مروری بر طرح های امضای دیجیتال مبتنی بر رمزنگاری نامتقارن و کاربرد آن‌ها

نوع مقاله : مروری

نویسندگان

1 استادیار گروه علوم پایه و فناوری اطلاعات دانشگاه امام حسین(ع)، مجتمع دانشگاهی امام خامنه ای «مدظله»

2 استادیار دانشکده علوم دانشگاه امام خمینی(ره) نوشهر

چکیده

با توجه به رشد سریع تعاملات برخط در اینترنت، سرویس های امنیتی مانند احراز هویت ، عدم انکار، جامعیت و محرمانگی پیام‌ها از الزامات ضروری جهت انجام یک تعامل امن در این فضا، یعنی فضای سایبر، می‌باشند. رمزنگاری اطلاعات یکی از مهم‌ترین روش‌های حفاظت از اطلاعات در فضای سایبری است. برای دستیابی به این اهداف، امضای دیجیتال، کارآمدترین ابزار است که با استفاده از رمزنگاری صورت می‌گیرد. در این مقاله یک مطالعه 9جامع از این طرح‌های امضای دیجیتالی مبتنی بر طرح‌های رمزنگاری RSA ، DSA و ECDSA و نسخه بهبود یافته آنها انجام داده و آن‌ها را مورد بررسی مقایسه ای قرار می‌دهیم.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

A review of digital signature Schemes, Based on Asymmetric cryptography and their applications

نویسندگان [English]

  • Mohammad Ali Shame alizadeh 1
  • alireza shabani 2
چکیده [English]

Abstract
Due to the rapid growth of online interactions on the Internet, security services such as authentication, non-repudiation, integrity and Confidentiality are very essential security requirements for a secure transaction. Information encryption is one of the most important ways to protect information in cyberspace. To achieve these goals, digital signature is the most efficient tool that uses cryptography. In this paper, we conduct a comprehensive study of these digital signature schemes based on the RSA, DSA and ECDSA encryption schemes and their improved versions and compare them. In this paper checked out a review of digital signature Schemes, Based on Asymmetric cryptography and their applications.

کلیدواژه‌ها [English]

  • Public Key Encryption
  • Cyberspace
  • Digital Signature
  • Comparison of signature schemes
[2]    Joseph A., and et al., A Survey on Cryptography Techniques, International journal of Computer Sience and Mobile Computing, Vol.5, pp.55-59, 2016.
[3]    Omar G. and et al., A Survey on  Cryptography Algorithms, International journal of Scintefics and Research publications, Vol.8, pp. 495-515, 2018.
[4]    Batten, L., digital signature, wiley-ieee press, pp.103-131, 2013. http://www.freepapers.ir/PDF.
[5]    Pallipamu, V., Reddy T.K. and Varma, S.P. " A Survey on Digital Signatures", International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 3, 7243-7246, 2014.
[6]    Kaur, R., Kaur, A. "Digital signature",  international conference on computing sciences, 2012.
[7]    Alize-Chacon, I., & Chacon-Rivas, M.  "Authenticity and versioning of learning   objects using the digital signature infrastructure of Costa Rica", In Learning Objects and Technology (LACLO), Latin American Conference on IEEE, 2016.
[8]    Lin, I.C. and Wang, H.L. " An Improved Digital Signature Scheme with Fault Tolerance in RSA",  6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2010.
[9]    Xue ,H. "Improving the Fault-Tolerant Scheme Based on the RSA System",  International Symposium on Computational Intelligence and Design, 2010.
[10] Rifaat Mohammed, M. "Computation Complexity Improvement for Digital Signature Algorithm", (Unpublished Master’s Thesis), Middle East University, Amman, Jordan, 2017.
[11] Hairong, Z., Rong, L., Lingl, L. and Ying, D. "Improved Speed Digital Signature Algorithm Based on Modular   Inverse",  International Conference on Measurement, Information and Control, 2013.
 
[12] Han, G., Ma, C. and Cheng, Q. "A Generalization of DSA Based on the Conjugacy Search Problem",  International Workshop on Education Technology and Computer Science, 3, 348-351, 2010.
[13] Junru, H.  " The Improved Elliptic Curve Digital Signature Algorithm",  International Conference on Electronic &  Mechanical Engineering and Information Technology, Harbin, 2011.
[14] Li, H., Zhang, R., Yi, J. and Lv, H.  "A Novel Algorithm for Scalar Multiplication in ECDSA",  5th International   Conference on Computational and Information Sciences, 943-946, 2013.
[15] Lamba, S. and Sharma, M. "An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA) ",  International Conference on Machine Intelligence Research and Advancement, Karta, 179-183, 2013.
[16] Bashirpour, H., Bashirpour, S., Shamshirband, S. "An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)", Applied Mathematics and Computation International Journal, 2018.
[17] Si, H., Cai, Y. and Cheng, Z. "An improved RSA signature algorithm based on complex numeric operation function", International Conference on Challenges in Environmental Science and Computer Engineering, 397-400, 2010.