Question: a . Digital signatures are sometimes used for authenticating users in network protocols. SSH and SSL / TLS , for example, can both use such
a Digital signatures are sometimes used for authenticating users in network protocols. SSH and SSLTLS
for example, can both use such a mechanism. Consider the following login protocol:
The server sends Alice a randomly chosen number x
Alice digitally signs the number with her secret signing key sk and sends the signature s Signskx
back to the server.
The server checks the signature using Alices public verification key vk If the signature is valid, ie
V ervkx s valid, then the server accepts Alices connection request.
Suppose that Alice uses the same private key, both, to log in to such a server using the above protocol, and
also to sign the emails she sends to various recipients. Show how a server could trick Alice into helping the
server forge Alices signature on an arbitrary email M
making it appear signed by Alice. Technically,
explain how the server can mount a universal forgery attack against email signature using Alice as a
chosenmessage signing oracle in the login scheme Assume that email signature is normal fullfledged
hashandsign: ie to sign an email message M Alice hashes M into hM and outputs SignskhM
How can the server trick Alice into signing an arbitrary email M
bSuggest a modification to the authentication protocol which would defeat this attack. Many solutions are possible for this question, some better than others; give the one you deem best.
c Learning from the above attack, what would be your word of wisdom regarding the reuse of the same cryptographic keys for different purposes or in different protocols? Briefly explain what generally would be best avoided; and then think of an approach one could safely use if we really wanted to minimise the number of keys that Alice would need to store securely
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
