On the security of digital signature protocol based on iterated function systems.

A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, w...

Full description

Saved in:
Bibliographic Details
Main Authors: M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan
Format: Article
Language:English
English
Published: Hikari Ltd 2011
Online Access:http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf
http://psasir.upm.edu.my/id/eprint/25177/
http://www.m-hikari.com/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.25177
record_format eprints
spelling my.upm.eprints.251772015-10-20T00:49:36Z http://psasir.upm.edu.my/id/eprint/25177/ On the security of digital signature protocol based on iterated function systems. M. G. AL-Saidi, Nadia Md. Said, Mohamad Rushdan A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. They are considered as time consuming to be involved in solving non-linear systems numerically over the defined infinite subfield. Hikari Ltd 2011 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf M. G. AL-Saidi, Nadia and Md. Said, Mohamad Rushdan (2011) On the security of digital signature protocol based on iterated function systems. International Journal of Mathematical Analysis, 5 (29). pp. 1399-1410. ISSN 1312-8876; ESSN:1314-7579 http://www.m-hikari.com/ English
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
English
description A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. They are considered as time consuming to be involved in solving non-linear systems numerically over the defined infinite subfield.
format Article
author M. G. AL-Saidi, Nadia
Md. Said, Mohamad Rushdan
spellingShingle M. G. AL-Saidi, Nadia
Md. Said, Mohamad Rushdan
On the security of digital signature protocol based on iterated function systems.
author_facet M. G. AL-Saidi, Nadia
Md. Said, Mohamad Rushdan
author_sort M. G. AL-Saidi, Nadia
title On the security of digital signature protocol based on iterated function systems.
title_short On the security of digital signature protocol based on iterated function systems.
title_full On the security of digital signature protocol based on iterated function systems.
title_fullStr On the security of digital signature protocol based on iterated function systems.
title_full_unstemmed On the security of digital signature protocol based on iterated function systems.
title_sort on the security of digital signature protocol based on iterated function systems.
publisher Hikari Ltd
publishDate 2011
url http://psasir.upm.edu.my/id/eprint/25177/1/On%20the%20security%20of%20digital%20signature%20protocol%20based%20on%20iterated%20function%20systems.pdf
http://psasir.upm.edu.my/id/eprint/25177/
http://www.m-hikari.com/
_version_ 1643828582692159488
score 13.211869