复制的数字签名_数字签名的安全性

sha1和MD5算法的区别

sha-1与MD5的最大区别在于其摘要比MD5摘要长32B。对于强行攻击,产生任何一个报文使之摘要等于给定报文摘要的难度:MD5是2128数量级的操作,sha-1是2160数量级的操作。产生具有相同摘要的两个报文的难度:MD5是264是数量级的操作,sha-1是280数量级的操作。因而,sha-1对强行攻击的强度更大。但由于sha-1的循环步骤比MD5多(80:64)且要处理的缓存大(160B:128B),sha-1的运行速度比MD5慢。


数字签名的复制

在百度中搜索一下数字签名复制,你会发现,这样的工具太多了……
在这里插入图片描述
而且,我下载了7款复制数字签名的软件,复制成功率竟然达到了56%!可怕!邪恶的我把Explorer.exe的数字签名(微软的官签)给复制到了我用来测试的软件上面。[时间戳也伪造上了]


复制后出现的问题

当我正在沾沾自喜时,360老毛病又犯了,未经我允许,直接删除┭┮﹏┭┮,而且,它提示:侦测到极危险的木马(签名不正常,创建可疑进程),已经彻底覆盖。
崩溃……
可是,它怎么能把微软官签当成“不正常的签名”呢?好奇。
文件属性
换做金山官签试了一下,还是一样。
但当我查看证书详细信息时,发现了一些蛛丝马迹。
证书详细信息
呵呵,看出不正常的地方来了吧?7款复制数字签名的软件全部没用!
再往下看:
原因
我将Kingsoft的sha1证书导出为.cer便于查看详细信息。

x509 -inform der -in Kingsoft.cer -out Kingsoft.pem

导出完成。
查看详细信息。

x509 -in Kingsoft.pem -noout -text

输出:

OpenSSL> x509 -in Kingsoft.pem -noout -text
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            02:e4:4d:7d:1d:38:ae:22:3b:27:a0:2b:ac:d7:9b:53
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Code Signing CA-1
        Validity
            Not Before: Jan 20 00:00:00 2020 GMT
            Not After : Feb  4 12:00:00 2023 GMT
        Subject: C = CN, ST = Guangdong, L = Zhuhai, O = "Zhuhai Kingsoft Office Software Co., Ltd.", CN = "Zhuhai Kingsoft Office Software Co., Ltd."
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                RSA Public-Key: (2048 bit)
                Modulus:
                    00:ee:8b:7e:43:90:32:eb:45:75:59:be:c8:69:ca:
                    6a:2d:e9:6a:2d:a3:cc:4e:98:46:57:3c:e5:5b:5d:
                    e5:1e:cc:52:da:4e:0e:80:82:a0:1d:f8:98:18:fd:
                    82:2c:c4:56:38:e6:57:be:ac:06:f5:4e:6d:1f:26:
                    c4:1e:e5:38:5b:08:21:70:6b:04:8e:42:d0:05:3a:
                    c1:e1:57:c9:74:6f:69:86:89:40:ad:22:6a:77:ec:
                    94:44:e4:74:23:58:7b:c4:08:d3:43:64:d7:0d:e4:
                    2b:2c:75:ab:52:b2:58:f3:2d:7e:5e:7f:9a:2d:be:
                    4c:56:b7:67:35:45:16:60:f3:23:a5:91:04:70:0e:
                    99:5e:6c:9f:a5:1a:d3:37:80:fb:84:26:ff:38:cf:
                    c9:1b:ba:77:0d:a3:d8:db:73:82:94:84:09:f2:63:
                    5d:f8:bc:2f:c8:3b:15:94:c0:0e:53:19:aa:68:7f:
                    f5:64:d4:bd:e0:25:35:43:f1:83:7f:45:0c:9a:6f:
                    a8:37:db:ed:c9:8a:37:d2:f2:d5:f9:4d:7e:d4:7d:
                    4d:38:fb:1f:af:ec:ba:de:f6:f3:91:df:d6:ac:da:
                    80:a2:ac:92:08:24:e8:bf:b0:02:0e:a7:23:4c:b2:
                    10:c4:82:76:65:59:b1:45:8e:5e:3d:ab:00:d9:24:
                    51:37
                Exponent: 3 (0x3)
        X509v3 extensions:
            X509v3 Authority Key Identifier:
                keyid:7B:68:CE:29:AA:C0:17:BE:49:7A:E1:E5:3F:D6:A7:F7:45:8F:35:32

            X509v3 Subject Key Identifier:
                BF:6E:75:73:61:2C:35:9D:43:B4:DE:38:DE:D2:D8:85:4F:AC:9E:D7
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Extended Key Usage:
                Code Signing
            X509v3 CRL Distribution Points:

                Full Name:
                  URI:http://crl3.digicert.com/assured-cs-g1.crl

                Full Name:
                  URI:http://crl4.digicert.com/assured-cs-g1.crl

            X509v3 Certificate Policies:
                Policy: 2.16.840.1.114412.3.1
                  CPS: https://www.digicert.com/CPS
                Policy: 2.23.140.1.4.1

            Authority Information Access:
                OCSP - URI:http://ocsp.digicert.com
                CA Issuers - URI:http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt

            X509v3 Basic Constraints: critical
                CA:FALSE
    Signature Algorithm: sha1WithRSAEncryption
         39:b9:97:02:7e:cf:01:f0:c9:16:82:20:6d:76:bd:bb:aa:50:
         f2:91:6a:8b:c8:4d:b2:3d:3d:10:aa:bd:5b:36:12:cb:2e:73:
         b0:08:34:b7:69:80:cd:c9:ad:e5:67:18:0a:27:16:99:a7:ad:
         d2:ed:b4:d3:86:82:19:9e:ca:69:d1:37:21:d6:55:5c:1c:7f:
         64:9c:e9:6d:02:67:d4:83:1a:98:b6:41:b8:c6:88:a1:4b:81:
         17:90:eb:d6:67:5d:60:21:33:c1:8a:98:3a:4b:3c:53:14:9c:
         f3:8e:7d:a5:e2:57:0a:66:68:c6:9c:ab:c9:79:45:a0:d3:6b:
         56:c7:80:5c:d4:d5:8c:2c:13:90:b2:ce:7f:11:9a:72:8b:20:
         53:89:04:8e:45:c7:a5:97:06:b5:75:d1:49:d0:99:a2:72:f2:
         d3:5a:27:6c:15:84:b0:e1:de:78:21:8c:5e:4e:9f:3f:1e:f1:
         04:d4:04:44:61:7f:0a:49:9e:60:cf:4f:48:eb:da:9c:73:2a:
         81:f7:dd:92:84:e9:2c:51:3b:62:44:f4:42:84:e8:b6:48:16:
         5a:55:e2:e0:b9:c5:60:a8:82:66:f5:a4:da:e6:5c:05:94:68:
         03:31:50:78:ca:5f:93:41:90:94:10:88:ac:10:3d:bb:a6:51:
         b4:80:05:06

复制的证书:

OpenSSL> x509 -in Kingsoft_copy.pem -noout -text
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            02:e4:4d:7d:1d:38:ae:22:3b:27:a0:2b:ac:d7:9b:53
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Assured ID Code Signing CA-1
        Validity
            Not Before: Jan 20 00:00:00 2020 GMT
            Not After : Feb  4 12:00:00 2023 GMT
        Subject: C = CN, ST = Guangdong, L = Zhuhai, O = "Zhuhai Kingsoft Office Software Co., Ltd.", CN = "Zhuhai Kingsoft Office Software Co., Ltd."
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                RSA Public-Key: (2048 bit)
                Modulus:
                    00:ee:8b:7e:43:90:32:eb:45:75:59:be:c8:69:ca:
                    6a:2d:e9:6a:2d:a3:cc:4e:98:46:57:3c:e5:5b:5d:
                    e5:1e:cc:52:da:4e:0e:80:82:a0:1d:f8:98:18:fd:
                    82:2c:c4:56:38:e6:57:be:ac:06:f5:4e:6d:1f:26:
                    c4:1e:e5:38:5b:08:21:70:6b:04:8e:42:d0:05:3a:
                    c1:e1:57:c9:74:6f:69:86:89:40:ad:22:6a:77:ec:
                    94:44:e4:74:23:58:7b:c4:08:d3:43:64:d7:0d:e4:
                    2b:2c:75:ab:52:b2:58:f3:2d:7e:5e:7f:9a:2d:be:
                    4c:56:b7:67:35:45:16:60:f3:23:a5:91:04:70:0e:
                    99:5e:6c:9f:a5:1a:d3:37:80:fb:84:26:ff:38:cf:
                    c9:1b:ba:77:0d:a3:d8:db:73:82:94:84:09:f2:63:
                    5d:f8:bc:2f:c8:3b:15:94:c0:0e:53:19:aa:68:7f:
                    f5:64:d4:bd:e0:25:35:43:f1:83:7f:45:0c:9a:6f:
                    a8:37:db:ed:c9:8a:37:d2:f2:d5:f9:4d:7e:d4:7d:
                    4d:38:fb:1f:af:ec:ba:de:f6:f3:91:df:d6:ac:da:
                    80:a2:ac:92:08:24:e8:bf:b0:02:0e:a7:23:4c:b2:
                    10:c4:82:76:65:59:b1:45:8e:5e:3d:ab:00:d9:24:
                    51:37
                Exponent: 3 (0x3)
        X509v3 extensions:
            X509v3 Authority Key Identifier:
                keyid:7B:68:CE:29:AA:C0:17:BE:49:7A:E1:E5:3F:D6:A7:F7:45:8F:35:32

            X509v3 Subject Key Identifier:
                BF:6E:75:73:61:2C:35:9D:43:B4:DE:38:DE:D2:D8:85:4F:AC:9E:D7
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Extended Key Usage:
                Code Signing
            X509v3 CRL Distribution Points:

                Full Name:
                  URI:http://crl3.digicert.com/assured-cs-g1.crl

                Full Name:
                  URI:http://crl4.digicert.com/assured-cs-g1.crl

            X509v3 Certificate Policies:
                Policy: 2.16.840.1.114412.3.1
                  CPS: https://www.digicert.com/CPS
                Policy: 2.23.140.1.4.1

            Authority Information Access:
                OCSP - URI:http://ocsp.digicert.com
                CA Issuers - URI:http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt

            X509v3 Basic Constraints: critical
                CA:FALSE
    Signature Algorithm: sha1WithRSAEncryption
         39:b9:97:02:7e:cf:01:f0:c9:16:82:20:6d:76:bd:bb:aa:50:
         f2:91:6a:8b:c8:4d:b2:3d:3d:10:aa:bd:5b:36:12:cb:2e:73:
         b0:08:34:b7:69:80:cd:c9:ad:e5:67:18:0a:27:16:99:a7:ad:
         d2:ed:b4:d3:86:82:19:9e:ca:69:d1:37:21:d6:55:5c:1c:7f:
         64:9c:e9:6d:02:67:d4:83:1a:98:b6:41:b8:c6:88:a1:4b:81:
         17:90:eb:d6:67:5d:60:21:33:c1:8a:98:3a:4b:3c:53:14:9c:
         f3:8e:7d:a5:e2:57:0a:66:68:c6:9c:ab:c9:79:45:a0:d3:6b:
         56:c7:80:5c:d4:d5:8c:2c:13:90:b2:ce:7f:11:9a:72:8b:20:
         53:89:04:8e:45:c7:a5:97:06:b5:75:d1:49:d0:99:a2:72:f2:
         d3:5a:27:6c:15:84:b0:e1:de:78:21:8c:5e:4e:9f:3f:1e:f1:
         04:d4:04:44:61:7f:0a:49:9e:60:cf:4f:48:eb:da:9c:73:2a:
         81:f7:dd:92:84:e9:2c:51:3b:62:44:f4:42:84:e8:b6:48:16:
         5a:55:e2:e0:b9:c5:60:a8:82:66:f5:a4:da:e6:5c:05:94:68:
         03:31:50:78:ca:5f:93:41:90:94:10:88:ac:10:3d:bb:a6:51:
         b4:80:05:06

呵呵,证书一模一样。
Windows是怎么识别的呢?
复制数字签名的原理:
复制证书,然后将软件的数字签名导向证书[假冒伪劣产品],没有经过加密。
数字签名安全性真不是吹的。


两个账号几个月以来第一次用Markdown,布局有问题请在评论区发表建议哈。
这行文字只是用来 证明这篇文章是用 Markdown 编辑器 撰写的。
注:本文所用的数字签名只是为了示范,没有任何针对性。

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章