DocumentCode :
2517701
Title :
Utilization of multiple block cipher hashing in authentication and digital signatures
Author :
Rahouma, Kamel H.
Author_Institution :
Pfeifferhofstr., Salzburg, Austria
fYear :
2000
fDate :
2000
Firstpage :
257
Lastpage :
261
Abstract :
A new algorithm for authentication and digital signature is introduced. It is based on using four different hash functions classified as very secure against all attacks except the brute force one. The hash function used is selected by computing nfi=r i mod 4 where ri is randomly generated and the initial hash sequence H0 is publicized by the sender. According to nfi, he/she prepares every message block Mi for encryption by applying a special block cipher technique to obtain the cipher block Ci. Then, the corresponding new hash value Hi is obtained. The value ri is encrypted to Ri using the sender´s secret RSA key ds and then the receiver´s public one er (this could be reversed if nr>ns where nr and ns are the modulus numbers of the receiver and sender respectively). The code sent by the sender to the receiver is composed of the combination (Ci, Hi, Ri). This could be useful in checking the integrity of the transmitted message as a whole. The receiver reads the public values H0, es and ns. Then he/she decrypts the cipher Ci and uses his private RSA key dr and the senders public one es to decrypt Ri. Decryption of Ci yields the prepared block before encryption and decryption of Ri yields the value ri. Using ri, the receiver can compute nfi=ri mod 4. Using nfi and Hi-1 , he/she can compute the message block Mi´ and the hash value Hi´. If Hi´=Hi then Mi´=Mi and this means that the message block Mi´ was sent by the sender. If this condition is not satisfied, then the message is either changed or sent by another sender. This algorithm is easy to implement and hard to attack
Keywords :
cryptography; decoding; message authentication; authentication algorithm; code; decryption; digital signatures algorithm; encryption; hash functions; message block; multiple block cipher hashing; receiver public RSA key; secret RSA key; sender secret RSA key; transmitted message integrity; Algorithm design and analysis; Authentication; Digital signatures; Protocols; Public key; Public key cryptography; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks, 2000. (ICON 2000). Proceedings. IEEE International Conference on
Print_ISBN :
0-7695-0777-8
Type :
conf
DOI :
10.1109/ICON.2000.875798
Filename :
875798
Link To Document :
بازگشت