Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode

  • Jinwoo Lee
  • Pil Joong Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8893)

Abstract

Digital signature mechanism with appendix(DSwA) is a type of digital signature in which, after the message, a signature Σ is appended. When DSwA is constructed based on the discrete logarithm problem, Σ is composed of a pair (R,S). When R is a hashcode with bit length γ and S is an element of subgroup of order q with bit length β, it is recommended to adjust γ and β to be similar because the security strength depends on the smaller value between γ and β. However in some circumstances only hash functions with longer output could be available. Then γ becomes unnecessarily longer than β, and hence the longer Σ is appended. For the above case, we propose a generalized method for reducing the size of Σ by truncating R by β without loss of any security strength. Our proposed method can be applied to mechanisms like KCDSA, SDSA, EC-KCDSA, and EC-SDSA in ISO/IEC 14888-3: Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms.

Keywords

Digital Signature KCDSA SDSA ISO/IEC 14888-3 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ISO/IEC 10118-1 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 1: General (2000)Google Scholar
  2. 2.
    ISO/IEC 10118-3 (3rd edn.): Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions (2004)Google Scholar
  3. 3.
    ISO/IEC 14888-1 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 1: General (2008)Google Scholar
  4. 4.
    ISO/IEC 14888-3 (2nd edn.): Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2006)Google Scholar
  5. 5.
    N13975 Text of ISO/IEC 3rd WD for 3rd edition of 14888-3: Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (2014)Google Scholar
  6. 6.
    FIPS 180-4: Secure Hash Standard (SHS) (2012)Google Scholar
  7. 7.
    TTAK.KO-12.0001/R3: Digital Signature Mechanism with Appendix — Part 2: Korean Certificate-based Digital Signature Algorithm KCDSA (2014)Google Scholar
  8. 8.
    TTAK.KO-12.0015/R2: Digital Signature Mechanism with Appendix — Part 3: Korean Certificate-based Digital Signature Algorithm using Elliptic Curves EC-KCDSA (2014)Google Scholar
  9. 9.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory, 644–654 (1976)Google Scholar
  10. 10.
    Kelsey, J.: SHA-160: A Truncation Mode for SHA256 (and most other hashes). Cryptographic Hash Workshop, NIST (2005)Google Scholar
  11. 11.
    Matyas, S.: Digital signatures — an overview. Computer Networks, 87–94 (1979)Google Scholar
  12. 12.
    Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Jinwoo Lee
    • 1
  • Pil Joong Lee
    • 1
  1. 1.Department of Electrical EngineeringPOSTECHRepublic of Korea

Personalised recommendations