Security Evaluation of Different Hashing Functions with RSA for Digital Signature

M. Badawy
{"title":"Security Evaluation of Different Hashing Functions with RSA for Digital Signature","authors":"M. Badawy","doi":"10.21608/ijci.2023.208602.1108","DOIUrl":null,"url":null,"abstract":"The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest–Shamir–Adleman (RSA) method, based on the Miller-Rabin technique, as a stream key generator with five distinct hashing functions to attain robust digital signatures. The RSA encryption method underwent a comprehensive battery of tests to assess its validity, and its encryption efficacy was evaluated through mathematical analysis. This research examines the assessment of digital signatures by utilizing five distinct hash functions in conjunction with RSA keys. Each signature file was assessed based on four tests: entropy, floating frequency, autocorrelation, and histogram analysis. The tests were conducted on a document with a size of 256 bytes. In addition, nine hash algorithms were utilized, namely SHA224, SHA256, SHA384, SHA512, BLAKE2B, BLAKE2S, MD5, MD2, and RIPEMD160. Different algorithms were used for varying key sizes and word counts for hashing. The experiment was repeated 100 times to obtain precise measurements of the average time and entropy. The findings indicate that when implemented with an appropriate key length, RSA exhibits both efficiency and sufficient security to be deployed in IoT networks.","PeriodicalId":137729,"journal":{"name":"IJCI. International Journal of Computers and Information","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IJCI. International Journal of Computers and Information","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/ijci.2023.208602.1108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest–Shamir–Adleman (RSA) method, based on the Miller-Rabin technique, as a stream key generator with five distinct hashing functions to attain robust digital signatures. The RSA encryption method underwent a comprehensive battery of tests to assess its validity, and its encryption efficacy was evaluated through mathematical analysis. This research examines the assessment of digital signatures by utilizing five distinct hash functions in conjunction with RSA keys. Each signature file was assessed based on four tests: entropy, floating frequency, autocorrelation, and histogram analysis. The tests were conducted on a document with a size of 256 bytes. In addition, nine hash algorithms were utilized, namely SHA224, SHA256, SHA384, SHA512, BLAKE2B, BLAKE2S, MD5, MD2, and RIPEMD160. Different algorithms were used for varying key sizes and word counts for hashing. The experiment was repeated 100 times to obtain precise measurements of the average time and entropy. The findings indicate that when implemented with an appropriate key length, RSA exhibits both efficiency and sufficient security to be deployed in IoT networks.
不同哈希函数在RSA数字签名中的安全性评估
物联网(IoT)的出现代表了一个重要的趋势,将IP、数据和无线技术集成到一个网络上,产生了既重要又吸引人的巨大优势。然而,这些实体的合并为渗透物联网网络带来了新的敏感性和机会,因此需要集成安全方法的不断发展。本研究探讨了利用基于Miller-Rabin技术的Rivest-Shamir-Adleman (RSA)方法作为具有五种不同散列函数的流密钥生成器以获得鲁棒数字签名的可行性。RSA加密方法经过了一系列全面的测试来评估其有效性,并通过数学分析来评估其加密效果。本研究通过结合使用五种不同的散列函数和RSA密钥来检查数字签名的评估。每个签名文件基于四项测试进行评估:熵、浮动频率、自相关和直方图分析。测试是在一个大小为256字节的文档上进行的。此外,还使用了SHA224、SHA256、SHA384、SHA512、BLAKE2B、BLAKE2S、MD5、MD2、RIPEMD160等9种哈希算法。不同的算法用于不同的密钥大小和散列的字数。实验重复了100次,以获得平均时间和熵的精确测量。研究结果表明,当使用适当的密钥长度实施时,RSA显示出在物联网网络中部署的效率和足够的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信