scispace - formally typeset
Journal ArticleDOI

Des-generated checksums for electronic signatures

Christian Mueller-Schloer
- 01 Jul 1983 - 
- Vol. 7, Iss: 3, pp 257-273
Reads0
Chats0
TLDR
This paper investigates two DES-based hashing methods and it is shown that neither method seems to introduce any statistical regularities in the generated checksums.
Abstract
Secrecy and authentication are two important features of a secure communication system. Public Key Cryptosystems, based, e.g., on the Rivest-Shamir-Adleman (RSA) algorithm, provide a very elegant solution to the problem of authenticity verification or true electronic signatures. Practical problems, however, mainly the lack of execution speed, prevent a straightforward application. In order to sign a long message it is much faster to first calculate a short digest or checksum and then sign the compressed message. For this checksum calculation the fast, inexpensive and extensively tested Data Encryption Standard (DES) can be used. But care must be taken that this additional processing step does not introduce any weakness into the signature scheme. This paper investigates two DES-based hashing methods. It is shown that neither method seems to introduce any statistical regularities in the generated checksums. The “Cipher/Message to Plain Feedback,” however, is not secure under a modification compensation atta...

read more

Citations
More filters
Journal ArticleDOI

Requirements for cryptographic hash functions

TL;DR: The requirements are analysed for logical interdependencies which leads to a framework for the assessment of cryptographic hash functions.
Journal ArticleDOI

Probability to meet in the middle

TL;DR: This paper proposes “Matching Models A, B, and C” for the meet-in-the-middle attacks against a message with digital signature to provide a more sound foundation for the calculation of the probability of success.
Journal ArticleDOI

Occupancy with two types of balls

TL;DR: In this paper, the classical occupancy problem is extended to the case where two types of balls are thrown, and the probability that no urn contains both types of objects is studied.
Patent

Computer-telephone security device

TL;DR: In this article, a computer access security system controls access to a host computer from a remote terminal using a control code deriving device and a subordinate access code derived from the control code.

A Complete Bibliography of Publications in Cryptologia

TL;DR: (t,m) [?]. (t, n) [?"].
Related Papers (5)