通信学报 ›› 2013, Vol. 34 ›› Issue (7): 154-158.doi: 10.3969/j.issn.1000-436x.2013.07.017

• 学术通信 • 上一篇    下一篇

破解新型的轻量级数字签名方案

古春生1,2,3   

  1. 1 江苏理工学院 计算机工程学院,江苏 常州213001;
    2 中国科学技术大学 计算机科学与技术学院,安徽 合肥230027;
    3 常州市云计算与智能信息处理重点实验室,江苏 常州213001
  • 出版日期:2013-07-25 发布日期:2017-06-24
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;常州市应用基础研究基金资助项目;江苏理工学院科研基金资助项目;江苏理工学院科研基金资助项目

Breaking novel and lightweight digital s ignature scheme

Chun-sheng GU1,2,3   

  1. 1 School of Computer Engineering, Jiangsu University of Technology, Changzhou 213001, China;
    2 School of Computer Science and Technology, Universi f Science and Technology of China, Hefei 230027, China;
    3 Key Laboratory of Cloud Computing & Intelligent Information Processing of Changzhou City, Changzhou 213001, China
  • Online:2013-07-25 Published:2017-06-24
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Application Research Foundation of Changzhou;The Research Foundation of Jiangsu University of Technology;The Research Foundation of Jiangsu University of Technology

摘要:

由于RSA、ECC签名方案计算效率低,不适用于无线传感器网络、低廉智能卡、无线射频RFID等特殊应用领域。为设计适用于计算能力有限的小计算设备上的签名方案,Wang等人结合散列认证技术,提出了一种新型的轻量级数字签名方案。针对该新型轻量级数字签名方案,给出了由签名公钥求解其等价签名私钥的多项式时间算法。使用等价签名私钥,对手可以对任意消息伪造签名,从而破解了他们结合散列认证技术提出的数字签名方案。

关键词: 数字签名, 散列函数, 密码分析

Abstract:

The signature schemes based on RSA and ECC do not seem suitable for special application area such as wire-less sensor network, smart card and wireless RFID since they suffer from low computing efficiency. In order to design a scheme for small computing devices with limited computing capacity, Wang et al. proposed a novel lightweight digital signature scheme based on the hash authentication technology. A polynomial time algorithm, which found an equivalent signing secret key from the public key, was presented or this novel lightweight digital signature scheme. By using the equivalent secret key, adversary can forge signature for arbitrary messages. Hence, their digital signature scheme based on hash authentication is broken.

Key words: digital signature, hash function, cryptanalysis

No Suggested Reading articles found!