Public Comments Received on FIPS 186-4: Digital Signature Standard

نویسنده

  • Mehmet Adalier
چکیده

NIST’s ECC standards create (1) unnecessary losses of sim­ plicity, security, and speed in ECC implementations and (2) unnecessary tensions between simplicity, security, and speed in ECC implementations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU

In this work, we implement all three digital signature schemes specified in Digital Signature Standard (FIPS 186-3), including DSA and RSA (based on modular exponentiation) as well as ECDSA (based on elliptic curve point multiplication), on an ultra-constrained 4-bit MCU of the EPSON S1C63 family. Myriads of 4-bit MCUs are widely deployed in legacy devices, and some in security applications due...

متن کامل

Elliptic Curve DSA (ECDSA): An Enhanced DSA

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA), and is under consideration for standardization by the ANSI X9 committee. Unlike the normal discrete logarithm problem and the integer factorization problem, the elliptic curve discrete logarithm problem has no subexponentialtime algorithm. For this reason, the strength...

متن کامل

Vorzüge und Grenzen des RSA-Verfahrens

Ronald Rivest, Adi Shamir und Leonard Adleman gelang im Jahre 1977 am MIT die Konstruktion des ersten (praktisch einsetzbaren) asymmetrischen kryptographischen Verfahrens [RiSA_78], das den von Whitfield Diffie und Martin Hellman in ihrem wegweisenden Veröffentlichung „New Directions in Cryptography“ geforderten Eigenschaften genügte [DiHe_76]. Dieses nach den Anfangsbuchstaben der Namen der Au...

متن کامل

A Dsa-based Scheme for Defending against Ip Prefix Hijacking without Repositories

Original scientific paper IP prefix hijacking poses a serious threat to the security of the Internet. Cryptographic authenticating origin ASes (Autonomous Systems) of advertised prefix, which is an effective way of preventing IP prefix hijacking, has received wide acceptance. However, these existing schemes received various critical comments on their inefficiency when cryptographic authenticati...

متن کامل

Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems

Montgomery’s algorithm is a popular technique to speed up modular multiplications in public-key cryptosystems. This paper tackles the efficient support of modular exponentiation on inexpensive circuitry for embedded security services and proposes a variant of the finely integrated product scanning (FIPS) algorithm that is targeted to digital signal processors. The general approach improves on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015