A Survey of ESIGN: State of the Art and Proof of Security
نویسنده
چکیده
RSA, ESIGN, cryptography, digital signature, encryption, decryption, factoring RSA [1] generates digital signatures and cipher text, S, by performing exponentiation on a message, M, to the e-th power of the form M mod(n), where n is based on large prime numbers. RSA has been proven to be fundamentally secure, given the complexity of the e-th root mod(n) problem that RSA presents. Unfortunately, RSA is computationally intensive, especially with regards to generating keys/digital signatures and decrypting cipher text messages. These factors are a major drawback for RSA, especially when RSA is implemented within embedded solutions that have limited processing capabilities such as smart cards. To address this problem, ESIGN [2] was developed as an improvement to RSA, whereas ESIGN offers improved computational complexity, yet maintains the complexity of the e-th root mod (n) problem that provides security [9].
منابع مشابه
How to Repair ESIGN
The ESIGN signature scheme was provided with an inadequate proof of security. We propose two techniques to repair the scheme, which we name ESIGN-D and ESIGN-R. Another improvement of ESIGN is encouraged, where the public key is hashed together with the message. This allows to have a security proof in the multi key setting. Additionally, the lower security of ESIGN compared to RSA-PSS leads to ...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملA new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملAlmost Uniform Density of Power Residues and the Provable Security of ESIGN
ESIGN is an efficient signature scheme that has been proposed in the early nineties (see [14]). Recently, an effort was made to lay ESIGN on firm foundations, using the methodology of provable security. A security proof [15] in the random oracle model, along the lines of [2], appeared in support for ESIGN. However, several unexpected difficulties were found. Firstly, it was observed in [20], th...
متن کاملThe Impact of Land Tenure Security on Housing Investment at Informal Settlements (The Case of Eslamabad Neighborhood, Tehran)
In recent years, tenure security has been one of the main objectives of improvement projects in urban poor settlements. Despite lots of international studies initiated in this field, it has received little attention in Iran. The main aim of this paper is to assess the influence of tenure security on the level of household investment in housing. Survey method is considered as the methodology ...
متن کامل