An Implicit Elgamal Digital Signature Scheme

Total Page:16

File Type:pdf, Size:1020Kb

An Implicit Elgamal Digital Signature Scheme JOURNAL OF SOFTWARE, VOL. 6, NO. 7, JULY 2011 1329 An Implicit ELGamal Digital Signature Scheme Haipeng Chen College of Computer Science and Technology, Jilin University, Changchun, China Email: [email protected] Xuanjing Shen and Yingda Lv College of Computer Science and Technology, Jilin University, Changchun, China Email: [email protected]; [email protected] Abstract—This paper introduced a detail ElGamal digital the data of the implicit part of the signature. Signature signature scheme, and mainly analyzed the existing receiver can verify the signature of the implicit signature problems of the ElGamal digital signature scheme. Then to come to the verification of the real signature. As for improved the scheme according to the existing problems of the generalized ELGamal type signature scheme, Harn ElGamal digital signature scheme, and proposed an implicit and Xu pointed out that there are a total of 18 security ElGamal type digital signature scheme with the function of ELGamal type signature schemes [11]. Qi Ming and Xiao message recovery. As for the problem that message recovery Guozhen promoted the Chang-Liao password not being allowed by ElGamal signature scheme, this article authentication scheme based on generalized ELGamal approached a method to recover message. This method will type scheme in [12]. To make a signature scheme more make ElGamal signature scheme have the function of secure, this paper puts forward an improved scheme of message recovery. On this basis, against that part of signature was used on most attacks for ElGamal signature three implicit ElGamal type signature schemes. scheme, a new implicit signature scheme with the function of According to the different ways of hiding the signature, message recovery was formed, after having tried to hid the schemes are divided into three types: Ⅰ (a with s) part of signature message and refining forthcoming implicit type, Ⅱ (b with s) type, Ⅲ (c with s) type. The feature of type signature scheme. The safety of the refined scheme was the improved scheme is to conceal part of the original anlyzed, and its results indicated that the new scheme was signature s. So an attacker can not use part of signature s better than the old one. to substitute the usual attack and can increase the number Index Terms—ElGamal-type digital signature scheme; of unknowns (key x, k, s) in original signature equation, message recovery; implicit signature scheme; security while the forgers are not aware of these unknowns, and analysis thus prevent the reuse of k to exposure to key x. Signature receiver can verify the signature of the implicit I. INTRODUCTION signature to come to the verification of the real signature. ElGamal signature scheme is designed to use as a As the implicit signature scheme was improved; method signature, and its speed of encryption and decryption is of message recovery was given and it was applied to relatively slower than the symmetric algorithm, it is the ElGamal digital signature scheme, thus an implicit digital common problem of all practical public key algorithms at signature scheme with the function of message recovery present [1-3]. It is a non-deterministic two-key system. In was formed. The analyzed results show that: the security terms of the same plaintext message, due to different of the improved scheme has been improved significantly. parameters chosen randomly, it has different signatures. Most digital signature systems in the public did not have II. ELGAMAL DIGITAL SIGNATURE SCHEME the message recovery function. Signature scheme allowing message recovery has many advantages [4-7], A. General definition of digital signature scheme such as shorter signature for shorter message; meanwhile, [4] Generally speaking, a digital signature [13] mainly has it puts the message together with validation . Nyberg two algorithms. Signer can use a (secret) signing and Rueppel had improved the broad-based ELGamal algorithm to sign a message, leading to the signature by a mode [8-10], and a series of signature schemes had been public verification algorithm to verify. Verification received, which could verify the signature while algorithm makes an answer with "real" or "false" recovering the message. according to whether the signature is real when given a The implicit digital signature scheme conceals part of pair of signature. A digital signature scheme can be the signature from the other data in the signature, and described when meeting the following conditions (P, A, constitutes an implicit signature on the message by using K, S, V): National Natural Science grant (No.60773098); (1) P is a finite set composed by all possible Scientific and Technological Development Foundation of Jilin messages; Province(No.20080317). © 2011 ACADEMY PUBLISHER doi:10.4304/jsw.6.7.1329-1336 1330 JOURNAL OF SOFTWARE, VOL. 6, NO. 7, JULY 2011 (2) A is a finite set composed by all possible Ver( x ,γδ , )=⇔ true γfx(,,)γδ ⋅ β gx (,,) γδ ⋅ α hx (,,) γδ ≡ 1(mod p )(mod q ) signatures ; (4) (3) K is a finite set composed by all possible f, g, h is a public function and (,,x γ δ ) is known keys, which is key space; public, so any one can verify the equation (3). (4) As for each kK∈ , there is a signature If the signature is constructed correctly, then the algorithm Sigk ()⋅∈ S and a corresponding validation will be successful, because verification algorithm Ver(,)⋅⋅ ∈ V . Each k γβαfx(,,)γδ⋅⋅ gx (,,) γδ hx (,,) γδ(modpq )(mod ) Sigk ()⋅∈ S and (5) =αααkf(,,)γδ x ag (,,) γδ x h (,,) γδ x (modpq )(mod )= 1 Verk (,)⋅⋅ ∈ V : P × A → { true , false } is a function which satisfies the following When f, g, h take a different function, different digital equation: as for each message x∈ P and signature scheme will be gotten, and we referred to this each signature yA∈ , there is type of scheme as the ElGamal digital signature scheme. Verk (, x y )= true , If and only if In the above scheme, , and both are ySigx= k () Sigk ()⋅ Verk (,)⋅⋅ qpfx= , (,,)γ δδγδγγδ===− ,(,,) g x ,(,,) h x m (6) function of polynomial time. Ver (,)⋅ ⋅ is a k When taking the above-type, the scheme is the public function, while is a secret Sigk ()⋅ ElGamal digital signature scheme. At this point, the function. signature algorithm and verifying algorithms of the scheme change correspondingly: B. The description of the ElGamal type digital signature Sig( x , k )= (γδ , ), γ==−− αk mod p , δ ( x a γ ) k−1 mod p 1 (7) scheme based on discrete logarithm problem on * k Z p And Suppose p is a intractable prime on * the discrete Z p γ x * (8) Ver(,, xγδ )=⇔ true βγδ ≡ α (mod), p x γ ∈ Zpp , δ ∈ Z −1 logarithm problem[15-16], q is a large prime factor of p-1, or p=q, when q<p, select a element α ∈ Z * of an order for p C. Analysis of ElGamal Digital Signature Algorithm the q randomly; When p=q, randomly select a element Security * , or ** or α ∈ Z p P ∈=×〈ZAZppq,,() Z qp In general, the following are the main ways of attack: a * direct hack on the private key[14-16]. A =×ZZqppp−1() = of an order for the p-1. Definition: 1) Following the launch of RSA in 1978, has spent Kpqa=={(,,,,αββα )a (mod) p} much effort to find the defects that can be deciphered. Although it is used within a certain Where pq,,α ,β are public, a is private. scope of the agreement is not without risk, the algorithm's basic security is guaranteed. But For Kpqa= (,,,,α β ) and a secret random ELGamal algorithm has not a decoding test of * * detailed cryptanalysis , there are serious technical kZqp∈<q () or kZ∈=p−1() qp, definition: defects. Sigk (, x k )= (,γ δ ) (1) 2) For activities attacks and counterfeit attacks is fragile. If an attacker successfully replaces a Where γα= k modp (modq ) . legitimate user's public key by using private key that is randomly selected corresponding to public When q<p, δ satisfies the equation: key, then user will be able to forge signatures. kf⋅+⋅+≡(,,γ xδγδγδ ) ag (,, x ) h (,, x ) 0mod q (2) 3) The substitution attack. These attacks include the use of some of the signatures s and only use the When q=p, δ satisfies the equation: public key Y. The substitution attack carried out by using some of the signature s is major attack kf⋅+⋅+≡−(,,γ xδγδγδ ) ag (,, x ) h (,, x ) 0(mod p 1) (3) that the signature program ELGamal face to. f, g, h is a public function, and is calculated easily 4) The forgery attack. Starting from the from (1) and (2). signature,forgers make any changes to form the ** signature of another message m, which is For x ∈∈ZZp ,γ q and δ ∈ Zq , definition: possible to meet the same verification equation. © 2011 ACADEMY PUBLISHER JOURNAL OF SOFTWARE, VOL. 6, NO. 7, JULY 2011 1331 5) Random prive key k can not be repeatedly used to K = {( p,α, x, y) y = α x mod p} sign different messages. Otherwise, an attacker can easily obtain the signer private key x. and a secret random number kt, ∈ Zp−1 , define: 6) He and Keisler point out that can forge signer sign any message. If three random key k, (i = Sigk (,) m k= (,,) r i v 1,2,3) satisfy the k3 = k1 + k2, then r, (i = 1,2,3) to meet the r3 = r1r2. Then the attacker can obtain Where r is calculated by the key x. This is similar to the homomorphism r = mα −k mod p (10) attack that is faced by RSA , the difference is, the homomorphism attack of RSA signature is only and assume used to forge signature , and can be overcome by ' using hash function .while the homomorphism gcd(ry , p −= 1) 1 (11) attack of the ELGamal digital signature scheme, Where “gcd” is greatest common factor.
Recommended publications
  • Protecting Public Keys and Signature Keys
    Public-key cryptography offers certain advantages, providing the keys can be 3 adequately protected. For every security threat there must be an appropriate j countermeasure. Protecting Public Keys and Signature Keys Dorothy E. Denning, Purdue University With conventional one-key cryptography, the sender Consider an application environment in which each and receiver of a message share a secret encryption/ user has an intelligent terminal or personal workstation decryption key that allows both parties to encipher (en- where his private key is stored and all cryptographic crypt) and decipher (decrypt) secret messages transmitted operations are performed. This terminal is connected to between them. By separating the encryption and decryp- a nationwide network through a shared host, as shown in tion keys, public-key (two-key) cryptography has two at- Figure 1. The public-key directory is managed by a net- tractive properties that conventional cryptography lacks: work key server. Users communicate with each other or the ability to transmit messages in secrecy without any prior exchange of a secret key, and the ability to imple- ment digital signatures that are legally binding. Public- key encryption alone, however, does not guarantee either message secrecy or signatures. Unless the keys are ade- quately protected, a penetrator may be able to read en- crypted messages or forge signatures. This article discusses the problem ofprotecting keys in a nationwide network using public-key cryptography for secrecy and digital signatures. Particular attention is given to detecting and recovering from key compromises, especially when a high level of security is required. Public-key cryptosystems The concept of public-key cryptography was intro- duced by Diffie and Hellman in 1976.1 The basic idea is that each user A has a public key EA, which is registered in a public directory, and a private key DA, which is known only to the user.
    [Show full text]
  • Secure Remote Password (SRP) Authentication
    Secure Remote Password (SRP) Authentication Tom Wu Stanford University [email protected] Authentication in General ◆ What you are – Fingerprints, retinal scans, voiceprints ◆ What you have – Token cards, smart cards ◆ What you know – Passwords, PINs 2 Password Authentication ◆ Concentrates on “what you know” ◆ No long-term client-side storage ◆ Advantages – Convenience and portability – Low cost ◆ Disadvantages – People pick “bad” passwords – Most password methods are weak 3 Problems and Issues ◆ Dictionary attacks ◆ Plaintext-equivalence ◆ Forward secrecy 4 Dictionary Attacks ◆ An off-line, brute force guessing attack conducted by an attacker on the network ◆ Attacker usually has a “dictionary” of commonly-used passwords to try ◆ People pick easily remembered passwords ◆ “Easy-to-remember” is also “easy-to-guess” ◆ Can be either passive or active 5 Passwords in the Real World ◆ Entropy is less than most people think ◆ Dictionary words, e.g. “pudding”, “plan9” – Entropy: 20 bits or less ◆ Word pairs or phrases, e.g. “hate2die” – Represents average password quality – Entropy: around 30 bits ◆ Random printable text, e.g. “nDz2\u>O” – Entropy: slightly over 50 bits 6 Plaintext-equivalence ◆ Any piece of data that can be used in place of the actual password is “plaintext- equivalent” ◆ Applies to: – Password databases and files – Authentication servers (Kerberos KDC) ◆ One compromise brings entire system down 7 Forward Secrecy ◆ Prevents one compromise from causing further damage Compromising Should Not Compromise Current password Future passwords Old password Current password Current password Current or past session keys Current session key Current password 8 In The Beginning... ◆ Plaintext passwords – e.g. unauthenticated Telnet, rlogin, ftp – Still most common method in use ◆ “Encoded” passwords – e.g.
    [Show full text]
  • Jeffrey Hoffstein Jill Pipher Joseph H. Silverman
    Undergraduate Texts in Mathematics Je rey Ho stein Jill Pipher Joseph H. Silverman An Introduction to Mathematical Cryptography Second Edition Undergraduate Texts in Mathematics Undergraduate Texts in Mathematics Series Editors: Sheldon Axler San Francisco State University, San Francisco, CA, USA Kenneth Ribet University of California, Berkeley, CA, USA Advisory Board: Colin Adams, Williams College, Williamstown, MA, USA Alejandro Adem, University of British Columbia, Vancouver, BC, Canada Ruth Charney, Brandeis University, Waltham, MA, USA Irene M. Gamba, The University of Texas at Austin, Austin, TX, USA Roger E. Howe, Yale University, New Haven, CT, USA David Jerison, Massachusetts Institute of Technology, Cambridge, MA, USA Jeffrey C. Lagarias, University of Michigan, Ann Arbor, MI, USA Jill Pipher, Brown University, Providence, RI, USA Fadil Santosa, University of Minnesota, Minneapolis, MN, USA Amie Wilkinson, University of Chicago, Chicago, IL, USA Undergraduate Texts in Mathematics are generally aimed at third- and fourth- year undergraduate mathematics students at North American universities. These texts strive to provide students and teachers with new perspectives and novel approaches. The books include motivation that guides the reader to an appreciation of interre- lations among different aspects of the subject. They feature examples that illustrate key concepts as well as exercises that strengthen understanding. More information about this series at http://www.springer.com/series/666 Jeffrey Hoffstein • Jill Pipher Joseph
    [Show full text]
  • NSS: an NTRU Lattice –Based Signature Scheme
    ISSN(Online) : 2319 - 8753 ISSN (Print) : 2347 - 6710 International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 4, April 2015 NSS: An NTRU Lattice –Based Signature Scheme S.Esther Sukila Department of Mathematics, Bharath University, Chennai, Tamil Nadu, India ABSTRACT: Whenever a PKC is designed, it is also analyzed whether it could be used as a signature scheme. In this paper, how the NTRU concept can be used to form a digital signature scheme [1] is described. I. INTRODUCTION Digital Signature Schemes The notion of a digital signature may prove to be one of the most fundamental and useful inventions of modern cryptography. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. The creator of a message can attach a code, the signature, which guarantees the source and integrity of the message. A valid digital signature gives a recipient reason to believe that the message was created by a known sender and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions etc. Digital signatures are equivalent to traditional handwritten signatures. Properly implemented digital signatures are more difficult to forge than the handwritten type. 1.1A digital signature scheme typically consists of three algorithms A key generationalgorithm, that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. A signing algorithm, that given a message and a private key produces a signature.
    [Show full text]
  • Basics of Digital Signatures &
    > DOCUMENT SIGNING > eID VALIDATION > SIGNATURE VERIFICATION > TIMESTAMPING & ARCHIVING > APPROVAL WORKFLOW Basics of Digital Signatures & PKI This document provides a quick background to PKI-based digital signatures and an overview of how the signature creation and verification processes work. It also describes how the cryptographic keys used for creating and verifying digital signatures are managed. 1. Background to Digital Signatures Digital signatures are essentially “enciphered data” created using cryptographic algorithms. The algorithms define how the enciphered data is created for a particular document or message. Standard digital signature algorithms exist so that no one needs to create these from scratch. Digital signature algorithms were first invented in the 1970’s and are based on a type of cryptography referred to as “Public Key Cryptography”. By far the most common digital signature algorithm is RSA (named after the inventors Rivest, Shamir and Adelman in 1978), by our estimates it is used in over 80% of the digital signatures being used around the world. This algorithm has been standardised (ISO, ANSI, IETF etc.) and been extensively analysed by the cryptographic research community and you can say with confidence that it has withstood the test of time, i.e. no one has been able to find an efficient way of cracking the RSA algorithm. Another more recent algorithm is ECDSA (Elliptic Curve Digital Signature Algorithm), which is likely to become popular over time. Digital signatures are used everywhere even when we are not actually aware, example uses include: Retail payment systems like MasterCard/Visa chip and pin, High-value interbank payment systems (CHAPS, BACS, SWIFT etc), e-Passports and e-ID cards, Logging on to SSL-enabled websites or connecting with corporate VPNs.
    [Show full text]
  • 11 Digital Signatures
    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the following specific permissions for the electronic version of this book: Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specific permission above, the standard copyright notice from CRC Press applies to this electronic version: Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press for such copying. c 1997 by CRC Press, Inc. Chapter 11 Digital Signatures Contents in Brief 11.1 Introduction :::::::::::::::::::::::::::::425 11.2 A framework for digital signature mechanisms ::::::::::426 11.3 RSA and related signature schemes :::::::::::::::::433 11.4 Fiat-Shamir signature schemes :::::::::::::::::::447 11.5 The DSA and related signature schemes ::::::::::::::451 11.6 One-time digital signatures :::::::::::::::::::::462 11.7 Other signature schemes ::::::::::::::::::::::471 11.8 Signatures with additional functionality ::::::::::::::474 11.9 Notes and further references ::::::::::::::::::::481 11.1 Introduction This chapter considers techniques designed to provide the digital counterpart to a handwrit- ten signature.
    [Show full text]
  • A Study on the Security of Ntrusign Digital Signature Scheme
    A Thesis for the Degree of Master of Science A Study on the Security of NTRUSign digital signature scheme SungJun Min School of Engineering Information and Communications University 2004 A Study on the Security of NTRUSign digital signature scheme A Study on the Security of NTRUSign digital signature scheme Advisor : Professor Kwangjo Kim by SungJun Min School of Engineering Information and Communications University A thesis submitted to the faculty of Information and Commu- nications University in partial fulfillment of the requirements for the degree of Master of Science in the School of Engineering Daejeon, Korea Jan. 03. 2004 Approved by (signed) Professor Kwangjo Kim Major Advisor A Study on the Security of NTRUSign digital signature scheme SungJun Min We certify that this work has passed the scholastic standards required by Information and Communications University as a thesis for the degree of Master of Science Jan. 03. 2004 Approved: Chairman of the Committee Kwangjo Kim, Professor School of Engineering Committee Member Jae Choon Cha, Assistant Professor School of Engineering Committee Member Dae Sung Kwon, Ph.D NSRI M.S. SungJun Min 20022052 A Study on the Security of NTRUSign digital signature scheme School of Engineering, 2004, 43p. Major Advisor : Prof. Kwangjo Kim. Text in English Abstract The lattices have been studied by cryptographers for last decades, both in the field of cryptanalysis and as a source of hard problems on which to build encryption schemes. Interestingly, though, research about building secure and efficient
    [Show full text]
  • Elliptic Curve Cryptography and Digital Rights Management
    Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected]) March 9, 2021 5:19pm ©2021 Avinash Kak, Purdue University Goals: • Introduction to elliptic curves • A group structure imposed on the points on an elliptic curve • Geometric and algebraic interpretations of the group operator • Elliptic curves on prime finite fields • Perl and Python implementations for elliptic curves on prime finite fields • Elliptic curves on Galois fields • Elliptic curve cryptography (EC Diffie-Hellman, EC Digital Signature Algorithm) • Security of Elliptic Curve Cryptography • ECC for Digital Rights Management (DRM) CONTENTS Section Title Page 14.1 Why Elliptic Curve Cryptography 3 14.2 The Main Idea of ECC — In a Nutshell 9 14.3 What are Elliptic Curves? 13 14.4 A Group Operator Defined for Points on an Elliptic 18 Curve 14.5 The Characteristic of the Underlying Field and the 25 Singular Elliptic Curves 14.6 An Algebraic Expression for Adding Two Points on 29 an Elliptic Curve 14.7 An Algebraic Expression for Calculating 2P from 33 P 14.8 Elliptic Curves Over Zp for Prime p 36 14.8.1 Perl and Python Implementations of Elliptic 39 Curves Over Finite Fields 14.9 Elliptic Curves Over Galois Fields GF (2n) 52 14.10 Is b =0 a Sufficient Condition for the Elliptic 62 Curve6 y2 + xy = x3 + ax2 + b to Not be Singular 14.11 Elliptic Curves Cryptography — The Basic Idea 65 14.12 Elliptic Curve Diffie-Hellman Secret Key 67 Exchange 14.13 Elliptic Curve Digital Signature Algorithm (ECDSA) 71 14.14 Security of ECC 75 14.15 ECC for Digital Rights Management 77 14.16 Homework Problems 82 2 Computer and Network Security by Avi Kak Lecture 14 Back to TOC 14.1 WHY ELLIPTIC CURVE CRYPTOGRAPHY? • As you saw in Section 12.12 of Lecture 12, the computational overhead of the RSA-based approach to public-key cryptography increases with the size of the keys.
    [Show full text]
  • PFLASH - Secure Asymmetric Signatures on Smartcards
    PFLASH - Secure Asymmetric Signatures on Smartcards Ming-Shing Chen 1 Daniel Smith-Tone 2 Bo-Yin Yang 1 1Academia Sinica, Taipei, Taiwan 2National Institute of Standards and Technology, Gaithersburg, MD, USA 20th July, 2015 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 1/20 Minimalism Low power 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 2/20 Minimalism Low power No arithmetic coprocessor 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 2/20 Minimalism Low power No arithmetic coprocessor Minimalist Architecture 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 2/20 Minimalism Low power No arithmetic coprocessor Minimalist Architecture Little Cost 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 2/20 SFLASH In 2003, the NESSIE consortium considered SFLASH the most attractive digital signature algorithm for use in low cost smart cards. 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 3/20 SFLASH In 2003, the NESSIE consortium considered SFLASH the most attractive digital signature algorithm for use in low cost smart cards. Very Fast 20th July, 2015 M-S Chen, D Smith-Tone & B-Y Yang PFLASH - Secure Asymmetric Signatures on Smartcards 3/20 SFLASH In 2003, the NESSIE consortium considered SFLASH the most attractive digital signature algorithm for use in low cost smart cards.
    [Show full text]
  • A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems
    American Journal of Applied Sciences 5 (12): 1630-1634, 2008 ISSN 1546-9239 © 2008 Science Publications A Non-Exchanged Password Scheme for Password-Based Authentication in Client-Server Systems 1Shakir M. Hussain and 2Hussein Al-Bahadili 1Faculty of IT, Applied Science University, P.O. Box 22, Amman 11931, Jordan 2Faculty of Information Systems and Technology, Arab Academy for Banking and Financial Sciences, P.O. Box 13190, Amman 11942, Jordan Abstract: The password-based authentication is widely used in client-server systems. This research presents a non-exchanged password scheme for password-based authentication. This scheme constructs a Digital Signature (DS) that is derived from the user password. The digital signature is then exchanged instead of the password itself for the purpose of authentication. Therefore, we refer to it as a Password-Based Digital Signature (PBDS) scheme. It consists of three phases, in the first phase a password-based Permutation (P) is computed using the Key-Based Random Permutation (KBRP) method. The second phase utilizes P to derive a Key (K) using the Password-Based Key Derivation (PBKD) algorithm. The third phase uses P and K to generate the exchanged DS. The scheme has a number of features that shows its advantages over other password authentication approaches. Keywords: Password-based authentication, KBRP method, PBKD algorithm, key derivation INTRODUCTION • Encrypted key exchange (EKE) algorithm[1] • Authenticated key exchange secure against The client-server distributed system architecture dictionary attacks (AKE)[2] consists of a server, which has a record of the • Threshold password-authenticated key exchange[3] username-password database and a number of clients • Password-based authentication and key distribution willing to exchange information with the server.
    [Show full text]
  • Fault Analysis of the Ntrusign Digital Signature Scheme
    Cryptogr. Commun. (2012) 4:131–144 DOI 10.1007/s12095-011-0061-3 Fault analysis of the NTRUSign digital signature scheme Abdel Alim Kamal · Amr M. Youssef Received: 11 December 2010 / Accepted: 14 December 2011 / Published online: 6 January 2012 © Springer Science+Business Media, LLC 2012 Abstract We present a fault analysis of the NTRUSign digital signature scheme. The utilized fault model is the one in which the attacker is assumed to be able to fault a small number of coefficients in a specific polynomial during the signing process but cannot control the exact location of the injected transient faults. For NTRUsign with parameters (N, q = pl, B, standard, N ), when the attacker is able to skip the norm-bound signature checking step, our attack needs one fault, ≈ − 1 (( )t) succeeds with probability 1 p and requires O qN steps when the number of faulted polynomial coefficients is upper bounded by t. The attack is also applicable to NTRUSign utilizing the transpose NTRU lattice but it requires double the number of fault injections. Different countermeasures against the proposed attack are investigated. Keywords Side channel attacks · Lattice-based public key cryptosystems · Fault analysis and countermeasures · Digital signature schemes · NTRU Mathematics Subject Classification (2010) 94A60 1 Introduction NTRUSign [1–4] is a parameterized family of lattice-based public key digital signa- ture schemes that is currently under consideration for standardization by the IEEE P1363 working group. It was proposed after the original NTRU signature scheme (NSS) [5] was broken [6, 7]. Similar to the GGH cryptosystem [8], the security of A. A.
    [Show full text]
  • Subliminal Channels in High-Speed Signatures
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at institute of telecommunications The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Subliminal Channels in High-Speed Signatures Master’s Thesis for obtaining the academic degree Diplom-Ingenieur as part of the study Electrical Engineering and Information Technology carried out by Alexander Hartl student number: 01125115 Institute of Telecommunications at TU Wien Supervision: Univ. Prof. Dipl.-Ing. Dr.-Ing. Tanja Zseby Dipl.-Ing. Robert Annessi, B.Sc Acknowledgments I want to express my gratitude for everyone who assisted or encouraged me in various ways during my studies. In particular, I would like to thank Prof. Tanja Zseby and Dipl.-Ing. Robert Annessi for giving me the opportunity to write this thesis, for supporting me actively while I was working on it and for many valuable comments and suggestions. I owe special thanks to my family, especially my parents Edith and Rudolf, for their endless support during all these years. Thank you, Sabrina, for encouraging me and for so many cheerful hours in my life. Abstract One of the fundamental building blocks for achieving security in data networks is the use of digital signatures. A digital signature is a bit string which allows the receiver of a message to ensure that the message indeed originated from the apparent sender and has not been altered along the path.
    [Show full text]