SIMULATING THE DIGITAL SIGNATURE PROCESS BASED ON THE RSA-PSS DIGITAL SIGNATURE SCHEME
Abstract
RSA-PSS is a Probabilistic Sign Scheme based on the RSA digital signature, proposed by Mihir Bellare and Phillip Rogaway. This digital signature scheme is an update of their results for industry standards. RSA-PSS has recently been included in RSA Security’s software tools, RSA BSAFE Crypto-C and Crypto-J toolkits. In addition, the RSA-PSS schema can be extended to add message recovery functionality. Based on this idea, the authors have developed an application to digitally sign text content according to the RSA-PSS digital signature scheme with a length to ensure safety as recommended by NIST.
References
C. Security and T. Report, “Báo cáo thường niên an ninh mạng 6,” 2022.
S. T. Hoang, Q. T. Do, and N. Q. Luc, “Build a Blockchain-based confidentiality and privacy solution using cryptographic techniques,” Ministry of Science and Technology, Vietnam, Mar. 2023, vol. 65, no. 3, pp. 1–6, doi: 10.31276/VJST.65(3).01-06.
S. Khan, F. Luo, Z. Zhang, M. A. Rahim, M. Ahmad, and K. Wu, “Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI),” IEEE Communications Surveys & Tutorials, 2022, vol. 24, no. 3, pp. 1574–1601, doi: 10.1109/COMST.2022.3178081.
S. A. Kakvi, “On the Security of RSA-PSS in the Wild,” in Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, Nov. 2019, pp. 23–34. doi: 10.1145/3338500.3360333.
G. Alagic et al., “Status report on the third round of the NIST Post-Quantum Cryptography Standardization process,” Sep. 2022. doi: 10.6028/NIST.IR.8413-upd1.
A. M. Alhababy, “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,”, 2016, vol. 14, no. 5, pp. 1–23.
Y. Wang, “Public Key Cryptography Standards: PKCS,” Jul. 2012, [Online]. Available: http://arxiv.org/abs/1207.5446.
B. Johannes, “RSA-PSS – Provable secure RSA Signatures and their Implementation,” Http://Rsapss.Hboeck.De/, 2011.
Đ. Q. T. Hoàng Văn Thức, “Xem xét mức an toàn đối với độ dài khóa RSA, Tạp chí an toàn thông tin,” Tạp chí An toàn thông tin, 2023, [Online]. Available: https://m.antoanthongtin.gov.vn/mat-madan-su/xem-xet-muc-an-toan-doi-voi-do-dai-khoa-rsa-108774.
E. Barker, “Recommendation for key management: Part 1 – General,” Gaithersburg, MD, May 2020. doi: 10.6028/NIST.SP.800-57pt1r5.
ANSSI, “Mécanismes cryptographiques - Règles et recommandations,” Rev. 2.03, [Online]. Available: https://cyber.gouv.fr/uploads/2014/11/RGS_v-2-0_B1.pdf.
N. P. Smart, “H2020-ICT-2014 – Project 645421 ECRYPT – CSA ECRYPT – Coordination & Support Action Algorithms, Key Size and Protocols Report (2018),” 2018.
F. Office for Information Security, “BSI-Technical Guideline Designation: Cryptographic Mechanisms: Recommendations and Key Lengths,” 2024, [Online]. Available: https://www.bsi.bund.de.
H. Orman and P. Hoffman, “Determining Strengths For Public Keys Used For Exchanging Symmetric Keys,” Apr. 2004. doi: 10.17487/rfc3766.
“The 59th edition of the TOP500 revealed the Frontier system to be the first true exascale machine with an HPL score of 1.102 Exaflop/s,” 2022, [Online]. Available: https://top500.org/lists/top500/2022/06/
“United States GDP,” 2024, [Online]. Available: https://tradingeconomics.com/united-states/gdp
D. Giry, “Cryptographic Key Length Recommendation,” BlueKrypt, 2024, [Online]. Available: https://www.keylength.com/