PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2006 | Vol. 11, no 1 | 33-39
Tytuł artykułu

The security of the RSA cryptosystem and electronic signature

Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Electronic document has a significant use in practice. It should fulfil requirements similar to those of paper document. An essential element of electronic document security is the electronic signature. This article presents the discussion on the security of cryptographic protocol - electronic signature - taking into account the possibilities of an accompanying attack on an asymmetric cryptosystem with an application of factorization and Euler's function. The discussion about potential vulnerabilities in verification of the electronic signature from the point of view of weak and strong RSA keys will be presented as well. This article is taking into account the problem of key length and the quality of the components for the public key. The considerations will be presented from the point of view of an attack on the electronic signature using standalone computer and a group of computers in network. The computation of Euler's function in an algorithm using parallel mode will be presented. In this article we show a relation between investment in security infrastructure and the value of protected information.
Wydawca

Rocznik
Strony
33-39
Opis fizyczny
Bibliogr. 8 poz., wykr.
Twórcy
autor
  • Institute of Environmental Mechanics and Applied Computer Science, Kazimierz Wielki University, Chodkiewicza 30, 85-072 Bydgoszcz, Poland, piotrk@ukw.edu.pl
Bibliografia
  • [1] Menezes A., van Oorschot P., Vanstone S., “Handbook of Applied Cryptography”, CRC Press, Boca Raton, 1997.
  • [2] PfitzmannB., “Digital Signature Schemes”, LNCS, 1100, Springer, New York, 1996.
  • [3] Schneier B., “Applied Cryptography”, John Wiley & Sons, 1996.
  • [4] Stinson D. R., “Cryptography: Theory and Practice”, CRC Press, 1995.
  • [5] Rompel J. “One-way functions are necessary and sufficient for secure signatures”, In Proc. 22nd ACM Symposium on Theory of Computing, pages 387-394, Baltimore, Maryland, 1990.
  • [6] Diffe W., Hellman M. E., “New directions in cryptography”, IEEE Trans. Inform. Theory, IT-22;644-654, November 1976.
  • [7] Rivest R., Shamir A., Adieman L. M., “A method for obtaining digital signatures and public key cryptosystems”, Communications of the ACM, 21:120-126, 1978.
  • [8] Pieprzyk J., Hardjono T., Seberry J., “Fundamentals of Computer Security”, Springer - Verlag, Berlin 2003.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0010-0062
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.