In this paper, using the LLL reduction method and computing the integral points of two classes of conics, we develop attacks on DSA and ECDSA in case where the secret and the ephemeral key of a signed message or their...
详细信息
In this paper, using the LLL reduction method and computing the integral points of two classes of conics, we develop attacks on DSA and ECDSA in case where the secret and the ephemeral key of a signed message or theirs modular inverses are sufficiently small and in case where the ephemeral keys or theirs modular inverses of two signed messages are sufficiently small.
In the current environment, there are only a limited number of third-parties that general users can trust in terms of authentication and verification. Often, the self-acclaimed independent third-parties are the partie...
详细信息
In the current environment, there are only a limited number of third-parties that general users can trust in terms of authentication and verification. Often, the self-acclaimed independent third-parties are the parties from where information outflow occurs. While current public key encryption systems have numerous algorithms that have been protecting confidential data for several years, these systems are often met with hardware difficulties for information protection on the Internet and commercial applications. In order to meet the various needs of the environment, often several cryptography modules are combined or merged to achieve the effect of covering each others' deficiencies. This is a very common practice. The proposed method in this article is applicable for preventing information outflow with the introduction of third parties during a bi-party communication, in circumstances where bi-party communication is met with network environment difficulties, and also when the third party is not a trusted controller, or there are no controllers at all. While current systems operate on the back of trusted third-party administrators as is a common security mechanism for managing the public key and confidential data, often even with management, there are still probabilities of insecurity that threaten system security on the whole. To prevent this and also adapt to environment needs, the proposed method combines the grey system theory with the ECC method. This method can verify the credibility of senders' identity when the legitimate third party is no longer trusted, thus preventing malicious third-party intrusions. The concept of this method is based on the well-known digital signature algorithm (DSA) concept from which the Diffie-Hellman Key Agreement mechanism is derived to manage a common conference key in a mutual communication, agreement. When the user can communicate mutually between themselves without the need for a third-party intermediary, the solution to interv
In computer cryptography, Hyper elliptic curve cryptography system is one of the best cryptography system. DSA signaturealgorithm is also an advanced digital signature algorithm. In this paper, it's banded hyper ...
详细信息
ISBN:
(纸本)9780769536880
In computer cryptography, Hyper elliptic curve cryptography system is one of the best cryptography system. DSA signaturealgorithm is also an advanced digital signature algorithm. In this paper, it's banded hyper elliptic curve cryptography system and DSA signature standard together based on analysis and study them. The digital signature algorithm and the digital validate algorithm are analysis and improved. The hyper elliptic curve cryptography system is transplanted into DSA algorithm. And a digitalsignature based on HEC-DSA system is implemented. QuartusII is used to generate the function modules, RTL circuit and simulated waveform. RTL is the circuit connection in chip. It shows the connection of the modules. Simulated waveform shows us the timing and the function of the system. The security and efficiency of the HEC-DSA digitalsignature system is analyzed. The digitalsignature designed in this paper can solved the problem that how to check integrality of the rile and signature ID, and it especially fit for the internet operation that need identity validate.
A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the the former. After verification the...
详细信息
ISBN:
(纸本)9781424429271
A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the the former. After verification the verifier is convinced of the original signer's agreement on the signed message. Like digitalsignatures, these proxy signatures are also vulnerable to leakage of proxy secret key. Forward-Secure signatures enable the signer to guarantee the security of messages signed in the past even if his secret key is exposed today. By applying the concept of Forward-Security to proxy signatures, we have come up with a forward secure proxy signature scheme based on DSA(digital signature algorithm). Compared to existing schemes, the special feature of our scheme is that an original signer can delegate his signing capability to any number of proxy signers in varying time periods. Though the original signer gives proxy information to all the proxy signers at the beginning of the protocol, the proxy signers will be able to generate proxy signatures only in their allotted time periods. Further., the proxy signatures are made forward-secure. Moreover, our scheme meets the basic requirements of a proxy signature scheme along with proxy revocation. Both on-demand proxy revocation i.e. whenever the original signer wants to revoke the proxy signer and automatic proxy revocation i.e. immediate revocation after the expiry of the time period of the proxy signer, is provided. Additional properties of our scheme are as follows: identity of the proxy signer is available in the information sent by original signer to proxy signer, original signer need not send the information to proxy signer through a secure channel, warrant on the delegated messages can be specified, original signer cannot play the role of proxy signer, and verifier can determine when the proxy signature was generated.
To provide authentication to the Diffie-Hellman key exchange, a few integrated key exchange schemes which provide authentication using the DSA signature have been proposed in the literature. In this letter we point ou...
详细信息
To provide authentication to the Diffie-Hellman key exchange, a few integrated key exchange schemes which provide authentication using the DSA signature have been proposed in the literature. In this letter we point out that all of the previous Diffie-Heliman-DSA schemes do not provide security against session state reveal attacks. We also suggest a strong Diffie-Hellman-DSA scheme providing security against session state reveal attacks as well as forward secrecy and key independence.
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the se...
详细信息
ISBN:
(纸本)9781424410750
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the security aspects of such scenarios. The present work describes the implementation of a cryptographic algorithm based on Elliptic curves on an embedded mobile device useful for healthcare purposes. A Personal digital Assistant (PDA) has been chosen to be the hardware platform for the implementation as it is particularly suitable for remote patient monitoring applications. The motivation for this paper was to formulate a secure protocol which comprises of signature, Encryption and Authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices. This needed to be easy to use and computationally efficient in order to be acceptable to both clinicians and patients and the results indicate a positive outcome.
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the computational speed. In 1998, Bellare et ...
详细信息
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the computational speed. In 1998, Bellare et al. have proposed an approach called small exponents test, to preserve the security of batch verification of a digital signature algorithm (DSA) variant. In this letter, we propose an efficient scheme to speed up DSA batch verification. Our scheme does not need to compute modular inverse and at the same time, the security is preserved. We have included the performance evaluation to compare Computational time between our scheme and the existed DSA batch verification. (c) 2004 Elsevier Inc. All rights reserved.
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamper-proofing scheme is to extract and hide the entire...
详细信息
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamper-proofing scheme is to extract and hide the entire LL sub-band into the first-level sub-bands, 1LH and 1HL. The hidden data are used later with a unique digitalsignature and a public key to prove the authenticity of the image. Tampered areas could be accurately detected and recovered to a quality that is visually acceptable. This scheme can be used to authenticate sensitive images, such as medical images, to prove rightful ownership and to recover images before originals are available.
The authors present a multiparty signature generation (MSG) scheme of the digital signature algorithm (FIPS 186-1). The scheme is based on a simple idea, however, it is much more convenient in usability in the real wo...
详细信息
The authors present a multiparty signature generation (MSG) scheme of the digital signature algorithm (FIPS 186-1). The scheme is based on a simple idea, however, it is much more convenient in usability in the real world than existing MSGs. The scheme has the following properties: (1) valid signatures are generated with odd n split private keys, (2) broadcast messages between the key holders are hidden from them, so that the n key holders do not need to process signature generation simultaneously, (3) even if up to t(= n-1/2) split keys are stolen, the adversary can get no information on the private key, (4) the scheme is as secure as the original signaturealgorithm against chosen message attack, and (5) the scheme is efficient in the sense that an implementation on smart card has demonstrated practical performance for interactive use with human user.
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamperproofing scheme is to extract and hide the entire ...
详细信息
The LL sub-band from the discrete wavelet transform in JPEG2000 is similar to a smaller image of the original in spatial domain. The proposed authentication and tamperproofing scheme is to extract and hide the entire LL sub-band into the first-level sub-bands, 1LH and 1HL. The hidden data are used later with a unique digitalsignature and a public key to prove the authenticity of the image. Tampered areas could be accurately detected and recovered to a quality that is visually acceptable. This scheme can be used to authenticate sensitive images, such as medical images, to prove rightful ownership and to recover images before originals are available.
暂无评论