![](http://image.absoluteastronomy.com/images//topicimages/noimage.gif)
Forgery (Cryptography)
Encyclopedia
In a cryptographic
digital signature
or MAC
system, digital signature forgery is the ability to create a pair consisting of a message
and a signature (or MAC)
that is valid for
, where
has not been signed in the past by the legitimate signer. There are three types of forgery: existential, selective, and universal.
, where
was not produced by the legitimate signer. The adversary need not have any control over
;
need not have any particular meaning; and indeed it may even be gibberish — as long as the pair
is valid, the adversary has succeeded in constructing an existential forgery.
Existential forgery is essentially the weakest adversarial goal, therefore the strongest schemes are those that are "existentially unforgeable".
where
has been chosen by the adversary prior to the attack.
may be chosen to have interesting mathematical properties with respect to the signature algorithm; however, in selective forgery,
must be fixed before the start of the attack.
The ability to successfully conduct a selective forgery attack implies the ability to successfully conduct an existential forgery attack.
for any given message
. An adversary capable of universal forgery is able to sign messages he chose himself (as in selective forgery), messages chosen at random, or even specific messages provided by an opponent.
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
digital signature
Digital signature
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit...
or MAC
Message authentication code
In cryptography, a message authentication code is a short piece of information used to authenticate a message.A MAC algorithm, sometimes called a keyed hash function, accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC...
system, digital signature forgery is the ability to create a pair consisting of a message
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-1.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-2.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-3.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-4.gif)
Existential forgery
Existential forgery is the creation (by an adversary) of at least one message/signature pair![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-5.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-6.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-7.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-8.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-9.gif)
Existential forgery is essentially the weakest adversarial goal, therefore the strongest schemes are those that are "existentially unforgeable".
Selective forgery
Selective forgery is the creation (by an adversary) of a message/signature pair![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-10.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-11.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-12.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-13.gif)
The ability to successfully conduct a selective forgery attack implies the ability to successfully conduct an existential forgery attack.
Universal forgery
Universal forgery is the creation (by an adversary) of a valid signature![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-14.gif)
![](http://image.absoluteastronomy.com/images/formulas/0/6/2067256-15.gif)