol is compact but, as before,
requires synchronization of clocks
Public-Key Encryption Approaches
• Another approach, proposed by Woo and Lam makes use of
nonces. The protocol consists of the following steps:
1. A →KDC: IDA||IDB
2. KDC A: E(PRauth, [IDB||PUb])
3. A B: E(PUb, [Na||IDA])
4. B KDC: IDA||IDB||E(PUauth, Na)
5. KDC B: E(PRauth, [IDA||PUa])||E(PUb, E(PRauth, [Na||
Ks||IDB]))
6. B A: E(PUa, E(PRauth, [(Na||Ks||IDB)||Nb]))
7. A B: E(Ks, Nb)