Recent Progress in ECDSA and DSA Digital Signature Algorithms

Authors

  • Senyi Gong

DOI:

https://doi.org/10.62051/at4q6n03

Keywords:

ECDSA Algorithm; DSA Algorithm; Digital Signature; Elliptic Curve Cryptography.

Abstract

Digital signatures are essential for verifying the authenticity and integrity of information, thus facilitating digital authentication. The Elliptic Curve Digital Signature Algorithm (ECDSA) and the Digital Signature Algorithm (DSA) play critical roles in the field of digital signatures. This paper explores the conceptual frameworks and mathematical underpinnings of these algorithms, providing an in-depth analysis of their advantages and disadvantages with a focus on computational time complexity and key length requirements. The distinct applications of ECDSA and DSA in various fields are examined, highlighting how the selection of an algorithm influences security and efficiency in different scenarios. This analysis also considers the algorithms' suitability for specific security applications, offering insights into their strategic deployment. By comparing these characteristics, the study aims to guide the selection of appropriate digital signature technology, tailored to meet operational needs and security specifications. This comparative approach not only elucidates the practical implications of each algorithm but also contributes to a broader understanding of their roles in securing digital transactions.

Downloads

Download data is not yet available.

References

[1] W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. Inf. Theory 22(6) (1976) 644-654.

[2] R.L. Rivest, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 26(2) (1978) 96-99.

[3] T. Elgamal, A public-key cryptosystem and signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory 31(4) (1985) 469-472.

[4] C.P. Schnorr, Efficient signature generation by smart cards, J. Cryptol. 4(3) (1991) 161-174.

[5] X. Zhu, H. Xu, Z. Zhao, et al., "An Environmental Intrusion Detection Technology Based on WiFi," Wireless Personal Communications, vol. 119, no. 2, pp. 1425-1436, 2021.

[6] R.L. Rivest, M.E. Hellman, J.C. Anderson, et al., Responses to NIST's proposal, Commun. ACM 35(7) (1992) 41-54.

[7] Shenzhen Qianhai WeBank Co., LTD., A data processing method based on collaborative calculation, Chinese Patent CN202310238511.6, (2023-06-27).

[8] Y. Qin, W. Xu, Optimization of the ECDSA algorithm on the finite domain GF(2^m), Comput. Eng. Appl. 42(29) (2006) 136-138, 176.

[9] X. Wang, Hardware implementation design of ECDSA signature algorithm and FPGA simulation [dissertation], Xidian University, Shaanxi, (2018).

[10] K. Zhao, Z. Liu, Y. Tang, Optimized design of prime selection in DSA encryption algorithm, Sci. Technol. Inf. (2010) (33) 30, 275.

[11] L. Zhu, High-speed implementation of the hash function encryption algorithm [dissertation], Shanghai Jiao Tong University, Shanghai, (2007).

[12] F. Yu, Y. Jia, An Enhanced Lattice Attack to DSA and ECDSA Scheme, Netinfo Security 22(2) (2022) 11-20.

[13] D. Wang, Application of ECDSA in mobile e-commerce [dissertation], Northeastern University, Liaoning, (2005).

[14] S. Li, X. Dou, X. Zhang, A 3D printing plus cryptographic method based on ECDSA, Digit. Commun. World (2021) (4) 85-86.

[15] Q. Huang, Optimization of network performance in wireless sensor networks, Central South University, Hunan, (2014).

[16] S. Chen, R. Zhao, Mobile communication user authentication scheme based on DSA digital signature algorithm, In: Proc. 6th China Acad. Conf. Cryptogr. Beijing: Science Press, (2000) 129-132.

[17] R. Yang, H. Wu, J. Zhang, Application of DSA encryption algorithm in mobile phone SMS early warning, Inf. Secur. Commun. Confid. (2013) (11) 97-99.

Downloads

Published

17-10-2024

How to Cite

Gong, S. (2024) “Recent Progress in ECDSA and DSA Digital Signature Algorithms”, Transactions on Computer Science and Intelligent Systems Research, 6, pp. 22–29. doi:10.62051/at4q6n03.