Nothing Special   »   [go: up one dir, main page]

Skip to main content

Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode

  • Conference paper
Security Standardisation Research (SSR 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8893))

Included in the following conference series:

  • 603 Accesses

Abstract

Digital signature mechanism with appendix(DSwA) is a type of digital signature in which, after the message, a signature Σ is appended. When DSwA is constructed based on the discrete logarithm problem, Σ is composed of a pair (R,S). When R is a hashcode with bit length γ and S is an element of subgroup of order q with bit length β, it is recommended to adjust γ and β to be similar because the security strength depends on the smaller value between γ and β. However in some circumstances only hash functions with longer output could be available. Then γ becomes unnecessarily longer than β, and hence the longer Σ is appended. For the above case, we propose a generalized method for reducing the size of Σ by truncating R by β without loss of any security strength. Our proposed method can be applied to mechanisms like KCDSA, SDSA, EC-KCDSA, and EC-SDSA in ISO/IEC 14888-3: Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms.

This research was supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2014-H0301-14-1004) supervised by the NIPA (National IT Industry Promotion Agency) and in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the “IT Consilience Creative Program” (NIPA-2014-H0201-14-1001) supervised by the NIPA (National IT Industry Promotion Agency).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO/IEC 10118-1 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 1: General (2000)

    Google Scholar 

  2. ISO/IEC 10118-3 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions (2004)

    Google Scholar 

  3. ISO/IEC 14888-1 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 1: General (2008)

    Google Scholar 

  4. ISO/IEC 14888-3 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2006)

    Google Scholar 

  5. N13975 Text of ISO/IEC 3rd WD for 3rd edition of 14888-3: Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2014)

    Google Scholar 

  6. FIPS 180-4: Secure Hash Standard (SHS) (2012)

    Google Scholar 

  7. TTAK.KO-12.0001/R3: Digital Signature Mechanism with Appendix — Part 2: Korean Certificate-based Digital Signature Algorithm KCDSA (2014)

    Google Scholar 

  8. TTAK.KO-12.0015/R2: Digital Signature Mechanism with Appendix — Part 3: Korean Certificate-based Digital Signature Algorithm using Elliptic Curves EC-KCDSA (2014)

    Google Scholar 

  9. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory, 644–654 (1976)

    Google Scholar 

  10. Kelsey, J.: SHA-160: A Truncation Mode for SHA256 (and most other hashes). Cryptographic Hash Workshop, NIST (2005)

    Google Scholar 

  11. Matyas, S.: Digital signatures — an overview. Computer Networks, 87–94 (1979)

    Google Scholar 

  12. Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Lee, J., Lee, P.J. (2014). Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode. In: Chen, L., Mitchell, C. (eds) Security Standardisation Research. SSR 2014. Lecture Notes in Computer Science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14054-4_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14053-7

  • Online ISBN: 978-3-319-14054-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics