Solution to An Attack on Digital Signature in SMS Security

被引:0
|
作者
Saxena, Neetesh [1 ]
Chaudhari, Narendra S. [1 ]
Thomas, Jaya [1 ]
机构
[1] Indian Inst Technol Indore, Dept Comp Sci & Engn, Indore, Madhya Pradesh, India
关键词
digital signature; ECDSA; GSM; repudiation attack; SMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Short Message Service (SMS) is one of the mobile phone services widely used by the public worldwide. One of the main issues during the communication is information security and privacy. Digital Signature algorithms can be applied with the SMS cipher to prevent the message information from the repudiation attack. There are various existing algorithms for digital signature like RSA, DSA and ECDSA. Out of these, ECDSA has been proved and found the best algorithm in terms of efficiency and cryptanalysis. But ECDSA has some drawbacks also, and because of that some authors have proposed variant algorithms of ECDSA. In this paper, we propose solutions to an attack on digital signature that has been found on a variant of ECDSA. At the end of this paper, conclusion with the suitable solution approach with its security analysis is summarized.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack
    Zhou, Bao-Min
    Lin, Lian-Dong
    Wang, Wei
    Liu, Ying
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (02) : 465 - 473
  • [42] Digital multi-signature scheme and its security proof
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (01): : 176 - 183
  • [43] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [44] Security of digital signature scheme based on factoring and discrete logarithms
    Chang, CC
    Chang, YF
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 331 - 332
  • [45] Security Analysis on Digital Signature Function Implemented in PDF Software
    Park, Sunwoo
    Lee, Changbin
    Lee, Kwangwoo
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 327 - +
  • [46] A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense
    Guo, Wenzhong
    Lian, Sihuang
    Dong, Chen
    Chen, Zhenyi
    Huang, Xing
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2022, 27 (04)
  • [47] Security issues of CFS-like digital signature algorithms
    D'Alconzo, Giuseppe
    Meneghetti, Alessio
    Piasenti, Paolo
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (01): : 175 - 187
  • [48] Security Analysis of Liu-Li Digital Signature Scheme
    Liu, Chenglian
    Zhang, Jianghong
    Deng, Shaoyi
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 63 - +
  • [49] Advanced Biometric Web Security System using Digital Signature
    Mathew, Sheryl
    Saranya, G.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [50] Security of digital signature with one-time pair of keys
    Tseng, YM
    Jan, JK
    Chien, HY
    ELECTRONICS LETTERS, 2000, 36 (16) : 1374 - 1375