scispace - formally typeset
Journal ArticleDOI

Applying the RSA Digital Signature to Electronic Mail

Davies
- 01 Feb 1983 - 
- Vol. 16, Iss: 2, pp 55-62
Reads0
Chats0
TLDR
Authentication by the customary methods using symmetric ciphers can do nothing to resolve disputes arising from the dishonesty of either sender or receiver and was proposed as a solution to the dispute problem.
Abstract
Because of the increased cost-effectiveness of computer technology and its subsequent acceptance into the business world, computer-based message systems are likely to become the principal carriers of business correspondence. Unfortunately with the efficiency of these systems come new possibilities for crime based on interference with digital messages. But the same technology that poses the threat can be used to resist and perhaps entirely frustrate potential crimes. For some messages, a degree of privacy or secrecy is needed, which is possible with encryption. However, predicting the extent encryption will be used in electronic mail is difficult, since much depends on the cost and convenience of its applications. For nearly all messages, authenticity is a prime requirement. Authenticity implies that the message is genuine in two respects: its text has not changed since it left the sender and the identity of the sender is correctly represented in the text header or in the signature attached to the message. Neither of these authenticity indicators is sufficient by itself because an altered message from sender A is in no way different from a message appearing to come from A but in fact coming from an enemy. The technique of authentication, which is closely related to cryptography, normally uses the symmmetric type of cipher, typified by the Data Encryption Standard, or DES, algorithm. This kind of authentication is seriously deficient because both the sender and receiver must know a secret key. The sender uses the key to generate an authenticator, and the receiver uses it to check the authenticator. With this key, the receiver can also generate authenticators and can therefore forge messages appearing to come from the sender. In other words, authentication can protect both sender and receiver against thirdparty enemies, but it cannot protect one against fraud committed by the other. If A sends a message to B, for example, B might fraudulently claim to have received a different message. Supposing B takes some action in response to a genuine received message, A can still claim that B in fact forged the message. For these reasons, authentication by the customary methods using symmetric ciphers can do nothing to resolve disputes arising from the dishonesty of either sender or receiver. As a solution to the dispute problem, Diffie and Hellmant proposed the use of a digital signature based on certain public-key cryptosystems (Figure 1). The sender of the message is responsible for generating the

read more

Citations
More filters
Patent

Digital signature method and key agreement method

TL;DR: In this paper, a digital signature method based on the discrete logarithm problem is provided that allows message recovery, where the message x is transformed according to the rule a = x g -r mod p, where r is a secret value generated by the signer.
Book

Foundations of Security: What Every Programmer Needs to Know

TL;DR: Using web servers and web applications as running examples throughout, this comprehensive guide helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.
Patent

Systems and methods for providing an integrated identifier

TL;DR: In this article, the authors provide systems and methods to streamline the mechanism by which data users access differently regulated data through the use of one or more integrated identifiers, which can be used to persistently identify and track the customers over time and across applications that access regulated and/or non-regulated data.
Book ChapterDOI

Producing a One-Way Hash Function from DES

TL;DR: This paper deals with compressing messages via a one-way hash function before creating a digital signature using DES, and three previous suggestions for doing this using DES are shown to be insecure.
Patent

Systems and methods for data verification

TL;DR: In this article, the authors present a system and methods for verifying data including income and employment, assets, healthcare claims, clinical data, and other types of data subject to various regulatory and/or privacy restrictions.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Book

Secrecy, authentication, and public key systems

TL;DR: An automatic control system for a tube expander tool of the type having a hydraulically powered rotary tool which is advanced and retracted by a reversible linear motor to maintain a desired constant load and to prevent overloading.
Journal ArticleDOI

Digital signatures — An overview

TL;DR: Two types of digital signatures are investigated: true signatures, and arbitrated signatures: a true signature can be validated by anyone having the correct nonsecret (public) validation parameter, whereas an arbitrated signature must be validate by a trusted arbiter.