21.08.2015 Views

RSA-PSS – Provably secure RSA Signatures and their ...

RSA-PSS – Provably secure RSA Signatures and their ...

RSA-PSS – Provably secure RSA Signatures and their ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DNSSEC is a security extension to the domain name system. It was developedback in 1999, but saw no widespread use for quite a long time. In 2008,security researcher Dan Kaminsky presented a real-world attack on the cachingof DNS [US-CERT, 2008]. Through mitigation measures, it was possible tomake such attacks much harder, still DNSSEC is considered the only long-termsolution for a reliable DNS. All domain name authorities are working on implementingDNSSEC <strong>and</strong> the root zone has been signed in 2010. The latestsignature algorithms based on <strong>RSA</strong> <strong>and</strong> SHA-2 are specified in RFC 5702 <strong>and</strong>use EMSA-PKCS1-v1 5 (section 3 in [IETF Network Working Group, 2009]).Section 8.1 contains a note that this has been decided to make the transitionfrom the SHA-1 algorithms easier. It is unlikely that this will change, as thecurrent plans of the DNS working group at the IETF are to switch to ellipticcurve algorithms in the future.DKIM (DomainKeys Identified Mail) is a signature system for outgoingemails to prevent spam. Similar to DNSSEC, it was developed long after thest<strong>and</strong>ardization of <strong>PSS</strong>, but supports exclusively <strong>RSA</strong>-PKCS1-v1 5, because itsauthors feared it would make implementation too difficult if they required ascheme not widely supported.The Transport Layer Security protocol (formerly SSL) is widely used to<strong>secure</strong> existing protocols, like https, pop3s, smtps etc. The latest version doesnot support any padding beside <strong>RSA</strong>SSA-PKCS1-v1 5.As shown in this chapter, a couple of the most significant cryptographicprotocols don’t support <strong>RSA</strong>SSA-<strong>PSS</strong> at all <strong>and</strong> there are no transition plans.7.7 Other Protocols using <strong>PSS</strong>A small number of less widely used protocols implement <strong>PSS</strong>.Microsoft’s digital rights management system COPP is using <strong>RSA</strong>SSA-<strong>PSS</strong>signatures to verify signatures on graphics drivers. However, it uses SHA-1 asa hash algorithm <strong>and</strong> sets the salt length to zero [Microsoft, 2010].The European st<strong>and</strong>ard for smart cards prEN 14890-1:2008 defines an interfacefor <strong>RSA</strong>SSA-<strong>PSS</strong> based signatures (part 2, page 14, chapter 6.3.2 in[Technical Committee CEN/TC 224, 2008]). It states that the hash for themask generation function <strong>and</strong> the input have to be the same.7.8 SummaryWe have seen that the support for <strong>PSS</strong> within cryptographic protocols is verylimited. Many important protocol st<strong>and</strong>ards don’t support it at all <strong>and</strong> fromthe ones that do, implementations are rare.31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!