ELGAMAL DIGITAL SIGNATURE SCHEME WITH INTEGRATED CFEA-TECHNIQUE

Authors

  • Arif Mandangan Faculty of Science and Natural Resources, University Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu, Sabah, Malaysia
  • Che Haziqah Che Hussin Faculty of Science and Natural Resources, University Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu, Sabah, Malaysia
  • Chang Ee Hung Faculty of Science and Natural Resources, University Malaysia Sabah, Jalan UMS, 88400 Kota Kinabalu, Sabah, Malaysia

DOI:

https://doi.org/10.11113/jt.v78.8972

Keywords:

Authentication, El-Gamal digital signature scheme, CFEA-technique

Abstract

One of the four security goals is authentication. Authentication is a mechanism to ensure that we are communicating with the intended party. If Alice and Bob want to communicate securely, then the authentication mechanism will be able to ensure that Alice is truly communicating with Bob, and Bob is truly communicating with Alice. This mechanism can be provided by the cryptography. One of the most established cryptography schemes is ElGamal cryptosystem. The original version of this cryptosystem is to provide confidentiality through encryption and decryption procedures. By manipulating these procedures, the authentication mechanism can be carried out. Thus, ElGamal Digital Signature Scheme emerges as one of the most popular authentication mechanisms. In order to provide good level of security, proper parameters must be used in this scheme. This includes the size of the parameters. Larger parameters will provide a better level of security. As a consequence, the performance of the scheme becomes an issue in real life application. In this paper, we proposed the enhancement of the ElGamal Digital Signature Scheme by integrating the Continued-Fraction-Euclidean-Algorithm (CFEA) technique. This technique is able to reduce the number of data to be processed in the signing and verification procedures. By integrating the CFEA-technique into the ElGamal Digital Signature Scheme, any number of documents can be compressed becomes a pair of documents. Therefore, the signing and verification procedures can be done in smaller number of steps.

References

Farouzan, B. A. 2008. Security Goal in Introduction to Cryptography & Network Security. NY: McGraw-Hill Companies Inc. 2-3.

Hoffstein, J., Pipher, J. and Silverman, J. H. 2008. Introduction to Cryptography. In Axier, S. and Ribet, K. A. (ed.). An Introduction to Mathematical Cryptography. New York: Springer Sciences Bussiness Media. 1-47.

Rivest, R. L., Shamir, A. and Adleman, L. 1978. A Method of Obtaining Digital Signature and Public Key Cryptosystem. Commun. ACM21. 120-126.

El-Gamal, T. 1985. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithm Algorithm. IEEE Transactions on Information Theory. 31(4): 469-472.

Hoffstein, J., Pipher, J. and Silverman, J. H. 2008. Discrete Logarithm and Diffie Hellman. In Axier, S. and Ribet, K. A. (ed.). An Introduction to Mathematical Cryptography. New York: Springer Sciences Bussiness Media. 59-92.

Hwang, M. S., Chang, C. C., & Hwang, K. F. 2002. An-ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Transactions of Knowledge and Data Engineering. 14(2): 445-446.

Chang, Y. S., Wu, T. C., & Huang, S. C. 2000. ElGamal-like Digital Signature and Multisignature Schemes using Self-Certified Public Keys. The Journal of System and Software. 99-105.

Sun, M. H., Chen, B. J., & Hwang, T. 1999. Cryptanalysis of Group Signature Scheme using Self-Certified Public Keys. Electronics Letters. 35(22).

Hwang, S. J., and Lee, H. Y. 2004. Repairing ElGamal-like Multi-signature Schemes using Self-Certified Public Keys. Applied Mathematics and Computation. 73-83.

Yoon, E. J., Ryu, E. K., & Yoo, K. Y. 2004. Efficient Remote User Authentication Scheme based on Generalized ElGamal Signature Scheme. IEEE Transactions of Knowledge and Data Engineering. 50(2): 568-570.

Mandangan, A., Loh, C. M., Chang, E. H. and Hussin, C. H. C. 2015. CFEA-Technique: Smaller Size of the Compressed Plaintext. International Journal of Cryptology Research. 5(1): 1-10.

Chang, E. H. and Mandangan, A. 2013. Compression-RSA: New Approach of Encryption and Decryption. AIP Conference Proceedings. 1522. 50-54.

Mandangan, A., Loh, C. M., Chang, E. H. and Hussin, C. H. C. 2014. Compression-RSA Technique: A More Efficient Encryption-Decryption Procedure. AIP Conference Proceedings. 1602: 50-55.

Mandangan, A., Lee, S. Y., Chang, E. H. and Hussin, C. H. C. 2014. El-Gamal Cryptosystem with Embedded Compression-Crypto Technique. AIP Conference Proceedings. 1635: 455-460.

Mandangan, A., Chang, E. H., Lee, S. Y. and Hussin, C. H. C. 2014. Integration of CFEA-Technique in Asymmetric Key Cryptosystems. Proceeding of 3rdInternational Conference on Interactive Digital Media. 362-366.

Downloads

Published

2016-06-12

How to Cite

ELGAMAL DIGITAL SIGNATURE SCHEME WITH INTEGRATED CFEA-TECHNIQUE. (2016). Jurnal Teknologi (Sciences & Engineering), 78(6-4). https://doi.org/10.11113/jt.v78.8972