Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

Mahshid Sadeghpour

Abstract


Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-certified public keys. Their schemes have two fundamental properties. Only the intended receiver can recover the message while verifying the signature, and each user can use his own private key independently without system authority learning about it. This paper presents man-in-the-middle attacks to both Tseng and his colleagues authenticated encryption variants. It will be shown that these schemes are not secure against this attack.


Keywords


Self-certified public key; Authenticated encryption; Digital signature; Man-in-the-middle attack.

Full Text:

PDF

References


Y.-H. Chen and J.-K. Jan. “An authenticated encryption scheme for securely signing a signature with message linkages”, International Conference on Innovative Computing, Information and Control, pp. 77-80, 2007.

T. ElGamal. “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inform Theory 31 (4), pp. 469-472, 1985.

L. H. Encinas and A.M Rey and J.M. Masque. “A Weakness in Authenticated Encryption Schemes Based on Tseng et al.’s schemes”, vol. 7, no. 2, pp. 185-187, 2008.

M. Girault. “Self-certified public keys”, Advances in CryptologyEUROCRYPT’91, Springer, Berlin, 1991, pp. 491-497.

P. Horster and M. Michels and H. Petersen. “Authenticated encryption schemes with low communication costs”, Electronic Letters 30 (15), pp. 1212-1213, 1994.

M. S. Hwang and J. Y. Hsiao and Y.-P. Chu. “Improvement of authenticated encryption schemes with message linkages for message flows”, IEICE Trans. Inf. & Syst., vol. E89-D, no.4, pp. 1575-1577, 2006.

K. Neyberg and R. Ruppel. “Message recovery for signature schemes based on the discrete logarithm problem”, Advances in CryptologyErocryt’94, LNCS 950, Springer, Berlin, 1994, pp.175-190.

M. Rasslan. “Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes”, IEICE Trans. Inf. & Syst., vol. E93-D, no.5, pp. 1301-1302, 2010.

Z. Shao. “Improvement of digital signature with message recovery using self-certified public keys and its variants”, Applied Mathematics and Computation 159, pp. 391-399, 2004.

C.-s. Tsai and S.-C. Lin and M.-S. Hwang. “Cryptanalysis of an authenticated encryption scheme using self-certified public keys”, Applied Mathematics and Computation 166, pp. 118-122, 2005.

Y.-M. Tseng and J.-K. Jan and H.-Y. Chien. “Digital signature with message recovery using self-certified public keys and its variant.” Applied Mathematics and Computation 136, pp. 203-214, 2003.

Q. Xie and Y. Xiu. “Cryptanalysis of Tseng et al.’s authenticated encryption schemes”, Applied Mathematics and Computation 158, pp. 1-5, 2004.

Zh. Zhang and F. Feng, F. “Cryptanalysis of some signature schemes with message recovery”, Applied Mathematics and Computation 170, pp.103-114, 2005.


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).