PKCS PDF
PKCS PDF
standards)
• Encryption provides
– confidentiality, can provide authentication and
integrity protection
• Checksums/hash algorithms provide
– integrity protection, can provide authentication
• Digital signatures provide
– authentication, integrity protection, and non-
repudiation
Códigos y Criptografía Francisco Rodríguez Henríquez
Keys
• Symetric Keys
– Both parties share the same secret key
– A major problem is securely distributing the
key
– DES - 56 bit key considered unsafe for
financial purposes since 1998
– 3 DES uses three DES keys
Machine A Machine B
I am A, R1
I am A,
T R1
B
R2, KAB{R1}
I am A, R2
T B
R3, KAB{R2}
An easy way is to pad M with random integer R like M||R, but no security proof!
Decryption oracle
ciphertext C
d
Information based on C,d
An attack example:
(0) We assume the decryption oracle computes Ad mod n for a request.
(1) Attacker computes A = ReC mod n for a random R in Zn, and sends A to
the decryption oracle.
(2) Decryption oracle computes B = Ad mod n and send B back to the
attacker.
(3) The attacker computes B/R = M mod n and get the message M.
There are several models, which are secure
against the chosen ciphertext attack
M = Cd mod n n
dq = d mod (q-1)
Mq =Cdq mod q
dp = d mod (p-1)
Mp = Cdp mod p v = (Mq – Mp) p-1 mod q,
p q
M = Mp + pv mod n.
n
In the RSA using the CRT, if an attacker can break the computation
of v (as v=0), then he/she can factor n by computing gcd(M-Mp,n)=p.
1. Message Hashing
2. Message Digest Encoding
3. Data block formatting
4. OctetString2integer conversion
5. RSA COmputation
6. Integer2octetString conversion
SIGNATURE
1. OctetString2integer conversion
2. RSA Computation
3. Integer2octetString conversion
4. Parsing
5. Data Encoding
6. Message digesting and comparison
SIGNATURE