Lecture 18: Digital Signatures and Security Services by Christof Paar

Поделиться
HTML-код
  • Опубликовано: 29 янв 2014
  • For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com

Комментарии • 59

  • @rajansienaggarwal8131
    @rajansienaggarwal8131 5 лет назад +48

    This man single-handedly saving my semester, MVP lad.

  • @dpraajz
    @dpraajz 4 года назад +27

    6:45 Digital Signature
    25:35 Security Services
    1:00:50 RSA digital signature

  • @Linda_Djr
    @Linda_Djr 9 лет назад +15

    I wish our Prof gave a damn about us understanding as You sir Paar do .. respect .

  • @stefanierozell6531
    @stefanierozell6531 8 лет назад +15

    You should be a math professor. Great explanation, and ... you care.

  • @vidushigupta9671
    @vidushigupta9671 9 лет назад +17

    u r great teacher Prof Christof Paar, i wiish i could be in ur classes , ur lec series helped me a lot to prepare my lectures, i m also teacher ...thanku soo much

  • @Ultra_instinct_woode4269
    @Ultra_instinct_woode4269 10 лет назад +18

    Mr. Paar, you are a hero.

  • @armanahmad8613
    @armanahmad8613 Год назад

    Thank you Prof.Paar for providing a very good series of lectures .It is very helpful for the students and researchers who starts his/her carrier in cryptography. Also,thanks to his whole team.

  • @yahianad
    @yahianad 10 лет назад +2

    Many thanks to you Mr Paar ! your methode to explain lectures is awesome.

  • @bju295
    @bju295 Год назад +1

    after somitra sir(IITJ, india), he is the man who can teach very well the concepts of cryptography

  • @moonblood2
    @moonblood2 9 лет назад +38

    Why do people want to sleep in his lecture? I just don't understand.

    • @BarrettKillz
      @BarrettKillz 6 лет назад +4

      The course is in English because of Erasmus students. Most of them are there for partying anyway, such a pity..

    • @ViktorYakunin
      @ViktorYakunin 4 года назад +2

      I set the play speed x2 and still it's easy to follow, maybe his narration is too monotonous.

    • @coshvjicujmlqef6047
      @coshvjicujmlqef6047 3 года назад +2

      @@BarrettKillz Put Erasmus students to Gulags.

  • @kokiladevi7696
    @kokiladevi7696 6 лет назад +3

    Very nice sir .
    And thanks to you.

  • @jazetatg1132
    @jazetatg1132 9 лет назад +1

    Great lectures Dr. Paar, I managed to make it through all of them up to this point so far.
    I think the student at 1:07:55 was correct, XOR'ing x and x' together should yield 0 if (and only if) they are equal; maybe this isn't how it is done in practice, though?

  • @jimbob2810
    @jimbob2810 3 года назад +1

    Another superb lecture by Prof. Paar. However, I have one observation.
    At 1:07:30, Prof. Paar writes the following on the board: s^e = x' mod n (using modulo equivalence rather than ordinary equality "=").
    It would have been clearer to me, at least, if he'd have _defined_ x-prime, x' , as s^e mod n
    and described the test for authenticity as evaluating whether or not x' equals x mod n (explicitly noting that the test computes x mod n rather than just x.)

  • @mk677hd
    @mk677hd 4 года назад +3

    Damn, nicely done. a Fan!

  • @lyalltndiddale6224
    @lyalltndiddale6224 6 лет назад +2

    Thanks Prof Best Lecturer

  • @HoSm10
    @HoSm10 9 лет назад +2

    Thanks Mr Paar !

  • @plushiie_
    @plushiie_ 3 года назад

    Think I would have failed my course because of corona, but these videos saved me

  •  8 лет назад +6

    Excellent work. Congratulations. Professor Paar, would it be possible to get the English subtitles lesson? Thanks you very much.

  • @priyapandey8951
    @priyapandey8951 Год назад

    At 1:12:27 can't the attacker change both X and S to suit each other as in previous transmission of the public key oscar also has access to e therefore he could change S and X in such a way that S^e equals X mod n. In that scenario won't the integrity be compromised?

  • @priyavratarsenal
    @priyavratarsenal 8 лет назад

    +Introduction to Cryptography by Christof Paar
    which lecture of this video series on cryptography explain DSA and ECDSA? i really need to watch videos of those chapters because my exam starts from 27th may.
    btw, best of luck to your nation "german football team" for the upcoming euro 2016:)

  • @SS-605
    @SS-605 5 лет назад +1

    Hi professor can you please kindly make some video lectures on hash-based digital signatures covering both OTS and MTS?

  • @anilvedala7918
    @anilvedala7918 8 лет назад +2

    +Introduction to Cryptography by Christof Paar ..
    At 1:04:23, where you were explaining about RSA digital signatures, Alice sends (n,e) to Bob. Here, what if some middle man comes and alters the contents in (n,e)? If that happens there is no point in applying these Signatures right?

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 лет назад +4

      +anil vedala Correct. You always have to make sure that Bob has the CORRECT public key from Alice. This is a huge issue in practice. Mostly, people use certificates for this. Please have a look at my Lecture 24 from this series where I talk about this. regards, christof

    • @anilvedala7918
      @anilvedala7918 8 лет назад

      Thanks for the response. But, I presume that these kinds of attacks are very rare and yeah, I'll watch the lecture number 24

  • @gototcm
    @gototcm 2 года назад

    Excellent lecture. But what is the protection against VW making a copy of the order and claiming they received two identical orders for the ugly car from Alice?

  • @gorallogaia
    @gorallogaia 7 лет назад +2

    He doesn't really start till minute 12.

  • @rubenaghajanyan3624
    @rubenaghajanyan3624 3 года назад +1

    Hello Mr. Paar. Thank you very much for a very interesting lecture. I have a simple question outside of this lecture. We have ECDLP problem and we have ECDSA algorithm. Is that proved that breaking ECDSA as hard as solving ECDLP?

    • @introductiontocryptography4223
      @introductiontocryptography4223  3 года назад +3

      I am not totally up-to-date with DLP research. However, I am pretty sure those two problems are NOT equivalent, i.e., breaking ECDSA doesn't imply solving the ECDLP. cheers

    • @rubenaghajanyan3624
      @rubenaghajanyan3624 3 года назад

      @@introductiontocryptography4223 Thanks for the answer. Someone who will solve ECDLP can also break ECDSA. So based on your answer, it means ECDSA less hard than ECDLP.

  • @leeklaus5471
    @leeklaus5471 3 месяца назад

    Thanks so much!!

  • @1UniverseGames
    @1UniverseGames 3 года назад

    Any programming explanation of these lessons. Or any resources to learn programming for these lecture. Any helps

  • @TheRoodio
    @TheRoodio 8 лет назад +1

    In RSA DS, how is it that we send X (the plaintext) in the channel? Doesn't this violate confidentiality? Aren't we supposed to decrypt it into Y and then send Y?

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 лет назад +5

      No, not if we are doing *digital signatures*. In this case, we do not necessarily encrypt but "only" want to protect a message through a digital signature. However, in practice, one very often wants to do both, i.e., signing and encrypting. In this case, one usually uses a symmetric cipher like AES and a public-key algorithm like RSA for signing. regards, christof

    • @TheRoodio
      @TheRoodio 8 лет назад +1

      Yes, I understand. Thank you, Professor.

  • @tesfalegntadesse3737
    @tesfalegntadesse3737 2 года назад

    I loved the way of your lecturing and I would like to thank you prof. Christof Paar! thank you my God bless you more. i liked, commented and shared your videos as reward & subscribed your channel

  • @craigbuy2009
    @craigbuy2009 4 года назад

    Professor Paar you amazing teacher you should make cryptography courses available on Coursera platform.

  • @martinpattara
    @martinpattara 7 лет назад +1

    Thanks Professor .One basic question
    The size of the signature is going to be same as the message. ? For example, -The size of the signature on a 100MB document will also be 100MB

    • @SuperManikaran
      @SuperManikaran 6 лет назад

      I think if you are going to use RSA for digital signature, it will be.....!!

    • @jayanthma
      @jayanthma 3 года назад

      In practice, the message is hashed and it is the hash that is signed. So signatures are typically ~ equal to the size of the RSA key (modulus)
      More details on why you need to hash before signing. crypto.stackexchange.com/questions/12768/why-hash-the-message-before-signing-it-with-rsa

  • @RitaAoun
    @RitaAoun 8 лет назад

    Hello, how come we need to send x as well as s? Since we're decrypting s anyway, wouldn't s alone be enough? A tampered with cypher-text would invalidate the result of the decryption of s (it would make no sense/it would be a corrupted file). So what's the benefit of sending x as well?

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 лет назад +1

      I assume you are referring to RSA digital signature. You are right, if you send a message with a certain structure, say a text in a given language, a change in the ciphertext would most likely result in a nonsense plaintext after decryption. This holds also for regular symmetric encryption (and we would not need signatures at all). There are several problems with this approach, however. First, you will probably need a human user decide whether the message is corrupted or not while we would prefer an automatic decision by a computer. Second, if we send non-text messages, e.g., measurement data from a sensor, it can be very difficult to decide what is valid plaintext and what's not. Hence, if we send both, x and s, for signature validation we avoid both problems.

    • @RitaAoun
      @RitaAoun 8 лет назад

      I see. I guess the redundancy was resolved later with HMAC. :) Thank you, Prof. Paar!

  • @sumitbusa6976
    @sumitbusa6976 9 лет назад

    Thanks

  • @msaufy
    @msaufy 10 лет назад

    prof u didnt say why we just need a few bit to verify the signature

    • @yahianad
      @yahianad 10 лет назад +1

      'caue the result should be 1 or 0 . So we need just 1 bit.

  • @chandrak3108
    @chandrak3108 3 года назад

    Fun. 👏

  • @user-oh9vl4pe9v
    @user-oh9vl4pe9v 8 месяцев назад

    I don't get why verification is less costly than signature?

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 месяцев назад +1

      Good question. This is only true for RSA digital signatures. For verfication, one can use so-called "short private exponents", ie., values "e" that are only 16 bits long or so. With them, one computes for verification:
      sig^e mod n
      Because "e" is short, this is a fast operation. In contrast, for generating the signature, one computes:
      m^d mod n
      where "m" is the (hashed) message. The operation looks similar but the value "d" is 2048 bits long or more, so that this second exponentation takes waaay longer.
      Again, this is a peculiar property of RSA digital signature. With many other signatures schemes, signing and verfication are roughtly equally fast (or slow).
      Hope that helps, christof

  • @anilvedala7918
    @anilvedala7918 8 лет назад

    @Introduction to Cryptography by Christof Paar ...
    At 59:00, Alice sends (X,S) right? There, Is X the encrypted form of actual message or the actual message itself? If X is the actual mesage, then middle men will get to know X right? That means we are not able to maintain the confidentiality of X, which is the whole point of cryptography..

    • @introductiontocryptography4223
      @introductiontocryptography4223  8 лет назад +3

      +anil vedala I think I talk about this in the video: The point of dig. sign. is NOT to provide confidentiality but integrity, authentication and non-repudiation. If your application also needs confidentiality, you have to encrypt x as well. You can always combine encryption and digital signature. regards, christof

    • @anilvedala7918
      @anilvedala7918 8 лет назад

      Thank you for the response. It is clear now.

  • @juanijx
    @juanijx 3 года назад

    Ojala estuviera subtitulado

  • @souvikbhattacharjee8984
    @souvikbhattacharjee8984 3 года назад

    Surprise Surprise 54:23

  • @abdulrahmansiddiq8171
    @abdulrahmansiddiq8171 3 года назад +1

    Very low rate of information..