J4 ›› 2009, Vol. 27 ›› Issue (06): 563-.
Previous Articles Next Articles
ZHANG Hai-rong|HUANG Yu-lan|CHI Xue-fen
Online:
Published:
Abstract:
Extended research and practical application about DSA(Digital Signature Algorithm) are very wide, they are all based on the security of DSA itself. Aiming at the main known attacks of evaluating secret key with the help of public data, exhaustive groping attack, birthday attack and fabrication attack based on known message, security of DSA is analyzed. The computing expressions are given about the attack methods. It is indicated that these attacks are equal to or more difficult than solving the discrete logarithm problem. Upon that, security intensity of DSA is shown a certain content. The potential weakness of DSA is given, lying in random number k, message independent signature r, sharing modulus p and q, Hash function, etc. And the corresponding solutions are presented.A favorable random numbers generator is designed for selecting right random numbers, so the attacks on low exponential and same random number could be avoided. Length of modulus p is selected reasonably, so the attack on the common signature r could been counteracted. DSA prime is used as modulus in the case of high security intensity and low speed, so the common modulus attack could be resisted. SHA(Secure Hash Algorithm) with enough length message digest is utilized, so security of inline hash function could be ensured.
Key words: digital signature, digital signature algorithm(DSA), security, attack
CLC Number:
ZHANG Hai-rong|HUANG Yu-lan|CHI Xue-fen. Analysis on Security of Digital Signature Algorithm[J].J4, 2009, 27(06): 563-.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: http://xuebao.jlu.edu.cn/xxb/EN/
http://xuebao.jlu.edu.cn/xxb/EN/Y2009/V27/I06/563
Cited