常数消息数字签名算法的一种变体

Q2 Computer Science
Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang
{"title":"常数消息数字签名算法的一种变体","authors":"Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang","doi":"10.58346/jisis.2023.i2.005","DOIUrl":null,"url":null,"abstract":"This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Variant of Digital Signature Algorithm for Constant Message\",\"authors\":\"Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang\",\"doi\":\"10.58346/jisis.2023.i2.005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.\",\"PeriodicalId\":36718,\"journal\":{\"name\":\"Journal of Internet Services and Information Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Internet Services and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58346/jisis.2023.i2.005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jisis.2023.i2.005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

本研究旨在提出一种改进的对常量消息进行签名的技术。一般来说,入侵者通常可以相对轻松地窃取恒定消息的数字签名。假设有一个常量消息必须始终由签名者签名,那么数字签名也必须具有一个常量值。如果通过不安全的通道将其传递给接收方或验证器,并在过程中被攻击者截获,则攻击者可以假定签名者的身份,并使用此签名进行身份验证。事实上,所提出的方法,恒定消息数字签名算法(DSACM)和DSACMV2,是RSA和OTP相结合的结果。此外,OTP被选择用于签名和验证过程,其中必须为每个过程重新生成密钥。因此,密文不断变化,但消息保持不变。此外,选择RSA是为了保护密钥在不安全通道上的传输。实验结果表明,DSACM和DSACMV2适合于对具有常数值的消息进行签名,因为签名是一个不确定的值。尽管需要两个加密过程和两个解密过程,但生成密钥和执行异或操作所需的时间几乎没有增加。此外,所提出的方法具有不修改常量消息的优点。事实上,对于更改密文的其他技术,它必须与一个整数(如时间戳和随机数)相结合,并且如果它的长度超过私钥,就不能对它进行一次签名。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Variant of Digital Signature Algorithm for Constant Message
This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Internet Services and Information Security
Journal of Internet Services and Information Security Computer Science-Computer Science (miscellaneous)
CiteScore
3.90
自引率
0.00%
发文量
0
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信