Susceptibility of digital signature schemes based on error-correcting codes to universal forgery

  • Mohssen Alabbadi
  • Stephen B. Wicker
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 829)

Abstract

Xinmei's digital signature scheme and the scheme's modified version as proposed by Harn and Wang have been shown by the authors and others to be susceptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei's scheme are vulnerable to universal forgeries. Equipped with this attack and the earlier ones, general remarks about digital signature schemes based on linear errorcorrecting block codes are presented.

Keywords

Error Vector Electronics Letter Independent Column Digital Signature Scheme Full Rank Matrice 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Alabbadi and S. B. Wicker. Cryptanalysis of the Harn and Wang modification of the Xinmei digital signature scheme. Electronics Letters, 28(18):1756–1758, 27th August 1992.Google Scholar
  2. 2.
    M. Alabbadi and S. B. Wicker. Security of Xinmei's digital signature scheme. Electronics Letters, 28(9):890–891, 23rd April 1992.Google Scholar
  3. 3.
    M. Alabbadi and S. B. Wicker. Digital signature schemes based on error-correcting codes. In IEEE International Symposium on Information Theory, January 17–22 1993. San Antonio, Texas, U.S.A.Google Scholar
  4. 4.
    D. W. Davies and W. L. Price. Security for Computer Networks. John Wiley and Sons, 1989.Google Scholar
  5. 5.
    L. Harn and D.-C. Wang. Cryptanalysis and modification of digital signature scheme based on error-correcting codes. Electronics Letters, 28(2):157–159, 16th January 1992.Google Scholar
  6. 6.
    P. J. Lee and E. F. Brickell. An obsevation on the security of McEliece's public-key cryptosystem. In C. G. Gunther, editor, Lecture Notes in Computer Science # 330, Advances in Cryptology-Eurocrypt '88 Proceedings, pages 275–280, Davos, Switzerland, May 25–27 1988. Springer-Verlag.Google Scholar
  7. 7.
    Yuan-Xing Li. An attack on Xinmei's digital signature scheme. In IEEE International Symposium on Information Theory, January 17–22 1993. San Antonio, Texas, U.S.A.Google Scholar
  8. 8.
    R. J. McEliece. Public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42–44, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, U.S.A. Jan. & Feb. 1978. Pages 114–116.Google Scholar
  9. 9.
    J. Meijers and J. van Tilburg. On the Rao-Nam private-key cryptosystem using linear codes. In IEEE International Symposium on Information Theory, page 126, June 24–28 1991. Budapest, Hungary.Google Scholar
  10. 10.
    National Bureau of Standard. Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, January 1977. U.S. Department of Commerce, Washington, D.C..Google Scholar
  11. 11.
    J. van Tilburg. On the McEliece public-key cryptosystem. In S. Goldwasser, editor, Lecture Notes in Computer Science # 403, Advances in Cryptology-Crypto '88 Proceedings, pages 119–131, Santa Barbara, Ca., Aug. 21–25 1988. Springer-Verlag.Google Scholar
  12. 12.
    J. van Tilburg. Cryptanalysis of Xinmei digital signature scheme. Electronics Letters, 28(20):1935–1936, 24th September 1992.Google Scholar
  13. 13.
    W. Xinmei. Digital signature scheme based on error-correcting codes. Electronics Letters, 26(13):898–899, 21st June 1990.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Mohssen Alabbadi
    • 1
  • Stephen B. Wicker
    • 1
  1. 1.Coding and Information Theory Laboratory School of Electrical and Computer EngineeringGeorgia Institute of TechnologyAtlantaUSA

Personalised recommendations