WO2003013053A1 - Method for determining the size of a random variable for an electronic signature schema - Google Patents
Method for determining the size of a random variable for an electronic signature schema Download PDFInfo
- Publication number
- WO2003013053A1 WO2003013053A1 PCT/FR2002/002453 FR0202453W WO03013053A1 WO 2003013053 A1 WO2003013053 A1 WO 2003013053A1 FR 0202453 W FR0202453 W FR 0202453W WO 03013053 A1 WO03013053 A1 WO 03013053A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- size
- signature
- log
- hazard
- counter
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000009472 formulation Methods 0.000 claims 3
- 239000000203 mixture Substances 0.000 claims 3
- 230000006870 function Effects 0.000 description 11
- 238000012795 verification Methods 0.000 description 7
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Definitions
- the present invention relates to a method for determining the size of a hazard used to generate an electronic signature in public key cryptography systems.
- the concept of public key cryptography was invented by Whitfield DIFFIE and Martin HELLMAN in 1976.
- the principle of public key cryptography consists in using a pair of keys, a public encryption key and a private decryption key. It must be computationally infeasible to find the private decryption key from the public encryption key.
- An electronic signature of a message is a number depending both on the private key known only to the person signing the message, as well as on the content of the message to be signed.
- An electronic signature must be verifiable: it must be possible for a third party to verify the validity of the signature, without knowledge of the private key of the person signing the message being required; signature verification is performed using the corresponding public key.
- - Rabin signature scheme its security is also based on the difficulty of factoring large numbers
- the original message is obtained from the signature itself; since the original message is not necessary to verify the signature, the total size of the signature is shorter.
- the first realization of a public key scheme was developed in 1977 by Rivest, Shamir and Adleman, who invented the RSA encryption system.
- the security of RSA rests on the difficulty of factorizing a large number which is the product of two prime numbers.
- the RSA system is the most widely used public key encryption system. It can be used as an encryption method or as a encryption method. signature.
- the RSA system is used in smart cards, for certain applications of these. Possible applications of RSA on a smart card are access to databases, banking applications, remote payment applications such as pay TV, gas distribution or payment of tolls. highway.
- the first part is the generation of the RSA key.
- Each user creates an RSA public key and a corresponding private key, according to the following 5-step process:
- the integers e and d are respectively called encryption exponents and decryption exponents.
- the integer n is called the module.
- the second part is the generation of the signature.
- the method consists in taking as input the message M to be signed, in applying to it an encoding using a function ⁇ to obtain the character string ⁇ (M).
- the signature S is then given by:
- the third part is the verification of the signature: the method consists in taking as input the message M to sign and the signature S to verify, in applying an encoding to the message M using a function ⁇ to obtain the character string ⁇ (M ), to calculate
- An example of an encoding process is the process described in the standard "ISO / IEC 9796-2, Information Technology - Security techniques - Digital signature scheme giving message recovery, Part 2: Mechanisms using a hash-funct ion, 1997".
- Another example of an encoding process is the encoding process described in the standard "RSA Laboboratories, PKCS # 1: RSA cryptography specifications, version 2.0, September 1998". These two encoding methods allow messages of arbitrarily long size to be signed.
- the PSS signature scheme makes it possible to sign a message M of arbitrary length.
- PSS-R a variant of the PSS scheme in which we find the message when verifying the signature. It is no longer necessary to transmit the message with the signature.
- the PSS signature process works as follows: to sign a message M, we concatenate a random r of size k 0 bits, k 0 being a previously determined parameter. We then apply to M
- a hash function G is defined taking as input a message of size ki bits and returning as output a message of size k-k ⁇ -1 bits. We define the function G which returns the first k 0 bits of the function G, as well as the function G 2 which returns the remaining k-k ⁇ -k 0 -l bits.
- the encoding function ⁇ (M) is then given by:
- ⁇ (M) ⁇
- the PSS-R signature scheme an acronym for Probabilist ic Signature Scheme - Recovery, is similar to the PSS scheme, the difference being that it allows to find the message at the time of the verification of the signature.
- the size of the message which is found during the verification of the signature is k-1-ko-k ⁇ .
- k 0 of the hazard the more we can find a large message when verifying the signature. This therefore reduces the total size of the data exchanged: there is no need to transmit the message because it will be found when verifying the signature.
- the size of the data exchanged is crucial in many applications with few memories, such as a smart card or pocket computers.
- the invention consists of a method for determining the optimal size of the hazard used during the generation of the signature.
- the size is optimal in the sense that it is the minimum size to guarantee a level of security equivalent to RSA.
- the use of a smaller size hazard does not provide a level of security equivalent to that of RSA.
- the method of the invention is particularly intended to apply to the PSS signature scheme, but it can extend to other signature schemes with characteristics similar to PSS, for example to the PFDH signature scheme, English acronym for " Probabilistic Full Domain Hash ”.
- the PFDH scheme works as follows. To generate a signature of a message M, a random r of size k 0 bits is concatenated with the message M, k 0 being a previously determined parameter. We apply then to M
- r a hash function H which returns as output a chain of size k bits denoted ⁇ (M) H (M
- the advantage of this first variant is that the size k 0 of the hazard is optimal: a size k o less than this value would generate a level of security lower than the security level of the RSA system, while a size k 0 greater to this value would decrease the size of the message that can be found during the verification of the signature.
- the method consists in using the time tgen necessary for the generation of a signature, as well as the maximum lifetime tvie of the system for generating signatures according to a given public key.
- QSIG tvie / TGen.
- the advantage of this second variant is that a level of security equivalent to the RSA system is obtained, with a maximum retrieved message size, and without using a counter.
- the advantage of the method of the third variant is that, throughout the process, an optimal value for the size k 0 of the hazard is kept: a safety level equivalent to the RSA system is maintained while allowing a size to be found. message maximum.
- the signature schemes used for the present invention are preferably RSA, Rabin, PSS, PSS-R and PFHD as described previously in the description.
- the three variants of the process described above, but not exhaustive, can apply more generally to any signature system in which the value of the hazard is found at the time of signature verification.
- the application of any one of the three variants of the process described above makes it possible to obtain an optimal size of the generated hazard.
- the three variants are particularly intended for use in an electronic portable object of the smart card type.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR01/10409 | 2001-08-02 | ||
FR0110409A FR2828353B1 (en) | 2001-08-02 | 2001-08-02 | METHOD FOR DETERMINING THE SIZE OF A FTA FOR AN ELECTRONIC SIGNATURE SCHEME |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003013053A1 true WO2003013053A1 (en) | 2003-02-13 |
Family
ID=8866249
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/002453 WO2003013053A1 (en) | 2001-08-02 | 2002-07-11 | Method for determining the size of a random variable for an electronic signature schema |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR2828353B1 (en) |
WO (1) | WO2003013053A1 (en) |
-
2001
- 2001-08-02 FR FR0110409A patent/FR2828353B1/en not_active Expired - Fee Related
-
2002
- 2002-07-11 WO PCT/FR2002/002453 patent/WO2003013053A1/en not_active Application Discontinuation
Non-Patent Citations (2)
Title |
---|
BELLARE M ET AL: "THE EXACT SECURITY OF DIGITAL SIGNATURES - HOW TO SIGN WITH RSA AND RABIN", ADVANCES IN CRYPTOLOGY - EUROCRYPT '96. INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CRYPTOGRAPHIC TECHNIQUES. SARAGOSSA, MAY 12 - 16, 1996, ADVANCES IN CRYPTOLOGY - EUROCRYPT. INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CR, 12 May 1996 (1996-05-12), pages 399 - 416, XP000725449, ISBN: 3-540-61186-X * |
CORON J-S: "OPTIMAL SECURITY PROOFS FOR PSS AND OTHER SIGNATURE SCHEMES", ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002. INTERNATIONAL CONF. ON THE THEORY AND APPLICATIONS OF CRYPTOGRAPHIC TECHNIQUES. AMSTERDAM, NL, APRIL 28 - MAY 2, 2002, LECTURE NOTES IN COMPUTER SCIENCE, BERLIN: SPRINGER, DE, vol. 2332, 28 April 2002 (2002-04-28), pages 272 - 287, XP001090352, ISBN: 3-540-43553-0 * |
Also Published As
Publication number | Publication date |
---|---|
FR2828353B1 (en) | 2003-11-14 |
FR2828353A1 (en) | 2003-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2345202B1 (en) | Digital signature method in two steps | |
FR2759226A1 (en) | PROTOCOL FOR VERIFYING A DIGITAL SIGNATURE | |
US7912216B2 (en) | Elliptic curve cryptosystem optimization using two phase key generation | |
WO2000042734A1 (en) | Public and private key cryptographic method | |
WO2001031436A1 (en) | Security method for a cryptographic electronic assembly based on modular exponentiation against analytical attacks | |
EP0795241B1 (en) | Public key cryptography process based on the discrete logarithm | |
WO2000062477A1 (en) | Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems | |
EP1224765B1 (en) | Countermeasure method in an electronic component which uses an rsa-type public key cryptographic algorithm | |
EP1350357A1 (en) | Method for enhancing security of public key encryption schemas | |
CA2257907A1 (en) | Public key cryptography method | |
EP1325584A1 (en) | Method for encoding long messages for rsa electronic signature schemes | |
FR2834153A1 (en) | Zero knowledge cryptographic system for electronic payment uses factorization and discrete logarithm | |
WO2003013053A1 (en) | Method for determining the size of a random variable for an electronic signature schema | |
KR100397601B1 (en) | Digital signature method and message verification method | |
EP1325585A1 (en) | Method for accelerated transmission of electronic signature | |
WO1998051038A1 (en) | Pseudo-random generator based on a hash coding function for cryptographic systems requiring random drawing | |
FR2842052A1 (en) | CRYPTOGRAPHIC METHOD AND DEVICES FOR REDUCING CALCULATION DURING TRANSACTIONS | |
Moldovyan et al. | Short signatures from the difficulty of factoring problem | |
WO2007065468A1 (en) | Method of generating a signature with proof of “tight” security, associated verification method and associated signature scheme that are based on the diffie-hellman model | |
EP1185025A1 (en) | Undeniable digital signature scheme based on quadratic field | |
FR2829333A1 (en) | METHOD OF REDUCING THE SIZE OF AN RSA OR RABIN SIGNATURE | |
WO2000064097A1 (en) | Signature verification and authentication method | |
WO2002050658A1 (en) | Countermeasure methods in an electronic component using an rsa-type public key encryption algorithm | |
WO2006045660A2 (en) | On-the-fly signature generation method with security proof | |
FR3070517A1 (en) | SYSTEM AND METHOD FOR AUTHENTICATION AND DIGITAL SIGNATURE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |