Fast Implementation of Digital Signatures Using Parallel Techniques

N. Kishore, Priya Raina, N. Nayar, Mukesh Thakur
{"title":"Fast Implementation of Digital Signatures Using Parallel Techniques","authors":"N. Kishore, Priya Raina, N. Nayar, Mukesh Thakur","doi":"10.1109/CCGE50943.2021.9776382","DOIUrl":null,"url":null,"abstract":"Digital signatures are widely used to check the authenticity of the identity of the signatory of the message/document and the integrity of the message sent. They are also used by the receiver for ensuring non-repudiation by the sender. They play an important role in making day-to-day processes electronic and paperless. Digital signatures are based on public key infrastructure (PKI). The message digest (hash) of the file is signed by the sender using a private key and appended to the file. The recipient extracts the signature, decrypting it with the sender's public key, and verifies if the received digest matches its own hash calculations. However, complex calculations for secure signatures imply that digital signatures are time consuming for large files. Hashing is the basic security mechanism used in digital signatures that is performed by all the parties and consumes most of the time. This paper presents a solution to this problem by using parallel hashing to achieve fast digital signatures, discussing two possible approaches. The first one uses only parallel hashing, keeping the rest of the algorithm the same as the reference algorithm based on RSA. The second approach parallelizes the entire reference algorithm. Both were implemented using the OpenMP framework, and the experimental results show a significant decline in the execution time in both the cases.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCGE50943.2021.9776382","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Digital signatures are widely used to check the authenticity of the identity of the signatory of the message/document and the integrity of the message sent. They are also used by the receiver for ensuring non-repudiation by the sender. They play an important role in making day-to-day processes electronic and paperless. Digital signatures are based on public key infrastructure (PKI). The message digest (hash) of the file is signed by the sender using a private key and appended to the file. The recipient extracts the signature, decrypting it with the sender's public key, and verifies if the received digest matches its own hash calculations. However, complex calculations for secure signatures imply that digital signatures are time consuming for large files. Hashing is the basic security mechanism used in digital signatures that is performed by all the parties and consumes most of the time. This paper presents a solution to this problem by using parallel hashing to achieve fast digital signatures, discussing two possible approaches. The first one uses only parallel hashing, keeping the rest of the algorithm the same as the reference algorithm based on RSA. The second approach parallelizes the entire reference algorithm. Both were implemented using the OpenMP framework, and the experimental results show a significant decline in the execution time in both the cases.
使用并行技术快速实现数字签名
数码签署广泛用于核实消息/文件签署人的身份是否真实,以及所发出的消息是否完整。接收方也使用它们来确保发送方的不可抵赖性。它们在使日常流程电子化和无纸化方面发挥着重要作用。数字签名基于PKI (public key infrastructure)。文件的消息摘要(哈希)由发送方使用私钥签名并附加到文件中。接收方提取签名,用发送方的公钥解密,并验证接收到的摘要是否与自己的哈希计算相匹配。但是,安全签名的复杂计算意味着对于大文件来说,数字签名非常耗时。散列是数字签名中使用的基本安全机制,由各方执行,占用大部分时间。本文提出了一种利用并行哈希实现快速数字签名的解决方案,并讨论了两种可能的方法。第一种算法只使用并行散列,使算法的其余部分与基于RSA的参考算法相同。第二种方法将整个参考算法并行化。实验结果表明,在这两种情况下,执行时间都有显著下降。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信