An enhancement of digital signature algorithm used in data authentication applied in Kelopatra / Guialil, Jamillah S. and Hill, Gabriel R. 6

By: Guialil, Jamillah S. and Hill, Gabriel R. 4 0 16, [, ] | [, ] |
Contributor(s): 5 6 [] |
Language: Unknown language code Summary language: Unknown language code Original language: Unknown language code Series: ; 201846Edition: Description: 28 cm. 254 ppContent type: text Media type: unmediated Carrier type: volumeISBN: ISSN: 2Other title: 6 []Uniform titles: | | Related works: 1 40 6 []Subject(s): -- 2 -- 0 -- -- | -- 2 -- 0 -- 6 -- | 2 0 -- | -- -- 20 -- | | -- -- -- -- 20 -- | -- -- -- 20 -- --Genre/Form: -- 2 -- Additional physical formats: DDC classification: | LOC classification: | | 2Other classification:
Contents:
Action note: In: Summary: ABSTRACT: Email had always been confronted with problems in data protection regarding different factors. These factors can greatly affect the result of the recognition that can lower the accuracy of the algorithm. This factors are : First, re-usage of ephemeral key values. Second, the size of the values of ephemeral key that causes the I.I.I reduction method possible, and third, the lacking of parameter checking in the verification phase. In this study, our goal is to explore these issues and propose procedures to enhance the algorithm while still improving its security as much as possible. We have tested and simulated the existing algorithm and found out that the security of Digital Signature Algorithm depends on numerous things. First, the problem in the generating of ephemeral key which can be possibly re-use. We applied the method of storing the values in the database to compare the generated values to its past values. Second Problem, The algorithm produce small size of ephemeral key which makes it vulnerable in I.I.I. Reduction Method. To solve the second problem, we increased the size value of ephemeral key to 160 bits. Tjird Problem, the lacking of parameter checking in the verification phase made the algorithm insecure to any fault attacks. We improve the verification phase by adding some parameter checking conditions. After performing all the objectives stated, we therefore conclude that the algorithm is now more secured to some attacks stated and has increased the authenticity of the message signature from the sender. We recommend this study to be used and utilized by other researcher for future reference of other related studies, and to be applied to other email and security applications. Other editions:
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Thesis: (BSCS major in Computer Science)- Pamantasan ng Lungsod ng Maynila, 2018. 56

5

ABSTRACT: Email had always been confronted with problems in data protection regarding different factors. These factors can greatly affect the result of the recognition that can lower the accuracy of the algorithm. This factors are : First, re-usage of ephemeral key values. Second, the size of the values of ephemeral key that causes the I.I.I reduction method possible, and third, the lacking of parameter checking in the verification phase. In this study, our goal is to explore these issues and propose procedures to enhance the algorithm while still improving its security as much as possible. We have tested and simulated the existing algorithm and found out that the security of Digital Signature Algorithm depends on numerous things. First, the problem in the generating of ephemeral key which can be possibly re-use. We applied the method of storing the values in the database to compare the generated values to its past values. Second Problem, The algorithm produce small size of ephemeral key which makes it vulnerable in I.I.I. Reduction Method. To solve the second problem, we increased the size value of ephemeral key to 160 bits. Tjird Problem, the lacking of parameter checking in the verification phase made the algorithm insecure to any fault attacks. We improve the verification phase by adding some parameter checking conditions. After performing all the objectives stated, we therefore conclude that the algorithm is now more secured to some attacks stated and has increased the authenticity of the message signature from the sender. We recommend this study to be used and utilized by other researcher for future reference of other related studies, and to be applied to other email and security applications.

5

There are no comments for this item.

to post a comment.

© Copyright 2024 Phoenix Library Management System - Pinnacle Technologies, Inc. All Rights Reserved.