CS 526 Information Security : Assignment 5

نویسنده

  • John Ross Wallrabenstein
چکیده

Before we address the question of which properties the proposed signature schemes lack, we enumerate desirable properties of any digital signature system: 1. Authenticity: A digital signature should be authentic, in that the signature will convince the recipient that the claimed author deliberately signed the document. It should be computationally infeasible for a third party to forge the author's signature. 2. Integrity: A digital signature on a document should verify as correct if and only if the document signed has not been altered after the signature was applied. 3. Unique: A digital signature on a document should be unique, in that the signature is only valid for the signed document and cannot be transferred to a different document. 4. Nonrepudiation: A digital signature on a document cannot be repudiated by the signer. That is, a digital signature of a document should have non-trivial legal value. It must be difficult to prove beyond a reasonable doubt that the signature was produced by a party other than the signer in a court of law. 5. Efficiency: A digital signature should be efficiently computable. That is, producing signatures for large documents should be minimally computationally expensive. 6. Compact Representation: A digital signature should have a compact fixed representation , independent of the length of the document signed. 7. Offline Verification: A digital signature should be verifiable without requiring interaction with the signer. That is, given a signed document, the recipient can verify the signature without communication with the signer. Goldwasser et. al. defined the fundamental notions of digital signature scheme security [4]. Foreword: The issue of Public Key Infrastructure (PKI) is non-trivial, and well beyond the scope of this assignment. Therefore, we assume that no certificate authorities were involved in any of the protocols. Thus, both the problem's signature formulation, as well as the proposed modifications, are vulnerable to a Man-In-The-Middle or Bucket Brigade attack by an adversary. 1. Offline Verification: The use of a public key system in the problem allows signatures to be verified while the signer is offline. That is, the recipient can obtain the signer's public key from any public key server to de-crypt the message digest to verify the document signature. The proposed modification requires that the signer participate in the verification protocol by decrypting the received signature and returning the result

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CS 526 Information Security : Assignment 7

We begin by addressing methods for evaluating Xinu with respect to the User Data Protection requirements of the Common Criteria documents. Secondly, we address the constraints necessary to secure an EAL6 certification. We are given that the Xinu operating system has already satisfied the requirements for an EAL5 approval, we only address the additional constraints that must be satisfied to obta...

متن کامل

Pharmacological profile of novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methyl cyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526).

The pharmacological profiles of the novel acid pump antagonist 7-(4-fluorobenzyloxy)-2,3-dimethyl-1-{[(1S,2S)-2-methylcyclopropyl]methyl}-1H-pyrrolo[2,3-d]pyridazine (CS-526) were investigated in terms of hog gastric H+,K+-ATPase activity, gastric acid secretion, and acute gastroesophageal lesions in comparison with other proton pump inhibitors (PPIs). CS-526 inhibited H+,K+-ATPase activity in ...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance

Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...

متن کامل

Community Structures Are Definable in Networks: A Structural Theory of Networks

X iv :1 31 0. 80 38 v2 [ cs .S I] 1 5 N ov 2 01 3 Community Structures Are Definable in Networks: A Structural Theory of Networks ∗ Angsheng Li, Yicheng Pan, Jiankou Li 1State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences 2University of Chinese Academy of Sciences, P. R. China 3State Key Laboratory of Information Security Institute of Information Engineer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010