APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL

Authors

  • Md Nizam Udin Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Negeri Sembilan, Kampus Seremban 70300 Seremban, Negeri Sembilan, Malaysia
  • Farah Azaliney Mohd Amin Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Negeri Sembilan, Kampus Seremban 70300 Seremban, Negeri Sembilan, Malaysia
  • Nor Ainaa Mat Abu Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Negeri Sembilan, Kampus Seremban 70300 Seremban, Negeri Sembilan, Malaysia
  • Siti Nurfazliana Mohamad Sarif Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Negeri Sembilan, Kampus Seremban 70300 Seremban, Negeri Sembilan, Malaysia
  • Intan Nur Athirah Mohammad Zuki Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Negeri Sembilan, Kampus Seremban 70300 Seremban, Negeri Sembilan, Malaysia

DOI:

https://doi.org/10.24191/mjoc.v7i2.17181

Keywords:

Lamport Digital Signature Scheme, Station to Station Protocol, Diffie-Hellman Key Exchange, Man in the Middle Attack and One-way Function, Public Key Cryptography

Abstract

In cryptography, the key exchange protocol is very important before starting secure communication. Both parties will use an asymmetric key algorithm to exchange their keys for encryption and decryption. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol. DHKE allows both parties to exchange their keys over the insecure public channel safely. However, DHKE protocol does not authenticate the message, making it easily exposed to third-party interruptions like Man-in-the-Middle (MitM) attack. Therefore, Station to Station (STS) protocols was introduced after modifying the DHKE protocol and adding authentication elements. Thus, this paper proposes to provide the authentication of the STS protocol by using Lamport Digital Signature Scheme. Lamport Digital Signature Scheme, also known as Lamport one-time signature scheme, gives very strong security because it can be built from any cryptographically secure one-way function and usually uses a cryptographic hash function. The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. As a result, both parties will obtain a common key for encryption and decryption, in which both parties play a role by using their respective digital signature for verification within the STS of this protocol

References

Aryan, Kumar, C., & Durai Raj Vincent, P. M. (2017).Enhanced Diffie-Hellman algorithm for reliable key exchange. IOP Conference Series: Materials Science and Engineering, 263, 042015. https://doi.org/10.1088/1757-899X/263/4/042015

Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography. http://wwwcse.ucsd.edu/users/mihirhttp://www.cs.ucdavis.edu/∼rogaway

Burmester, M., & Desmedt, Y. G. (1996, April). Efficient and secure conference-key distribution. In International Workshop on Security Protocols (pp. 119-129). Springer, Berlin, Heidelberg.

Chang, M. H., & Yeh, Y. S. (2005). Improving Lamport one time signature scheme. Applied Mathematics and Computation, 167(1), 118–124. https://doi.org/10.1016/J.AMC.2004.06.108

Diffie, W., Van Oorschot, P. C., & Wiener, M. J. (1992). Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2), 107-125. https://doi.org/10.1007/BF00124891

Gómez Pardo, J. L. (2013). Introduction to Cryptography with Maple. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32166-5

Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer Verlag New York.

Kallam, S. (2015). Diffie-Hellman: Key exchange and public key cryptosystems. Master Degree of Science, Math and Computer Science, Department of India State University, USA. http://cs.indstate.edu/~skallam/doc.pdf

Krishna Kumar, C., Jai Arul Jose, G., Sajeev, C., & Suyambulingom, C. (2012). Safety measures against man-in-the-middle attack in key exchange. ARPN Journal of Engineering and Applied Sciences, 7(2), 243–246.

Lamport, L. (1979). Constructing digital signatures from a one way function.

Mishra, M. R., & Kar, J. (2017). A study on Diffie-Hellman Key Exchange Protocols. International Journal of Pure and Apllied Mathematics, 114(2). https://doi.org/10.12732/ijpam.v114i2.2

Nan Li (2010). Research on Diffie-Hellman key exchange protocol. 2010 2nd International Conference on Computer Engineering and Technology, 4, V4-634-V4-637. https://doi.org/10.1109/ICCET.2010.5485276

Paar, C., & Pelzl, J. (2010). Understanding Cryptography. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04101-3

Sako, K. (2011). Digital Signature Schemes. In H. C. A. van Tilborg & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (pp. 343–344). Springer US. https://doi.org/10.1007/978-1-4419-5906-5_17

Swinhoe, D. (2019). What is a man-in-the-middle attack? How MitM attacks work and how to prevent them? CSO Online. https://www.csoonline.com/article/3340117/what-is-a-manin-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html

Thanalakshmi P., Anitha R., Anbazhagan N., Park C., Joshi G. P., & Seo C. A. Hash-Based Quantum-Resistant Designated Verifier Signature Scheme. Mathematics. 2022; 10(10):1642. https://doi.org/10.3390/math10101642

Zaverucha, G. M., Stinson, D. R., & Cheriton, D. R. (2010). Short One-Time Signatures. https://eprint.iacr.org/2010/446.pdf

Zentai, D. (2020). On the efficiency of the Lamport Signature Scheme. Land Forces Academy Review, 25(3), 275–280. https://doi.org/10.2478/raft-2020-0033

Downloads

Published

2022-10-01

How to Cite

Udin, M. N., Mohd Amin, F. A., Mat Abu, N. A., Mohamad Sarif, S. N., & Mohammad Zuki, I. N. A. (2022). APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL. Malaysian Journal of Computing, 7(2), 1139–1149. https://doi.org/10.24191/mjoc.v7i2.17181