An Efficient Signature System Using Optimized RSA Algorithm

被引:0
作者
El-Sayed, Rania Salah [1 ]
Abd El-Aziem, Moustafa [2 ]
Gomaa, Mohammad Ali [3 ]
机构
[1] Acad Sci Res & Technol Cairo, Cairo, Egypt
[2] Arab Acad Sci & Technol & Maritime Transport Cair, Cairo, Egypt
[3] Al Azhar Univ Cairo, Fac Sci, Dept Comp Sci, Cairo, Egypt
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 12期
关键词
Cryptography; RSA; DSS; PKC and DSA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signature are used in message transmission to verify the identity of the sender and ensure that a message has not been modified after signing. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In this paper, we have develop a new algorithm for generating signature that overcomes the shortcomings of the RSA system (longer processing time & computational overheads). In addition, the new algorithm achieve high security for digital signature. The performance of the two public key cryptosystem (RSA and DSS) and the new algorithm has been implemented and compared. The results obtained show that signing and verification operations are faster in the case of using new algorithm than in the case of RSA and DSS. Also it can forbid any one from reaching the sender's message because with the new algorithm an intruder cannot pose the message sent since the sender's private key is unknown for him. Accordingly, the sender can not be impersonated. On the receiver part, the message is verified by using sender's public key and his private key to decrypt the message successfully.
引用
收藏
页码:343 / 348
页数:6
相关论文
共 12 条
  • [1] [Anonymous], 2000, FED INF PROC STAND P, V186
  • [2] Diffie W., 1978, IEEE T INFORM THEORY, VIT-22, P472
  • [3] ECKEL B, 2000, THINKING C, V1
  • [4] Flinn P.J., 1997, USING RSA ALGORITHM
  • [5] Kaliski B, 2006, MATH RSA PUBLIC KEY
  • [6] Mahan Robert E., 1998, DIGITAL SIGNATURES A
  • [7] Menezes A., 1997, HDB APPL CRYPTOGRAPH
  • [8] Namin A. Hosseinzadeh, 2005, ELLIPTIC CURVE CRYPT
  • [9] NYBERG K, 1994, ADV CRYPTOLOGY EUROC, P182
  • [10] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017