Explore chapters and articles related to this topic
Blockchain Architecture, Components and Considerations
Published in Shaun Aghili, The Auditor's Guide to Blockchain Technology, 2023
Aafreen Fathima Altaf Hussain, Temitope Ipentan, Mahakpreet Singh, Grace Moyo Adeyemi
The key pair owner uses the private key to generate digital signatures. A message digest is created using a hash function before the digital signature generation process. The message digest is a concise version of the data to be signed and is used as an input to generate digital signatures. After the generation of the message digest, a digital signature algorithm is selected, and other information pertinent to the algorithm is obtained (for example, Elliptic Curve Digital Signature Algorithm). A digital signature is generated by the intended signatory using the private key, message digest, a digital signature algorithm and other details. The signatory may validate the signature using the public key to identify computation errors in the digital signature generation process [29] (Figure 2.5).
Key Generation
Published in Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry, Blockchain for 6G-Enabled Network-Based Applications, 2023
Surendra Kumar, Narander Kumar
Digital signatures further enable procedures to create advanced signatures. Today’s various basic digital signatures are framed by marking message digests with the private key of the beginning of production of a digital information thumbprint. Since just the message digest is signed, the digital signature is normally a lot shorter than the agreed-upon information. In addition, digital signatures set a similarly low burden on PC processors during the signing procedure, go through insignificant measures of transfer speed, and make modest quantities of ciphertext for the cryptanalysis process [16]. Today, some widely used advanced digital signature approaches are the Digital Signature Algorithm (DSA) and the RSA digital signature.
SEEDDUP: A Three-Tier SEcurE Data DedUPlication Architecture-Based Storage and Retrieval for Cross-Domains Over Cloud
Published in IETE Journal of Research, 2023
Initially key pairs are generated by . Nieterreiter Cryptography Algorithm provides strong security. It utilizes a syndrome as ciphertext instead of the code word and the plain text is an error pattern. Niederreiter encryption is ten times faster than other public cryptosystems. It can be also used to construct a digital signature algorithm. Encryption and decryption time complexity is minimum compared to traditional asymmetric algorithms such as RSA, ECC, and ECDSA. The computation of syndrome requires the parity check matrix as a public key instead of the generator matrix. When systematic matrices are used, then there is no effect on the size of keys. This paper presents the modern Niederreiter Cryptographic Algorithm for key generation. The procedure for key generation using Goppa polynomial is depicted in algorithm 1.
Security of networked control systems subject to deception attacks: a survey
Published in International Journal of Systems Science, 2022
Zhong-Hua Pang, Lan-Zhi Fan, Haibin Guo, Yuntao Shi, Runqi Chai, Jian Sun, Guo-Ping Liu
According to the keys used for encryption and decryption, cryptographic technologies are divided into: symmetric cryptography and asymmetric cryptography (also known as public key cryptography). Symmetric cryptography refers to encryption and decryption using the same secret key for both sides of the communication with faster encryption and less computation (Schneier, 1996). Typical algorithms include Data Encryption Standard, 3 Data Encryption Standard, and Advanced Encryption Standard. Nevertheless, asymmetric cryptography employs a pair of keys: a public key and a private key. The private key can only be held securely by one party and cannot be leaked, while the public key can be issued to anyone who requests it. This technique provides better security. The main algorithms are Elliptic Curves Cryptography, Digital Signature Algorithm, and Rivest–Shamir–Adleman (RSA) (Ashibani & Mahmoud, 2017). However, it is not feasible to only rely on one approach to serve all security challenges. In order to keep information confidential, two or more methods are often used in combination. Currently, some other technologies, such as lightweight encryption, homomorphic encryption, and blockchain technology (Alexandru et al., 2021; Jan et al., 2021; Jia et al., 2022; Liang et al., 2019), have also gained widespread popularity.
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure
Published in Enterprise Information Systems, 2022
Wattana Viriyasitavat, Li Da Xu, Assadaporn Sapsomboon, Gaurav Dhiman, Danupol Hoonsopon
PKI technology relies on Certificate Authority (CA) to manage certificates assigned to requesting entities. Technically, an entity is bound to a unique public key. Information inside a certificate entails the specification of encryption technology, for example, RSA or ECC, and digital signature algorithm. The property specification directs the establishment of secure communication channel. In practice, CAs contain a lot of shortcomings. CAs are considered trust anchors, which are vulnerable to single point of failure due to centralisation. There are a few studies trying to exploit Blockchain advantages to solve traditional PKI shortcomings. SCPKI (Al-Bassam 2017) is a decentralised design PKI model based on web-of-trust to replace traditional PKI technology. It is built on Ethereum ecosystem with transparency that benefits fast detection of rogue certificates. We are motivated by this work has motivated to extend the capabilities to address more fine-grained attributes for Blockchain into certificate. Fromknecht et al. (Fromknecht and Yakoubov 2014) explored the problem of identity retention and introduced CertCoin with optimisation to be used in light nodes, such as smart phone. By addressing IoT characteristics (Viriyasitavat, Anuphaptrirong, and Hoonsopon 2019), Singa and Bertino (Singla and Bertino 2018) implemented Blockchain as an alternative to CA-based PKI to support IoT devices. However, this work neglects the benefits of existing PKI infrastructure and try to use Blockchain entirely to substitute current PKI settings.