Journal ArticleDOI
Des-generated checksums for electronic signatures
Reads0
Chats0
TLDR
This paper investigates two DES-based hashing methods and it is shown that neither method seems to introduce any statistical regularities in the generated checksums.Abstract:
Secrecy and authentication are two important features of a secure communication system. Public Key Cryptosystems, based, e.g., on the Rivest-Shamir-Adleman (RSA) algorithm, provide a very elegant solution to the problem of authenticity verification or true electronic signatures. Practical problems, however, mainly the lack of execution speed, prevent a straightforward application. In order to sign a long message it is much faster to first calculate a short digest or checksum and then sign the compressed message. For this checksum calculation the fast, inexpensive and extensively tested Data Encryption Standard (DES) can be used. But care must be taken that this additional processing step does not introduce any weakness into the signature scheme. This paper investigates two DES-based hashing methods. It is shown that neither method seems to introduce any statistical regularities in the generated checksums. The “Cipher/Message to Plain Feedback,” however, is not secure under a modification compensation atta...read more
Citations
More filters
Journal ArticleDOI
Requirements for cryptographic hash functions
Fritz Bauspiess,Frank Damm +1 more
TL;DR: The requirements are analysed for logical interdependencies which leads to a framework for the assessment of cryptographic hash functions.
Journal ArticleDOI
Probability to meet in the middle
K. Nishimura,M. Sibuya +1 more
TL;DR: This paper proposes “Matching Models A, B, and C” for the meet-in-the-middle attacks against a message with digital signature to provide a more sound foundation for the calculation of the probability of success.
Journal ArticleDOI
Occupancy with two types of balls
Kazuo Nishimura,Masaaki Sibuya +1 more
TL;DR: In this paper, the classical occupancy problem is extended to the case where two types of balls are thrown, and the probability that no urn contains both types of objects is studied.
Patent
Computer-telephone security device
TL;DR: In this article, a computer access security system controls access to a host computer from a remote terminal using a control code deriving device and a subordinate access code derived from the control code.
A Complete Bibliography of Publications in Cryptologia
TL;DR: (t,m) [?]. (t, n) [?"].
Related Papers (5)
A method for obtaining digital signatures and public-key cryptosystems
Authenticated encryption schemes with linkage between message blocks
Wei-Bin Lee,Chin-Chen Chang +1 more