scispace - formally typeset
Journal ArticleDOI

Applying the RSA Digital Signature to Electronic Mail

Davies
- 01 Feb 1983 - 
- Vol. 16, Iss: 2, pp 55-62
Reads0
Chats0
TLDR
Authentication by the customary methods using symmetric ciphers can do nothing to resolve disputes arising from the dishonesty of either sender or receiver and was proposed as a solution to the dispute problem.
Abstract
Because of the increased cost-effectiveness of computer technology and its subsequent acceptance into the business world, computer-based message systems are likely to become the principal carriers of business correspondence. Unfortunately with the efficiency of these systems come new possibilities for crime based on interference with digital messages. But the same technology that poses the threat can be used to resist and perhaps entirely frustrate potential crimes. For some messages, a degree of privacy or secrecy is needed, which is possible with encryption. However, predicting the extent encryption will be used in electronic mail is difficult, since much depends on the cost and convenience of its applications. For nearly all messages, authenticity is a prime requirement. Authenticity implies that the message is genuine in two respects: its text has not changed since it left the sender and the identity of the sender is correctly represented in the text header or in the signature attached to the message. Neither of these authenticity indicators is sufficient by itself because an altered message from sender A is in no way different from a message appearing to come from A but in fact coming from an enemy. The technique of authentication, which is closely related to cryptography, normally uses the symmmetric type of cipher, typified by the Data Encryption Standard, or DES, algorithm. This kind of authentication is seriously deficient because both the sender and receiver must know a secret key. The sender uses the key to generate an authenticator, and the receiver uses it to check the authenticator. With this key, the receiver can also generate authenticators and can therefore forge messages appearing to come from the sender. In other words, authentication can protect both sender and receiver against thirdparty enemies, but it cannot protect one against fraud committed by the other. If A sends a message to B, for example, B might fraudulently claim to have received a different message. Supposing B takes some action in response to a genuine received message, A can still claim that B in fact forged the message. For these reasons, authentication by the customary methods using symmetric ciphers can do nothing to resolve disputes arising from the dishonesty of either sender or receiver. As a solution to the dispute problem, Diffie and Hellmant proposed the use of a digital signature based on certain public-key cryptosystems (Figure 1). The sender of the message is responsible for generating the

read more

Citations
More filters
Proceedings ArticleDOI

The new high-speed digital signature

TL;DR: This work proposes a high-speed digital signature scheme that has the security level even with the difficulty of factoring in large numbers, and is compared with the RSA scheme to evaluate its performance.
Journal ArticleDOI

Blockchain Compliance with Federal Cryptographic Information Processing Standards

TL;DR: In this article, the authors evaluate four major blockchain technologies (Ethereum, Hyperledger Fabric, R3's Corda, and Multichain) to determine their level of NIST compliance.
Patent

Data architecture for supporting multiple search models

TL;DR: In this paper, a search and match computing system is defined to determine if the query is a structured query or an unstructured query, and process the query with at least one of an application programming interface configured to receive structured queries or a second application program interface receiving unstructures, and then process the received search results to generate an output data packet for access by the third party computing system.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Book

Secrecy, authentication, and public key systems

TL;DR: An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and retracted by a reversible linear motor to maintain a desired constant load and to prevent overloading.
Journal ArticleDOI

Digital signatures — An overview

TL;DR: Two types of digital signatures are investigated: true signatures, and arbitrated signatures: a true signature can be validated by anyone having the correct nonsecret (public) validation parameter, whereas an arbitrated signature must be validate by a trusted arbiter.