29,734 research outputs found

    Digital Signature Security in Data Communication

    Full text link
    Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.Comment: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesi

    The Digital Signature Scheme MQQ-SIG

    Get PDF
    This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of nn4n - \frac{n}{4} quadratic polynomials with nn Boolean variables where n=160, 196, 224 or 256

    Digital signature

    Get PDF
    Digitálního podpisu, které je námětem této semestrální práce, je v současnosti velmi aktuální. Se stále vzrůstajícími možnostmi internetu a vidinou snižující se četnosti používání papírové dokumentace bylo nutné vyvinout metodu podepisování virtualizovaných dokumentů, která by byla stejně nenapadnutelná a bezpečná jako vlastnoruční podpis. Metoda nese název digitální podpis. V práci se zaměříme se na vysvětlení základních pojmů souvisejících s digitálním podpisem, vysvětlením základních pojmů s ním souvisejících jako je certifikát, certifikační autorita, autentizace, ale zejména na základní šifrovací algoritmy a aplikace, dále pak na aplikace ve kterých se digitálního podpisu využívá, například poštovní servery či elektronické bankovnictví. V závěru práce se pokusíme zhodnotit přínos digitálního podpisu a jeho nevýhody. Tato práce si neklade za cíl podat detailní popis procesů šifrování dat, jejím cílem je seznámit přehlednou a srozumitelnou formou širší i nezasvěcenou veřejnost s danou problematikou.Digital signature, the subject of this semester paper, is nowadays very up-to-date. The still rising capabilities of the internet and the vision of lowering the amounts of paper documentation made it necessary to develop a way of signing documents which are transferred through the internet. This is supposed to be equally safe and unassailable as the handwritten signature. This method is called the digital signature. The paper focuses on the explanation of the essential terms connected to digital signature, such as certificate, certification authority, authentication, but in particular on the elementary cryption algorithms, further on applications that make use of digital signature, e.g. post services and electronic banking. In the final chapter, the positive and negative aspects of the electronic signature are discussed.

    Digital Signature menggunakan Elliptic curve digital signature algorithm(ECDSA) dan Rindael Algorithm untuk security pada MMS<br>(Elliptic Curce Digital Signature Algorithm (ECDSA) and Rijndael Algorithm Implementation for MMS Security)

    Get PDF
    ABSTRAKSI: MMS (Multimedia Messaging Service) adalah layanan komunikasi messaging yang telah ditetapkan standarnya oleh WAP dan 3GPP. Dalam MMS keamanan seakan menjadi suatu yang sangat penting seiring dengan perkembangan dalam hal teknologi ini. User yang ingin berkomunikasi bukan hanya mencari sekedar privacy dalam hal berkomunikasi, tetapi keaslian pesan juga menjadi suatu hal yang sama pentingnya dalam hal berkomunikasi. Karena adanya kebutuhan ini maka harus disediakan aplikasi yang memerlukan adanya suatu enkripsi pesan dan tanda tangan digital.Salah satu solusi untuk menjaga keaslian data, integritas data, otentikasi dan nir penyangkalan adalah dengan menggabungkan algoritma enkripsi dan tanda tangan digital. Algoritma enkripsi yang digunakan adalah algoritma Rijndael, sedangkan algoritma tanda tangan digital-nya menggunakan ECDSA. Hasil enkripsi pesan yang dihasilkan oleh Algoritma Rijndael akan digabungkan dengan tanda tangan yang dihasilkan oleh algoritma tanda tangan ECDSA dan akan dikirimkan melalui jalur komunikasi. Penggabungan algoritma ini menghasilkan kerahasiaan (confidentially), integritas data (data integrity), otentikasi (authentication), nir penyangkalan (non repudiation).Algoritma ECDSA dan Rijndael dapat digunakan dalam MMS yang memiliki hardware dengan resource terbatas seperti handphone. Dari percobaan dapat ditarik kesimpulan bahwa performansi proses signing dan verifying dengan menggunakan penggabungan antara algoritma tanda tangan ECDSA dan algoritma enkripsi Rijndael dipengaruhi oleh panjang kunci dari algoritma tersebut dan fungsi hash yang digunakan.Kata Kunci : MMS, Rijndael, ECDSA, fungsi hash, message digest, digital SignatureABSTRACT: MMS (Multimedia Messaging Service) messaging is a communication service that has been set by the WAP and 3GPP standards. In the MMS security seemed to be a very important along with the development in this technology. Users who want to communicate not just looking for privacy just in terms of communicating, but the authenticity of the message also becomes a matter of equal importance in terms of communicating. Because of this requirement, the provision of applications that require the existence of a message encryption and digital signature.One solution for maintaining data authenticity, data integrity, authentication and non-denial is to combine encryption algorithms and digital signatures. Encryption algorithm used is the Rijndael algorithm, while the digital signature algorithm it uses ECDSA. The result of encryption of messages generated by the Rijndael algorithm will be combined with the signature produced by the ECDSA signature algorithm and will be delivered through communication channels. merging algorithm produces confidentiality, data integrity, authentication, and nonrepudiation.ECDSA and Rijndael algorithm can be used in the MMS who have limited hardware resources such as mobile phones. From the experiments we can conclude that the performance of a merger between the ECDSA signature algorithm and an encryption algorithm Rijndael key length is influenced by the algorithm.Keyword: MMS, Rijndael, ECDSA, hash functions, message digest, digital signatur

    A Digital Signature Scheme for Long-Term Security

    Full text link
    In this paper we propose a signature scheme based on two intractable problems, namely the integer factorization problem and the discrete logarithm problem for elliptic curves. It is suitable for applications requiring long-term security and provides a more efficient solution than the existing ones
    corecore