Book contents
- Frontmatter
- Contents
- Preface
- Notation
- 1 Basics of cryptography
- 2 Complexity theory
- 3 Non-deterministic computation
- 4 Probabilistic computation
- 5 Symmetric cryptosystems
- 6 One way functions
- 7 Public key cryptography
- 8 Digital signatures
- 9 Key establishment protocols
- 10 Secure encryption
- 11 Identification schemes
- Appendix 1 Basic mathematical background
- Appendix 2 Graph theory definitions
- Appendix 3 Algebra and number theory
- Appendix 4 Probability theory
- Appendix 5 Hints to selected exercises and problems
- Appendix 6 Answers to selected exercises and problems
- Bibliography
- Index
8 - Digital signatures
Published online by Cambridge University Press: 06 July 2010
- Frontmatter
- Contents
- Preface
- Notation
- 1 Basics of cryptography
- 2 Complexity theory
- 3 Non-deterministic computation
- 4 Probabilistic computation
- 5 Symmetric cryptosystems
- 6 One way functions
- 7 Public key cryptography
- 8 Digital signatures
- 9 Key establishment protocols
- 10 Secure encryption
- 11 Identification schemes
- Appendix 1 Basic mathematical background
- Appendix 2 Graph theory definitions
- Appendix 3 Algebra and number theory
- Appendix 4 Probability theory
- Appendix 5 Hints to selected exercises and problems
- Appendix 6 Answers to selected exercises and problems
- Bibliography
- Index
Summary
Introduction
The need to authenticate both the contents and origin of a message is crucial in any communications network. Consider the following problematic situations in which Alice and Bob face the forger Fred. In each case we suppose that Bob is Alice's banker.
(1) Suppose Fred sends Bob a message claiming to come from Alice asking him to transfer $1000 into Fred's account. If Bob has no way of verifying the origin of this message then Alice is in trouble.
(2) Suppose Fred intercepts a message from Alice to Bob asking him to transfer $1000 into Carol's account. If Fred can alter the message so that ‘Carol’ is replaced by ‘Fred’ then again there is trouble.
(3) Suppose Fred intercepts a message from Alice to Bob asking him to transfer $1000 into Fred's account. Fred stores the message and resends it to Bob whenever he is short of cash!
In each case Fred can succeed if no proper system of message authentication is in place.
Historically the handwritten signature has been the preferred method for authentication of messages. A digital signature is a method for achieving this based on cryptography.
- Type
- Chapter
- Information
- Complexity and CryptographyAn Introduction, pp. 170 - 186Publisher: Cambridge University PressPrint publication year: 2006