An enhancement of digital signature algorithm used in data authentication applied in Kelopatra / Guialil, Jamillah S. and Hill, Gabriel R. 6
By: Guialil, Jamillah S. and Hill, Gabriel R. 4 0 16 [, ] | [, ] |
Contributor(s): 5 6 [] |
Language: Unknown language code Summary language: Unknown language code Original language: Unknown language code Series: ; 201846Edition: Description: 28 cm. 254 ppContent type: text Media type: unmediated Carrier type: volumeISBN: ISSN: 2Other title: 6 []Uniform titles: | | Subject(s): -- 2 -- 0 -- -- | -- 2 -- 0 -- 6 -- | 2 0 -- | -- -- 20 -- | | -- -- -- -- 20 -- | -- -- -- 20 -- --Genre/Form: -- 2 -- Additional physical formats: DDC classification: | LOC classification: | | 2Other classification:| Item type | Current location | Home library | Collection | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|
| Book | PLM | PLM Archives | Filipiniana-Thesis | QA76.9.G85.2018 (Browse shelf) | Available | FT6473 |
Browsing PLM Shelves , Shelving location: Archives , Collection code: Filipiniana-Thesis Close shelf browser
Thesis: (BSCS major in Computer Science)- Pamantasan ng Lungsod ng Maynila, 2018. 56
5
ABSTRACT: Email had always been confronted with problems in data protection regarding different factors. These factors can greatly affect the result of the recognition that can lower the accuracy of the algorithm. This factors are : First, re-usage of ephemeral key values. Second, the size of the values of ephemeral key that causes the I.I.I reduction method possible, and third, the lacking of parameter checking in the verification phase. In this study, our goal is to explore these issues and propose procedures to enhance the algorithm while still improving its security as much as possible. We have tested and simulated the existing algorithm and found out that the security of Digital Signature Algorithm depends on numerous things. First, the problem in the generating of ephemeral key which can be possibly re-use. We applied the method of storing the values in the database to compare the generated values to its past values. Second Problem, The algorithm produce small size of ephemeral key which makes it vulnerable in I.I.I. Reduction Method. To solve the second problem, we increased the size value of ephemeral key to 160 bits. Tjird Problem, the lacking of parameter checking in the verification phase made the algorithm insecure to any fault attacks. We improve the verification phase by adding some parameter checking conditions. After performing all the objectives stated, we therefore conclude that the algorithm is now more secured to some attacks stated and has increased the authenticity of the message signature from the sender. We recommend this study to be used and utilized by other researcher for future reference of other related studies, and to be applied to other email and security applications.
5

There are no comments for this item.