Skip to main content

Susceptibility of digital signature schemes based on error-correcting codes to universal forgery

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 829))

Abstract

Xinmei's digital signature scheme and the scheme's modified version as proposed by Harn and Wang have been shown by the authors and others to be susceptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei's scheme are vulnerable to universal forgeries. Equipped with this attack and the earlier ones, general remarks about digital signature schemes based on linear errorcorrecting block codes are presented.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Alabbadi and S. B. Wicker. Cryptanalysis of the Harn and Wang modification of the Xinmei digital signature scheme. Electronics Letters, 28(18):1756–1758, 27th August 1992.

    Google Scholar 

  2. M. Alabbadi and S. B. Wicker. Security of Xinmei's digital signature scheme. Electronics Letters, 28(9):890–891, 23rd April 1992.

    Google Scholar 

  3. M. Alabbadi and S. B. Wicker. Digital signature schemes based on error-correcting codes. In IEEE International Symposium on Information Theory, January 17–22 1993. San Antonio, Texas, U.S.A.

    Google Scholar 

  4. D. W. Davies and W. L. Price. Security for Computer Networks. John Wiley and Sons, 1989.

    Google Scholar 

  5. L. Harn and D.-C. Wang. Cryptanalysis and modification of digital signature scheme based on error-correcting codes. Electronics Letters, 28(2):157–159, 16th January 1992.

    Google Scholar 

  6. P. J. Lee and E. F. Brickell. An obsevation on the security of McEliece's public-key cryptosystem. In C. G. Gunther, editor, Lecture Notes in Computer Science # 330, Advances in Cryptology-Eurocrypt '88 Proceedings, pages 275–280, Davos, Switzerland, May 25–27 1988. Springer-Verlag.

    Google Scholar 

  7. Yuan-Xing Li. An attack on Xinmei's digital signature scheme. In IEEE International Symposium on Information Theory, January 17–22 1993. San Antonio, Texas, U.S.A.

    Google Scholar 

  8. R. J. McEliece. Public-key cryptosystem based on algebraic coding theory. JPL DSN Progress Report 42–44, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, U.S.A. Jan. & Feb. 1978. Pages 114–116.

    Google Scholar 

  9. J. Meijers and J. van Tilburg. On the Rao-Nam private-key cryptosystem using linear codes. In IEEE International Symposium on Information Theory, page 126, June 24–28 1991. Budapest, Hungary.

    Google Scholar 

  10. National Bureau of Standard. Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, January 1977. U.S. Department of Commerce, Washington, D.C..

    Google Scholar 

  11. J. van Tilburg. On the McEliece public-key cryptosystem. In S. Goldwasser, editor, Lecture Notes in Computer Science # 403, Advances in Cryptology-Crypto '88 Proceedings, pages 119–131, Santa Barbara, Ca., Aug. 21–25 1988. Springer-Verlag.

    Google Scholar 

  12. J. van Tilburg. Cryptanalysis of Xinmei digital signature scheme. Electronics Letters, 28(20):1935–1936, 24th September 1992.

    Google Scholar 

  13. W. Xinmei. Digital signature scheme based on error-correcting codes. Electronics Letters, 26(13):898–899, 21st June 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Andrew Chmora Stephen B. Wicker

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alabbadi, M., Wicker, S.B. (1994). Susceptibility of digital signature schemes based on error-correcting codes to universal forgery. In: Chmora, A., Wicker, S.B. (eds) Error Control, Cryptology, and Speech Compression. ECCSP 1993. Lecture Notes in Computer Science, vol 829. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58265-7_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-58265-7_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58265-6

  • Online ISBN: 978-3-540-48588-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics