UPM Institutional Repository

On the security of digital signature protocol based on iterated function systems.


Citation

M. G. AL-Saidi, Nadia and Md. Said, Mohamad Rushdan (2011) On the security of digital signature protocol based on iterated function systems. International Journal of Mathematical Analysis, 5 (29). pp. 1399-1410. ISSN 1312-8876; ESSN:1314-7579

Abstract

A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. Hash functions are used within digital signature schemes to provide data integrity for cryptographic applications. In this paper, we take a closer look at the security and efficiency of the digital signature protocol based on fractal maps. This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. They are considered as time consuming to be involved in solving non-linear systems numerically over the defined infinite subfield.


Download File

[img]
Preview
PDF (Abstract)
On the security of digital signature protocol based on iterated function systems.pdf

Download (83kB) | Preview
Official URL or Download Paper: http://www.m-hikari.com/

Additional Metadata

Item Type: Article
Divisions: Faculty of Science
Publisher: Hikari Ltd
Keywords: Digital signature; Fractal maps; Iterated function systems.
Depositing User: Nur Farahin Ramli
Date Deposited: 17 Jul 2013 02:38
Last Modified: 20 Oct 2015 00:49
URI: http://psasir.upm.edu.my/id/eprint/25177
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item