Abstract
Digital signature mechanism with appendix(DSwA) is a type of digital signature in which, after the message, a signature Σ is appended. When DSwA is constructed based on the discrete logarithm problem, Σ is composed of a pair (R,S). When R is a hashcode with bit length γ and S is an element of subgroup of order q with bit length β, it is recommended to adjust γ and β to be similar because the security strength depends on the smaller value between γ and β. However in some circumstances only hash functions with longer output could be available. Then γ becomes unnecessarily longer than β, and hence the longer Σ is appended. For the above case, we propose a generalized method for reducing the size of Σ by truncating R by β without loss of any security strength. Our proposed method can be applied to mechanisms like KCDSA, SDSA, EC-KCDSA, and EC-SDSA in ISO/IEC 14888-3: Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms.
This research was supported in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2014-H0301-14-1004) supervised by the NIPA (National IT Industry Promotion Agency) and in part by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the “IT Consilience Creative Program” (NIPA-2014-H0201-14-1001) supervised by the NIPA (National IT Industry Promotion Agency).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ISO/IEC 10118-1 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 1: General (2000)
ISO/IEC 10118-3 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions (2004)
ISO/IEC 14888-1 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 1: General (2008)
ISO/IEC 14888-3 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2006)
N13975 Text of ISO/IEC 3rd WD for 3rd edition of 14888-3: Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2014)
FIPS 180-4: Secure Hash Standard (SHS) (2012)
TTAK.KO-12.0001/R3: Digital Signature Mechanism with Appendix — Part 2: Korean Certificate-based Digital Signature Algorithm KCDSA (2014)
TTAK.KO-12.0015/R2: Digital Signature Mechanism with Appendix — Part 3: Korean Certificate-based Digital Signature Algorithm using Elliptic Curves EC-KCDSA (2014)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory, 644–654 (1976)
Kelsey, J.: SHA-160: A Truncation Mode for SHA256 (and most other hashes). Cryptographic Hash Workshop, NIST (2005)
Matyas, S.: Digital signatures — an overview. Computer Networks, 87–94 (1979)
Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Lee, J., Lee, P.J. (2014). Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode. In: Chen, L., Mitchell, C. (eds) Security Standardisation Research. SSR 2014. Lecture Notes in Computer Science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-14054-4_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14053-7
Online ISBN: 978-3-319-14054-4
eBook Packages: Computer ScienceComputer Science (R0)