APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL
DOI:
https://doi.org/10.24191/mjoc.v7i2.17181Keywords:
Lamport Digital Signature Scheme, Station to Station Protocol, Diffie-Hellman Key Exchange, Man in the Middle Attack and One-way Function, Public Key CryptographyAbstract
In cryptography, the key exchange protocol is very important before starting secure communication. Both parties will use an asymmetric key algorithm to exchange their keys for encryption and decryption. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol. DHKE allows both parties to exchange their keys over the insecure public channel safely. However, DHKE protocol does not authenticate the message, making it easily exposed to third-party interruptions like Man-in-the-Middle (MitM) attack. Therefore, Station to Station (STS) protocols was introduced after modifying the DHKE protocol and adding authentication elements. Thus, this paper proposes to provide the authentication of the STS protocol by using Lamport Digital Signature Scheme. Lamport Digital Signature Scheme, also known as Lamport one-time signature scheme, gives very strong security because it can be built from any cryptographically secure one-way function and usually uses a cryptographic hash function. The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. As a result, both parties will obtain a common key for encryption and decryption, in which both parties play a role by using their respective digital signature for verification within the STS of this protocol
References
Aryan, Kumar, C., & Durai Raj Vincent, P. M. (2017).Enhanced Diffie-Hellman algorithm for reliable key exchange. IOP Conference Series: Materials Science and Engineering, 263, 042015. https://doi.org/10.1088/1757-899X/263/4/042015
Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography. http://wwwcse.ucsd.edu/users/mihirhttp://www.cs.ucdavis.edu/∼rogaway
Burmester, M., & Desmedt, Y. G. (1996, April). Efficient and secure conference-key distribution. In International Workshop on Security Protocols (pp. 119-129). Springer, Berlin, Heidelberg.
Chang, M. H., & Yeh, Y. S. (2005). Improving Lamport one time signature scheme. Applied Mathematics and Computation, 167(1), 118–124. https://doi.org/10.1016/J.AMC.2004.06.108
Diffie, W., Van Oorschot, P. C., & Wiener, M. J. (1992). Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2), 107-125. https://doi.org/10.1007/BF00124891
Gómez Pardo, J. L. (2013). Introduction to Cryptography with Maple. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-32166-5
Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer Verlag New York.
Kallam, S. (2015). Diffie-Hellman: Key exchange and public key cryptosystems. Master Degree of Science, Math and Computer Science, Department of India State University, USA. http://cs.indstate.edu/~skallam/doc.pdf
Krishna Kumar, C., Jai Arul Jose, G., Sajeev, C., & Suyambulingom, C. (2012). Safety measures against man-in-the-middle attack in key exchange. ARPN Journal of Engineering and Applied Sciences, 7(2), 243–246.
Lamport, L. (1979). Constructing digital signatures from a one way function.
Mishra, M. R., & Kar, J. (2017). A study on Diffie-Hellman Key Exchange Protocols. International Journal of Pure and Apllied Mathematics, 114(2). https://doi.org/10.12732/ijpam.v114i2.2
Nan Li (2010). Research on Diffie-Hellman key exchange protocol. 2010 2nd International Conference on Computer Engineering and Technology, 4, V4-634-V4-637. https://doi.org/10.1109/ICCET.2010.5485276
Paar, C., & Pelzl, J. (2010). Understanding Cryptography. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04101-3
Sako, K. (2011). Digital Signature Schemes. In H. C. A. van Tilborg & S. Jajodia (Eds.), Encyclopedia of Cryptography and Security (pp. 343–344). Springer US. https://doi.org/10.1007/978-1-4419-5906-5_17
Swinhoe, D. (2019). What is a man-in-the-middle attack? How MitM attacks work and how to prevent them? CSO Online. https://www.csoonline.com/article/3340117/what-is-a-manin-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
Thanalakshmi P., Anitha R., Anbazhagan N., Park C., Joshi G. P., & Seo C. A. Hash-Based Quantum-Resistant Designated Verifier Signature Scheme. Mathematics. 2022; 10(10):1642. https://doi.org/10.3390/math10101642
Zaverucha, G. M., Stinson, D. R., & Cheriton, D. R. (2010). Short One-Time Signatures. https://eprint.iacr.org/2010/446.pdf
Zentai, D. (2020). On the efficiency of the Lamport Signature Scheme. Land Forces Academy Review, 25(3), 275–280. https://doi.org/10.2478/raft-2020-0033
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Md Nizam Udin, Farah Azaliney Mohd Amin, Nor Ainaa Mat Abu, Siti Nurfazliana Mohamad Sarif, Intan Nur Athirah Mohammad Zuki

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.




