Public Comments Received on FIPS 186-4: Digital Signature Standard
نویسنده
چکیده
NIST’s ECC standards create (1) unnecessary losses of sim plicity, security, and speed in ECC implementations and (2) unnecessary tensions between simplicity, security, and speed in ECC implementations.
منابع مشابه
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU
In this work, we implement all three digital signature schemes specified in Digital Signature Standard (FIPS 186-3), including DSA and RSA (based on modular exponentiation) as well as ECDSA (based on elliptic curve point multiplication), on an ultra-constrained 4-bit MCU of the EPSON S1C63 family. Myriads of 4-bit MCUs are widely deployed in legacy devices, and some in security applications due...
متن کاملElliptic Curve DSA (ECDSA): An Enhanced DSA
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA), and is under consideration for standardization by the ANSI X9 committee. Unlike the normal discrete logarithm problem and the integer factorization problem, the elliptic curve discrete logarithm problem has no subexponentialtime algorithm. For this reason, the strength...
متن کاملVorzüge und Grenzen des RSA-Verfahrens
Ronald Rivest, Adi Shamir und Leonard Adleman gelang im Jahre 1977 am MIT die Konstruktion des ersten (praktisch einsetzbaren) asymmetrischen kryptographischen Verfahrens [RiSA_78], das den von Whitfield Diffie und Martin Hellman in ihrem wegweisenden Veröffentlichung „New Directions in Cryptography“ geforderten Eigenschaften genügte [DiHe_76]. Dieses nach den Anfangsbuchstaben der Namen der Au...
متن کاملA Dsa-based Scheme for Defending against Ip Prefix Hijacking without Repositories
Original scientific paper IP prefix hijacking poses a serious threat to the security of the Internet. Cryptographic authenticating origin ASes (Autonomous Systems) of advertised prefix, which is an effective way of preventing IP prefix hijacking, has received wide acceptance. However, these existing schemes received various critical comments on their inefficiency when cryptographic authenticati...
متن کاملEnhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems
Montgomery’s algorithm is a popular technique to speed up modular multiplications in public-key cryptosystems. This paper tackles the efficient support of modular exponentiation on inexpensive circuitry for embedded security services and proposes a variant of the finely integrated product scanning (FIPS) algorithm that is targeted to digital signal processors. The general approach improves on t...
متن کامل