Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The Variant of Digital Signature Algorithm for Constant Message

View through CrossRef
This study aims to present a modified technique for signing constant messages. In general, intruders may often steal the digital signature of a constant message with relative ease. Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value. If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication. In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP. In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process. Thus, the ciphertext is constantly changing, but the message remains fixed. Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel. The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value. Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little. In addition, the proposed methods have the benefit that the constant message is not modified. In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.
Title: The Variant of Digital Signature Algorithm for Constant Message
Description:
This study aims to present a modified technique for signing constant messages.
In general, intruders may often steal the digital signature of a constant message with relative ease.
Assuming there is a constant message that must always be signed by the signer, the digital signature must equally have a constant value.
If it is communicated through an insecure channel to the recipient or verifier and is intercepted along the way by attackers, they can assume the identity of the signer and use this signature for authentication.
In fact, the proposed method, Digital Signature Algorithm for Constant Message (DSACM) and DSACMV2, are the result of the combination between RSA and OTP.
In addition, OTP is selected for signing and validating procedures in which the secret key must be regenerated for each process.
Thus, the ciphertext is constantly changing, but the message remains fixed.
Moreover, RSA is chosen to protect the transmission of the secret key across an insecure channel.
The experimental findings indicate that DSACM and DSACMV2 are suitable for signing a message with a constant value because the signature is an undetermined value.
Although it takes two encryption procedures and two decryption processes, the time required to generate the secret key and perform the exclusive or operation increases little.
In addition, the proposed methods have the benefit that the constant message is not modified.
In fact, it must be combined with an integer such as a timestamp and a random number for the other techniques for changing the ciphertext, and it cannot be signed a single time if its length exceeds the private key.

Related Results

A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
Introduction: Development of practical post-quantum signature algorithms is a current challenge in the area of cryptography. Recently, several candidates on post-quantum signature ...
Frequency and Diversity of Variant Philadelphia Chromosome In Chronic Myeloid Leukemia Patients
Frequency and Diversity of Variant Philadelphia Chromosome In Chronic Myeloid Leukemia Patients
Abstract Abstract 4903 The Philadelphia chromosome (Ph), t(9;22), is detected in around 90% of the chronic myeloid leukemia (CML) patients, but in the...
Abstract P1-05-23: Utilities and challenges of RNA-Seq based expression and variant calling in a clinical setting
Abstract P1-05-23: Utilities and challenges of RNA-Seq based expression and variant calling in a clinical setting
Abstract Introduction Variant calling based on DNA samples has been the gold standard of clinical testing since the advent of Sanger sequencing. The u...
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Eksistensi Digital Wedding Di Era Disrupsi Dalam Maqashid Syariah
Abstract The era of disruption has presented a new phenomenon in wedding procedures, namely digital weddings.  The emergence of digital marriage raises questions about its validity...
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
A post-quantum digital signature scheme on groups with four-dimensional cyclicity
Introduction: Development of practical post-quantum signature schemes is a current challenge in the applied cryptography. Recently, several different forms of the hidden discrete l...

Back to Top