Vous êtes sur la page 1sur 4

2008 International Conference on Computer Science and Software Engineering

The Application of a Scheme of Digital Signature in


Electronic Government

Na Zhu GuoXi Xiao


Hebei University of Technology Hebei University of Technology
Tianjin, China Tianjin, China
yiwuyuan@163.com xiaoguoxi@scse.hebut.edu.cn

Abstract—In electronic government where there is not complete (Elliptic Curve Digital Signature Algorithm). Each has a
trust between documents’ sender and receiver, something more variable key size that can be increased to achieve higher
than authentication is needed. The most attractive solution to this security at the cost of slower cryptographic operations. The
problem is the digital signature which is analogous to the best attack known on each public-key cryptosystem requires
handwritten signature. The signature is formed by taking the an amount of computation determined by a security parameter
hash of the message and encrypting the message with the which is related to the key size [2][3].
creator’s private key. It guarantees the source and integrity of
the message. Then a suitable digital signature algorithm will be
picked out as a result of comparing and analyzing three main
A. RSA
digital signature algorithms in this paper. Finally, a scheme of The RSA public-key cryptosystem involves exponentiation
digital signature in electronic government will be proposed in modulo a number n that is the product of two large prime
order to settle some specific problems such as spilling out secret, numbers. Plaintext is encrypted in blocks, with each block
forging or denial and so on. Besides, a brief analysis regarding having a binary value less than the number n. That is, the block
security will be given for this scheme. size must be less than or equal to log2(n); in practice, the block
size is i bits, where 2i<n≤2i+1.Encryption and decryption are of
Keywords-component; digital signature;electronic government; the following form, for some plaintext block M and ciphertext
RSA; DSA;ECDSA
block C:

I. INTRODUCTION
C = M e mod n
In network environment confidentiality, integrity,
authenticity and anti-denial of circulating documents can be
solved by digital signature applied in electronic government.
M = C d mod n = (M e) d mod n = M ed mod n
However, other correlate factors should be considered: First is
the complicate and flexible workflow in electronic
government; second is the security of digital signature Both sender and receiver must know the value of n. The
algorithm; third is the speed problem of signing and verifying sender knows the value of e, and only the receiver knows the
in digital signature. Too much emphasis on security of digital value of d. Thus, this is a public-key encryption algorithm with
signature theory previously, such as using complex signing a public key of PU = {e,n} and a private key of PR ={d,n}.
scheme or increasing computing size in order to enhance When referring to the key size for RSA, what is meant is
security, while ignoring practicality. In practical application, the length of the modulus n in bits. A typical key size for RSA
security is often influenced by machines’ operating speed. And is 1024 bits. RSA can be used for encryption and also be used
transmitting speed is a big bottleneck especially in network for digital signature.
environment [1]. Therefore to simplify operation should be a
problem solved urgently under the premise of how to ensure B. DSA
safety.
The DSA[4] is based on the difficulty of computing
discrete logarithms and is based on schemes originally
II. COMPARISON AND ANALYSIS AMONG THREE DIGITAL presented by ElGamal and Schnorr. Specifically, the DSA is
SIGNATURE ALGORITHMS public-key techniques based on exponentiation modulo a large
It has become clear over the past several decades that prime number p. For this scheme, the key size is the length of
public-key (asymmetric) cryptography is an indispensable tool the prime p in bits, and a typical value is 1024 bits. When
for simplifying key management and enabling secure exploiting the size of it, the best attack known is the General
communication. And digital signature algorithms exactly build Number Field Sieve. However, another important security
on it. There are three main contenders: RSA (Rivest-Shamir- parameter is the size of exponents used for exponentiation. For
Adleman), DSA (Digital Signature Algorithm) and ECDSA DSA, the exponent size is fixed at 160 bits.

978-0-7695-3336-0/08 $25.00 © 2008 IEEE 618


DOI 10.1109/CSSE.2008.929
C. ECDSA both anti-exhaustive attack capability and anti-cryptanalysis
Elliptic curve cryptography makes use of elliptic curves in capability. But SHA’s speed is slower than MD5.
which the variables and coefficients are all restricted to
elements of a finite field. Typically, elliptic curves are defined B. Symmetric and asymmetric cryptography
over either the integers modulo a prime number (GF(p)) or Relatively, symmetric cryptography has higher speed in
over binary polynomials (GF(2m)). When referring to the key encryption and decryption but more difficult key management
size, what is meant is the size of the prime number or binary than asymmetric cryptography.
polynomials in bits. Typical key sizes are in the range 160 to
200 bits. The security parameter is the size of multipliers which For example, the famous symmetric cryptography is DES.
is limited to the order of the generator used and slightly smaller But given the potential vulnerability of DES to a brute-force
than the key size. attack, an alternative method will be chosen which would
preserve the existing investment in software and equipment, is
to use multiple encryption with DES and multiple keys. It is
D. Comparative conclusions
called triple DES (3DES).
TABLE I. DIGITAL SIGNATURE TIMINGS
C. Digital time-stamp
RSA-1024 DSA-1024 ECDSA-168 Consider a question that may be asked by a computer user
(e=3) (over GF(p)) as he or she views a digital document or on-line record: When
was the record created or last modified? A system for answer
sign 43 7 5 this question is called a digital time-stamping which is a
certificate for a particular record (specifying what) at a
verify 0.6 27 19 particular time (specifying when).
key Two features of a digital time-stamping system are
1100 7 7
generation particularly helpful in enhancing the integrity of a digital
parameter large signature system. First, a time-stamping system cannot be
generation none 6500 (research area) compromised by the disclosure of a key. This is because digital
time-stamping systems do not rely on keys, or any other secret
Table 1 comes from RSA library that summarizes the information. Second, digital time-stamping certificates can be
computation times for the operation associated with digital renewed so as to remain valid indefinitely [6].
signatures. For the most frequent operations, signing and
signature verification, DSA and ECDSA over GF(p) are D. Design for the scheme of digital signature
comparable. However, RSA is slower for signing and much
faster for signature verification. Elliptic curves over (GF(2m)) Considering these factors above, I propose a scheme of
appear to be slower than those over (GF(p)). digital signature which based on the combination of
symmetric and asymmetric cryptography. Specifically, 3DES
For certificate-based systems implemented in software, will be selected for encrypting sources, and RSA will be
such as Certification Authority (CA) key pairs are used for selected for digital signature and transmitting secret key (the
signing and verifying the signatures on certificates and key for symmetric cryptography is called secret key and the
Certificate Revocation Lists (CRLs). Each certificate and CRL keys for asymmetric cryptography are called public key and
is signed once and is verified thousands of times. Therefore, private key). Of course hash function and digital time-stamp
the most critical operation is signature verification. RSA’s must also be applied in this scheme. Fig.1 displays this
very fast signature verification is important here. So I will scheme.
choose RSA digital signature to apply in this scheme so that
PKI can be extend in research afterward. Something should be pay attention to: (1) This scheme is a
simplified model without PKI (Public-Key Infrastructure), So
I assumed that both sender and receiver have already obtained
III. A SCHEME OF DIGITAL SIGNATURE the public key from each other. Respectively the public and
In fact digital signature should be one solution on the basis private keys are (Ka1, Ka2) belong to the sender, (Kb1, Kb2)
of combination of several kinds of encryption technology but belong to the receiver. (2) In the middle of the figure 1 is a
not one specific technology implement. You can see them as heavy line that represents communication network; upward
follows. side is the sender; under side is the receiver. The dotted curve
represents transmitting process.
A. Hash function Steps in this scheme:
May be sometimes sources are too long to sign or encrypt,
message digest or called hash function will be needed at this Step 1: Electronic document is processed by hash function
time. Thus the signing or encrypting speed may be greatly that produces hash value. Then both hash value and digital
improved. A hash function accepts a variable-size message M time-stamp will be signed by RSA by means of private key
as input and produces a fixed-size output, referred to as a hash Ka1 belongs to the sender. At the same time, electronic
code H(M)[5]. There are two main contenders: MD5 and SHA document is encrypted by 3DES that produces ciphertext.
(Secure Hash Algorithm). The latter is superior to the former Besides, secret key will be encrypted by RSA by means of

619
public key Kb2 belongs to the receiver, and it forms a cipher block digital signature and ciphertext are transmitted from
(a small light grey rectangular in the right hand of Fig.1). Both sender to receiver.
Step 2: The digital signature and ciphertext are
Electronic document
separated by receiver. Firstly, digital signature is
verifying by means of public key Ka2 belongs to the
Hash 3DES sender that produces hash value and digital time-stamp.
function Secondly, hash value will be signed by RSA by means
of private key Kb1 belongs to the receiver whose action
is doing reply to the sender.
Hash Digital Cipher-text RSA
value time encryption Step 3: After obtaining the digital signature form
-stamp After for secret receiver (a small dark grey rectangular in the left hand
signing and key (Kb2) of figure 1), which will be verifying by means of public
time key Kb2 belongs to the receiver. Then the sender can
RSA digital -stamping’s obtain a hash value which must be compared with the
signature’s signing hash value step 1’s hash value. The cipher block in step 1 will be
RSA transmitted to receiver only if the two hash values are
process (Ka1)
digital identical with each other.
signature’s
verifying Transmitting only if two Step 4: The cipher block decrypted by RSA by
process hash values are identical means of private key Kb1 from the receiver. Then the
(Kb2) Comparison receiver can obtain the secret key which can be used for
with each other 3DES decryption for the ciphertext. As a result,
electronic document can be obtained.
Step 5: The electronic document from step 4 should
After signing be processed by hash function that produces hash
and time Cipher value. Compare this hash value with step 2’s hash
-stamping’s -text value, at the same time check to the digital time-stamp
hash value RSA obtained from step 2. The receiver can accept the
decryption electronic document only if both hash values are
for secret identical and digital time-stamp is accurate.
RSA digital key (Kb1)
Analyzing the security of this scheme: several
signature’s properties such as confidentiality, integrity,
verifying process 3DES
authenticity, anti-denial and anti-replacement attack
(Ka2) Secret have implemented successfully in this scheme of digital
key signature. Specifically, anti-denial is implemented in
Electronic step 2 and step 3; anti-replacement attack is
document implemented in step 2 and step 5.

RSA IV. CONCLUSION


digital Hash A scheme of digital signature is proposed in this
signature’s function paper, which applies in specific environment of
signing electronic government. This scheme solves some
process secure problems in electronic document such as not
Hash Digital Hash
(Kb1) enough trust between sender and receiver and so on. In
value time-stamp value a word emphasis is placed on how to combine security
with efficiency in electronic government. But the
secure problems that can be solved thoroughly also
Comparison need to consider other factors like the security and
credibility of both network and relating hardware [7],
or strengthen the management of operating personnel.

Accepting only if two hash values REFERENCES


are identical with each other and
[1] Xin Guan and RuiMin Chai, “Application of digital signature
the digital time-stamp is accurate based on ECDLP in E-government”, Computer & Digital
Engineering, vol. 35, no. 2, Wuhan, 2007, pp. 130-132.J. Clerk
Figure 1. A scheme of digital signature Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol.
2. Oxford: Clarendon, 1892, pp.68–73.

620
[2] Michael J. Wiener, “Performance comparison of public-key [6] Stuart Haber, Burt Kaliski and Scott Stornetta, “How do digital time-
cryptosystems”, CryptoBytes, vol. 4, no. 1, RSA Laboratories, 1998, pp. stamps support digital signatures?” CryptoBytes, vol. 1, no. 3, RSA
1-5. Laboratories, 1995, pp. 14-15.
[3] XianHong Zhang, The Theory and Technology of Digital Signature, [7] XiaoMing Zhao and MeiRen Zhang, “Application of RSA digital
China Machine Press, Beijing, 2004. signature technology in circulation of electronic official documents”,
[4] “Digital Signature Standard”, NIST, U. S. Department of Commerce, Computer Engineering and Design, vol. 26, no. 5, Beijing, 2005, pp.
FIPS PUB 186, May 1994. 1214-1216.
[5] William Stallings, Cryptography and Network Security Principles and
Practices, Publishing House of Electronics Industry, Beijing, 2006.

621

Vous aimerez peut-être aussi