ESIGN ( English Efficient digital SIGNature - an effective digital signature) - a digital signature scheme with a public key , based on the problem of factorization of numbers. A distinctive feature of this scheme is the ability to quickly generate a signature. [one]
Content
History
The digital signature was developed at NTT in Japan in 1985. [2] The scheme proved to be effective in terms of the speed of digital signature generation. However, the first versions were cracked by Ernie Btickel and John DeLaurentis, after which the recommended algorithm parameters were modified. [3] Subsequent hacking attempts were unsuccessful. The authors claim that the complexity of hacking the latest version of ESIGN is comparable to the complexity of the problem of factoring a number kind of where and Are prime numbers . [four]
Protocol Description
Introduction
Two subjects are involved in the protocol: subject whose purpose is to prove that he is the author of the message , and subject whose purpose is to verify authorship. At ESIGN to achieve your goals and must perform the following actions [5] .
- Preliminary generates keys : public, known to all, and private , known only to the subject .
- Subject generates digital signature for message based on the private key.
- sends a message with signature subject .
- Subject Validates the signature based on the public key.
Public and private key generation
ESIGN keys are generated as follows [6] .
- Randomly selects two primes and same bit length.
- The number is calculated .
- Selects a positive integer .
- A pair of numbers is a public key.
- A pair of numbers - private key.
Signature Generation
To sign a message where Is a binary number of arbitrary length, the following steps are taken [6] .
- Calculated where - a pre-selected hash function taking values from before .
- Random number selected from interval .
- Calculated and where - function of rounding to the smallest integer, larger argument.
- The signature is calculated .
Signature Verification
To verify that the signature really signs the message , the following steps are taken [6] .
- Calculated where - The same hash function that was used to generate the signature.
- Calculated .
- Check for inequality .
- A signature is considered valid if the inequality is satisfied.
Previous Versions
In the originally proposed ESIGN option, the parameter was equal to two. [5] However, after the successful attack by Ernie Brickell and John DeLaurentis, which also extended to a variant of the scheme with , the authors changed the requirement for this parameter to the existing one . [7]
Cryptanalysis
Attack on a hash function
Hash Attacks for the purpose of falsifying a signature, they are based on its imperfection, that is, on the hash function mismatching with one or more criteria of cryptographic strength with the caveat that in the case of ESIGN, equality in the criteria should be understood to the accuracy high bits. This relief is due to the signature verification condition, which is satisfied not only for the initial value of the hash function, but also for the others that coincide in the first high bits.
Assume that the function unstable to search for collisions, that is, you can find such different and , what and match in the first high bits. Then, signing the message author Suspecting nothing, automatically signs the message , since the inequality {\ displaystyle h (m ') \ leqslant s ^ {k} {\ bmod {n}} \ leqslant h (m') + 2 ^ {\ left \ lceil {\ frac {2} {3}} \ log _ {2} {n} \ right \ rceil}}
If the selected hash function is cryptographically strong, then an attack using collisions will take hash function calculation operations, attack using the second prototype - operations, which is considered impracticable, at large . [8] [9]
Public Key Attack
Attack on the public key consists in trying to get a private key based on it . You can do this by solving the equation , i.e. factoring the number . You may notice that in RSA the number generated in a similar way there , but today the question of in which case factorization becomes easier or more complicated remains open, since there are still no effective factorization algorithms. Right now the fastest way to factor a number that for ESIGN, that for RSA, is a sieve method of a number field that does this with a speed depending on the bit length . However, with a large bit length of the number the factorization task becomes impossible. [10] [9]
Recommended Options
In addition to the restrictions already introduced in the ESIGN description, it is recommended that you select a size and equal or greater bit size equal or greater respectively, and the parameter greater than or equal to 8 [11] :
- ;
- ;
Security level relative to other digital signature schemes
The table below shows the correspondence of the ESIGN security level to RSA and ECDSA security levels for various parameter sizes in bits. You may notice that with the same size RSA and ESIGN are comparable in terms of security. [12]
| The size in ESIGN, bits | The size in RSA, bits | The size in ECDSA, bits |
|---|---|---|
| 960 | 960 | 152 |
| 1024 | 1024 | 160 |
| 2048 | 2048 | 224 |
| 3072 | 3072 | 256 |
| 7680 | 7680 | 384 |
Benefits
The ESIGN scheme allows you to quickly generate a signature. Since computationally complex operations such as exponentiation and finding the inverse element are independent of the message being signed , they can be carried out in advance and save the obtained values in memory. Thus, to sign a message, it is enough to perform the remaining operations of addition, multiplication and division, the proportion of which is small in the computational complexity of the signature creation algorithm . In the case when , and the bit length is equal to signature generation speed in more than for RSA with the corresponding parameters. As for the verification of the signature, its speed is comparable to the speed of signature verification in the RSA algorithm , whose open exponent is small. [13] [9]
ESIGN-based authentication protocols
With ESIGN, zero-disclosure identification protocols can be implemented that allow the subject ( Eng. Prover - proving) prove to the subject ( English Verifier - checking) the fact of the availability of information, keeping it secret from . ESIGN-based authentication protocols are not inferior to the Feig-Fiat-Shamir protocol in their effectiveness. We will consider two such protocols: three-round and two-round. [14]
Three Round Identification Scheme
- generates open and secret ESIGN keys.
- randomly selects numbers and calculates where - one - way function , - concatenation operation, and sends inspector .
- randomly selects a number and sends it to the reviewer.
- calculates generates a signature for and sends a three to the inspector.
- checks equality and signature accuracy for message .
Two Round Identification Scheme
- generates open and secret ESIGN keys.
- randomly selects a number {\ displaystyle r} and sends it to the reviewer.
- randomly selects a number calculates generates a signature for and sends to the inspector.
- checks equality and signature accuracy for message .
In the above protocols, the secret information is keys whose knowledge is proved by the subject . If the results of all checks at the final stages are successful, then it is considered that really has a secret.
Notes
- ↑ Menezes, Oorschot, Vanstone, 1996 , §11.7 p. 2, pp. 473–474.
- ↑ Minghua, 2001 , p. one.
- ↑ Schneier, 2002 , chapter 20, p. 6.
- ↑ Atsushi, 1991 , chapter 2, paragraph 3: "We conjective that to break our higher degree version (ESIGN) is as hard as facctoring N".
- ↑ 1 2 Schneier, 2002 , chapter 2, paragraph 6.
- ↑ 1 2 3 Menezes, Oorschot, Vanstone, 1996 , §11.7 p. 2, p. 473.
- ↑ Menezes, Oorschot, Vanstone, 1996 , §11.9, pp. 486-487.
- ↑ Minghua, 2001 , p. 3.
- ↑ 1 2 3 Menezes, Oorschot, Vanstone, 1996 , §11.7 p. 2, p. 474.
- ↑ Minghua, 2001 , p. four.
- ↑ Minghua, 2001 , p. 6.
- ↑ Minghua, 2001 , p. 7.
- ↑ Atsushi, 1991 , chapter 3.
- ↑ Atsushi, 1991 , chapter 4.
Literature
- Schneier B. Applied Cryptography. Protocols, algorithms, C source code = Applied Cryptography. Protocols, Algorithms and Source Code in C. - M .: Triumph, 2002 .-- 816 p. - 3000 copies. - ISBN 5-89392-055-4 .
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Chapter 11. Digital Signatures // Handbook of Applied Cryptography . - 5th ed. - CRC Press , 1996 .-- S. 473-474. - 816 s. - ISBN 0-8493-8523-7 .
- Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi. ESIGN: An Efficient Digital Signature Implementation for Smart Cards // Advances in Cryptology - EUROCRYPT '91: Conf. / Advances in Cryptology - EUROCRYPT '91, Brighton, Great Britain, April 8-11, 1991 .-- Springer Berlin Heidelberg, 1991 .-- S. 446-457 . - ISBN 978-3-540-54620-7 . (inaccessible link)
- Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang. Evaluation of security level of cryptography: ESIGN signature scheme : project materials / CRYPREC Project, Japan. - 2001. - January.