Abstract
A symmetric cipher such as AES in cryptography is much faster than an asymmetric cipher but digital signatures often use asymmetric key ciphers because they provides the sender’s identity and data integrity. In this paper, a modified-He digital signature scheme is proposed using a one-way hash function. The proposed scheme, unlike the He signature technique, employs Euclid’s Division Lemma with large prime moduli p. Its security is built on large integer factoring, discrete logarithms and expanded root problems. The time complexity of the proposed scheme is . The proposed modified-He scheme is efficient, as evidenced by the analytical results with key lengths greater than 512 bits.
1. Introduction
The purpose of cryptography is to design and analyze protocols that prohibit third parties or the general public from reading private communications. The three prevalent categories of cryptography are symmetric cryptography, asymmetric cryptography and protocols. In this paper, a modified-He digital signature scheme is proposed using a one-way hash function. The paper focuses mainly on asymmetric key ciphers because they satisfy most of the security service requirements. The cryptography classification is shown in Figure 1. No further algorithmic requirements are required for design of protocols as symmetric and asymmetric cryptosystems are sufficient. In general, a stream cipher is faster than a block cipher. A5/2 is a stream cipher that replaces A5/1, voice used to protect the privacy of voice calls in the GSM cellular telephone protocol.
Figure 1.
Cryptography classification.
In 1976, Whitfield Diffie and Martin Hellman were the first to explain the concept of a digital signature scheme. In 1977, RSA developed the first asymmetric key family-based digital signature scheme. Its security was based on factoring a large composite integer. In 1985, Elgamal proposed an alternative digital signature scheme, which was based on the discrete logarithm problem. In 1994, Harn presented a new digital signature scheme to improve digital signature security. One must break both the RSA and the Elgamal scheme simultaneously to break the Harn signature scheme. In 1995, Lee showed that if hackers solve the DL problem, they will be able to forge signatures with a high probability.
The suggested bit lengths of the private key and public key algorithms for the security levels are shown in Table 1. RSA and discrete-logarithm techniques need longer keys. The key length of an elliptic curve scheme is considerably shorter, but it is still twice as long as the key length of a symmetric cipher with the same cryptographic strength [1].
Table 1.
Public-key and private-key algorithm bit lengths.
The authors of the papers [2,3,4,5,6,7,8,9] presented a digital signature scheme based on IFP and DLP. In 2007, Yu-Fang Chung et al. [10] suggested a technique depending on the difficulty of solving the ECDLP. In 2011, Pin-Chang Su [11] introduced the enhanced short signature method, which is based on knapsack and Gap Diffie–Hellman (GDH) groups and whose security is strongly connected to the discrete logarithm assumption. The authors of the papers [12,13,14] outlined a new digital signature scheme based on two difficult problems. In 2018, the authors of the papers [15,16,17] developed and presented new digital signature techniques based on the IFP and DLRP over . In 2020, Xuan et al. [18] proposed a new digital signature scheme based on the difficulty of solving expanded root problems over . In 2021–2022, the authors of the papers [19,20,21] presented a digital signature over HMAC entangled chains, the hidden logarithm problem and visually meaningful image encryption algorithm.
The purpose of this study is to get beyond the He-digital signature method’s limitations. The He digital signature scheme is based on the group , where and are safe prime numbers [8]. Because has two larger prime factors, and , factoring is extremely difficult in practice. As n increases, the likelihood of the prime being a safe prime decreases dramatically. Furthermore, finding an element such that , where and the primes of the form are difficult. As a result, a modified-He digital signature scheme using a one-way hash function is proposed to increase efficiency. The proposed scheme comes under the category of asymmetric key digital signature.
2. Motivation and Outline of the Paper
The digital signature is now the most important part of cryptography because it is used so often. Digital signatures can be used to sign contracts legally, update software in a safer way and make online transactions safe by using digital certificates. It provides integrity, message authentication and nonrepudiation. This paper is organized as follows: Section 3 details the mathematical background: FACT, DLP and expanded root problems; Section 4 presents the proposed algorithm; Section 5 provides a concrete example of the proposed scheme; Section 6 depicts the situation of security attacks; and the last section concludes the contribution of the paper.
3. Security Model
3.1. Factoring Large Integer
Consider the expression
where the variable , , and are all unknown. Factoring the solution into , and into , is extremely difficult for large integers. Equation (1) is known as another form of Euclid’s Division Lemma [22].
3.2. Discrete Logarithm Problem
It is difficult to find the unique exponent x () of g for given integers , i.e.,)
where g is a primitive root and p is a prime number.
3.3. Expanded Root Problem
The following problem is known as a discrete logarithm since a is a constant, b and x are variables [23]
The above problem is called an expanded root problem [18], if both a and b are variables.
4. Proposed a Modified-He Digital Signature Scheme
4.1. Modified-He Digital Signature Scheme
Figure 2 demonstrates that Alice signed her message m using her private key x and Alice’s signature along with the message m is sent through an insecure channel. Later, this signature is validated by Bob.
Figure 2.
Modified-He Digital Signature Scheme.
4.1.1. Public Parameter
Alice randomly chooses the prime p and she chooses another element such that . Then, the public parameter is the pair . The three main parts of the digital signature are key generation, signature generation and signature verification, which are as follows.
4.1.2. Key Generation
Alice randomly chooses two distinct primes, and (); she computes
and
Then, Alice’s private key is x and the public key is y. The key generation algorithm can be described on Algorithm 1 as:
| Algorithm 1 Key Generation Algorithm |
|
Wherein:
- -
- p, g: Global parameters.
- -
- x: Alice’s Private key.
- -
- y: Alice’s Public key.
4.1.3. Signature Generation
To sign a message, m, the following steps are taken:
Alice chooses the random integers for each message m and she computes
and
Then, Alice finds positive integer s and k values satisfying
where hashing the message m is denoted by . Alice chooses different n and t values, if either or . Alice sends the quadruple associated with m to the Bob. So, the signature algorithm is described in Algorithm 2 as:
| Algorithm 2 Signature Generation Algorithm |
|
Wherein:
- -
- m: The message must be signed.
- -
- : Alice’s signature on m.
4.1.4. Signature Verification
Alice verifies . Then, she computes
By checking the equality of y and , Bob can validate the validity of the signature.
The signature verification algorithm can be described in Algorithm 3 as:
| Algorithm 3 Signature Verification Algorithm |
|
If Alice adheres to the guidelines outlined above, the signature is always accepted by Bob. Taking squares on Equation (7) and exponentiating the generator g with the resultant over modulo p proves that .
The time complexity for modular multiplication is , modular exponentiation is . In addition, finding and k require [23]. Therefore the time complexity of the proposed scheme for key generation, signature generation and signature verification is .
5. Concrete Example
5.1. Case No.1
For a length greater than 512 bits, choose the positive integer values , , p, x and g.
- -
- Key Generation:
- value:
- 24204868133185954948052711126594325904950644150970719475783883549526026684120585565950513865485930072746045479777366698672918299160381477023509089521582173311372610467900279664561595681832113078528139
- value:
- 46173725832913847121436400620212043936761099218517385905639143767656777138039469879991523917154111781240677870551683249265592165846507448502443411532538863488166829223210826165970651547223649717795467
- p value:
- 97609316808472870454405302102049090631926400165007064779331430655320976676509628237857272091298564595016008517939469595141604772331116744670145968787226236724839270110107504464205570942192609743912751
- x value:
- 96927043459506992604160311113571440553541919877615452252875327060463577853683601233201782815133749826662760029498030584804703017548549339102193245959130740336143062341792496995862986391669440371955440
- g value:
- 60013100423475503376399617651347989516045909050522869961906226199920595075171660893963793787893012012968840554284018252356769557437724220116706787567813657613554342599141372868197388513025892460290169
- y value:
- 85357427054426942199227586846504813044343555691588811131491758591820003607591087796535054464276499368983800094634708787100885187797117994310277076638012713825790478365924942604617693838464217803924069
- -
- Signature Generation:
- n value:
- 6606054386291357364822658203234928691403561908506902958678631526085068054203034649360833665962190203
- t value:
- 8053063664829756788647635899905504492016188419011410808052242481159600935020471507742315216319919049
- value:
- 70067210427643294166222138993027798549657752697978469744048422500317294658740486555926205285400445471012016076449158573561242986921045773455811824689759844689682710067019646496820350622771577003668315
- value:
- 63286413639814488044951356532672917048602261731658337043906390063897091166780570790757474238526364226010764551385536115912885996253027630186549611517935457368517603605898077282586571429762806196993171
- value:
- 4362334494999478712775223492146009226763303825372585916187531903065240668375193030266442109201908173
- s value:
- 10109401522387889362354893052037631219529810827236397051544803016293074663620418259531567409456774642
- k value:
- 89881079201538338220393406015238195358929126275967524834232024829552517663753517265223614378459978284022849122332354878981301520340512477020707075692653202807205629702940580761107577790339645950841917584875586333453715730999863979292629122054004168288828032880046018817432607968266238388909227544658
- -
- Signature Verification:
- value:
- 70067210427643294166222138993027798549657752697978469744048422500317294658740486555926205285400445471012016076449158573561242986921045773455811824689759844689682710067019646496820350622771577003668315
- value:
- 63286413639814488044951356532672917048602261731658337043906390063897091166780570790757474238526364226010764551385536115912885996253027630186549611517935457368517603605898077282586571429762806196993171
- value:
- 4362334494999478712775223492146009226763303825372585916187531903065240668375193030266442109201908173
- s value:
- 10109401522387889362354893052037631219529810827236397051544803016293074663620418259531567409456774642
- k value:
- 89881079201538338220393406015238195358929126275967524834232024829552517663753517265223614378459978284022849122332354878981301520340512477020707075692653202807205629702940580761107577790339645950841917584875586333453715730999863979292629122054004168288828032880046018817432607968266238388909227544658
- y value:
- 85357427054426942199227586846504813044343555691588811131491758591820003607591087796535054464276499368983800094634708787100885187797117994310277076638012713825790478365924942604617693838464217803924069
- value:
- 85357427054426942199227586846504813044343555691588811131491758591820003607591087796535054464276499368983800094634708787100885187797117994310277076638012713825790478365924942604617693838464217803924069
In this scenario, Bob accepts Alice’s signature (Because Alice’s public key y = Bob’s computed public key y’).
5.2. Case No.2—The Digital Signature s Is a Forgery
- -
- Key Generation:
- value:
- 24204868133185954948052711126594325904950644150970719475783883549526026684120585565950513865485930072746045479777366698672918299160381477023509089521582173311372610467900279664561595681832113078528139
- value:
- 46173725832913847121436400620212043936761099218517385905639143767656777138039469879991523917154111781240677870551683249265592165846507448502443411532538863488166829223210826165970651547223649717795467
- p value:
- 97609316808472870454405302102049090631926400165007064779331430655320976676509628237857272091298564595016008517939469595141604772331116744670145968787226236724839270110107504464205570942192609743912751
- x value:
- 96927043459506992604160311113571440553541919877615452252875327060463577853683601233201782815133749826662760029498030584804703017548549339102193245959130740336143062341792496995862986391669440371955440
- g value:
- 60013100423475503376399617651347989516045909050522869961906226199920595075171660893963793787893012012968840554284018252356769557437724220116706787567813657613554342599141372868197388513025892460290169
- y value:
- 85357427054426942199227586846504813044343555691588811131491758591820003607591087796535054464276499368983800094634708787100885187797117994310277076638012713825790478365924942604617693838464217803924069
- -
- Signature Generation:
- n value:
- 6606054386291357364822658203234928691403561908506902958678631526085068054203034649360833665962190203
- t value:
- 8053063664829756788647635899905504492016188419011410808052242481159600935020471507742315216319919049
- value:
- 70067210427643294166222138993027798549657752697978469744048422500317294658740486555926205285400445471012016076449158573561242986921045773455811824689759844689682710067019646496820350622771577003668315
- value:
- 63286413639814488044951356532672917048602261731658337043906390063897091166780570790757474238526364226010764551385536115912885996253027630186549611517935457368517603605898077282586571429762806196993171
- value:
- 4362334494999478712775223492146009226763303825372585916187531903065240668375193030266442109201908173
- s value:
- 10109401522387889362354893052037631219529810827236397051544803016293074663620418259531567409456774642
- k value:
- 89881079201538338220393406015238195358929126275967524834232024829552517663753517265223614378459978284022849122332354878981301520340512477020707075692653202807205629702940580761107577790339645950841917584875586333453715730999863979292629122054004168288828032880046018817432607968266238388909227544658
- -
- Signature Verification:
- value:
- 70067210427643294166222138993027798549657752697978469744048422500317294658740486555926205285400445471012016076449158573561242986921045773455811824689759844689682710067019646496820350622771577003668315
- value:
- 63286413639814488044951356532672917048602261731658337043906390063897091166780570790757474238526364226010764551385536115912885996253027630186549611517935457368517603605898077282586571429762806196993171
- value:
- 4362334494999478712775223492146009226763303825372585916187531903065240668375193030266442109201908173
- s value:
- 4521308241444014122898680809477187136593433501725012770600777497339439501606330425756001185558080619
- k value:
- 89881079201538338220393406015238195358929126275967524834232024829552517663753517265223614378459978284022849122332354878981301520340512477020707075692653202807205629702940580761107577790339645950841917584875586333453715730999863979292629122054004168288828032880046018817432607968266238388909227544658
- y value:
- 85357427054426942199227586846504813044343555691588811131491758591820003607591087796535054464276499368983800094634708787100885187797117994310277076638012713825790478365924942604617693838464217803924069
- value:
- 94805404770283119169184237934036849389009329852856940437329202514352678675112384998024393372605900982597679807777937374725414832514624329996562642611822655963113671746537255685709398262399855215280623.
The signature s has been changed in this instance and the result is a denial of the signature and message authentication. As a result (), Bob rejects the forged signature.
6. Security Attacks
6.1. Public Key Attack
Assume an enemy tries to launch an assault by exposing the private key deriving it from the public key. First, the enemy has to solve the discrete logarithm problem from (4) to acquire . Then, the enemy has to solve the FAC problem to obtain x from .
6.2. Valid Signature Attack
6.3. Forging a Valid Signature Attack
In case an enemy tries to launch an assault by faking a legitimate signature with a certain message m without being aware of any acceptable signatures or Alice’s private key. With the message m in mind, if the enemy tries to solve a four-variable , , s and k satisfying (8). Then, three variables are set to fixed integers before determining the answer to the last variable from (8). Given y, g, m, , s, k or given y, g, m, , s, k, finding or in order to satisfy (8) is according to FAC and the DL assumptions.
6.4. Known Message Attack
Suppose the enemy has access to the signatures , , …, for a set of messages , , …, . Then, the enemy tries to find the value from the following formula to make a forgery:
where , but finding x to satisfy (7) is according to FAC.
6.5. Total Break
Since (3) is an expanded root problem, finding the private key x is impossible.
6.6. Existential Unforgeability under Chosen Message Attack
Suppose the information and are known to the enemy. With these details, there must be at least one that meets the (8) condition. The above strategy only works if the value is the same for both and messages. Alice chooses different n and t values for each message m. As a result, does not satisfy the requirement of (8).
7. Conclusions
Finding the primes of the form , where and are safe prime numbers, is challenging in the Wei-Hua-He signature scheme. So, the He digital signature scheme is inappropriate for large prime numbers. The contribution of the paper is to get rid of the flaws in the He digital signature scheme. As a result, a modified-He digital signature scheme is proposed based on a one-way hash function with a big prime modulus p. The time complexity of the algorithm is . The proposed modified-He digital signature scheme is more efficient and gives a higher level of security.
Author Contributions
Conceptualization, E.R.; methodology, E.R. and G.S.G.N.A.; writing—original draft preparation, E.R.; writing reviews and editing, E.R. and G.S.G.N.A.; supervision, G.S.G.N.A.; All authors have read and agreed to the published version of the manuscript.
Funding
This research work is supported by Vellore Institute of Technology, Vellore.
Data Availability Statement
Not applicable.
Acknowledgments
The authors wish to thank the management of Vellore Institute of Technology (Vellore-632014) for their continuous support and encouragement to carry out this research work.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
| Symbol/Acronym | Description |
| p | Prime number |
| Finite Field | |
| g | Generator of |
| Greatest Common Divisor of the integers p and g | |
| g mod p | Remainder upon dividing g by p |
| x | Secret key |
| y | Public key |
| m | Message |
| Hashing of the message | |
| Signature | |
| IFP | Integer Factoring Problem |
| DLP | Discrete Logarithm Problem |
| RC | Rivest Cipher |
| RSA | Rivest Shamir Adleman |
| DH | Diffie Hellman |
| DSA | Digital Signature Algorithm |
| ECDLP | Elliptic Curve Discrete Logarithm Problem |
| ECDH | Elliptic Curve Diffie Hellman |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| 3DES | Trible Data Encryption Standard |
| AES | Advanced Encryption Standard |
References
- Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: New York, NY, USA, 2009. [Google Scholar]
- Harn, L. Enhancing the security of El Gamal’s signature scheme. IEE Proc.-Comput. Digit. Tech. 1995, 142, 376. [Google Scholar] [CrossRef]
- Lee, N.Y.; Hwang, T. The security of He and Kiesler’s signature schemes. IEE Proc.-Comput. Digit. Tech. 1995, 142, 370–372. [Google Scholar] [CrossRef]
- Tiersma, H. Enhancing the security of El Gamal’s signature scheme. IEE Proc.-Comput. Digit. Tech. 1997, 144, 47–48. [Google Scholar] [CrossRef]
- Shao, Z. Signature schemes based on factoring and discrete logarithms. IEE Proc.-Comput. Digit. Tech. 1998, 145, 33–36. [Google Scholar] [CrossRef]
- Li, J.; Xiao, G. Remarks on new signature scheme based on two hard problems. Electron. Lett. 1998, 34, 2401. [Google Scholar] [CrossRef]
- Lee, N. Security of Shao’s signature schemes based on factoring and discrete logarithms. IEE Proc.-Comput. Digit. Tech. 1999, 146, 119–121. [Google Scholar] [CrossRef]
- He, W.H. Digital signature scheme based on factoring and discrete logarithms. Electron. Lett. 2001, 37, 220–222. [Google Scholar] [CrossRef]
- Pon, S.; Lu, E.; Jeng, A. Meta-He digital signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 2005, 165, 171–176. [Google Scholar]
- Chung, Y.F.; Huang, K.H.; Lai, F.; Chen, T.S. ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Stand. Interfaces 2007, 29, 601–604. [Google Scholar] [CrossRef]
- Su, P.C. Enhanced short signature scheme with hybrid problems. Comput. Electr. Eng. 2011, 37, 174–179. [Google Scholar] [CrossRef]
- Verma, S.; Sharma, B.K. A new digital signature scheme based on two hard problems. Int. J. Pure Appl. Sci. Technol. 2011, 5, 55–59. [Google Scholar]
- Vishnoi, S.; Shrivastava, V. A new digital signature algorithm based on factorization and discrete logarithm problem. Int. J. Comput. Trends Technol. 2012, 3, 653–657. [Google Scholar]
- Berezin, A.; Moldovyan, N.; Shcherbacov, V. Cryptoschemes Based on Dificulty of Simultaneous Solving Two Diferent Dificult Problems. Comput. Sci. J. Mold. 2013, 62, 280–290. [Google Scholar]
- Van Hiep, P.; Mong, N.H.; Dung, L.H. Constructing a digital signature algorithm based on the difficult of co-resolve two hard problems: Integer factorization and discrete logarithm. J. Sci. Technol. Danang Univ. 2018, 7, 28. [Google Scholar]
- Thai, N.V.; Dung, L.H. A public key cryptosystem based on the difficult of co-resolved two hard problems: Discrete logarithm and root finding. J. Inf. Commun. Minist. Inf. Commun. 2018, 12, 2018. [Google Scholar]
- Dung, L.H.; Duc, T.M.; Van, L.X. A new method for constructing digital signature schemes base on difficulty of the integer factorization and discrete logarithm root problems the Zn. In Proceedings of the Fundamental and Applied IT Research Conference, Hanoi, Vietnam, 8–9 October 2018; pp. 1–9. [Google Scholar]
- Hong, D.L. A new digital signature scheme based on the hardness of some expanded root problems. Procedia Comput. Sci. 2020, 171, 541–550. [Google Scholar]
- Lizama-Pérez, L.A. Digital signatures over HMAC entangled chains. Eng. Sci. Technol. Int. J. 2022, 32, 101076. [Google Scholar] [CrossRef]
- Moldovyan, D. A practical digital signature scheme based on the hidden logarithm problem. Comput. Sci. J. Mold. 2021, 86, 206–226. [Google Scholar]
- Huang, X.; Dong, Y.; Ye, G.; Yap, W.S.; Goi, B.M. Visually meaningful image encryption algorithm based on digital signature. Digit. Commun. Netw. 2022, in press. [Google Scholar] [CrossRef]
- Gallian, J.A. Contemporary Abstract Algebra; Chapman and Hall: New York, NY, USA, 2021. [Google Scholar]
- Koblitz, N. A Course in Number Theory and Cryptography; Springer Science & Business Media: New York, NY, USA, 1994; Volume 114. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).