Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin ... [et al.]

In cryptography, the key exchange protocol is very important before starting secure communication. Both parties will use an asymmetric key algorithm to exchange their keys for encryption and decryption. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol....

Full description

Saved in:
Bibliographic Details
Main Authors: Udin, Md Nizam (Author), Mohd Amin, Farah Azaliney (Author), Mat Abu, Nor Ainaa (Author), Mohamad Sarif, Siti Nurfazlina (Author), Mohammad Zuki, Nur Athirah (Author)
Format: Book
Published: Universiti Teknologi MARA, 2022-10.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_69246
042 |a dc 
100 1 0 |a Udin, Md Nizam  |e author 
700 1 0 |a Mohd Amin, Farah Azaliney  |e author 
700 1 0 |a Mat Abu, Nor Ainaa  |e author 
700 1 0 |a Mohamad Sarif, Siti Nurfazlina  |e author 
700 1 0 |a Mohammad Zuki, Nur Athirah  |e author 
245 0 0 |a Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin ... [et al.] 
260 |b Universiti Teknologi MARA,   |c 2022-10. 
500 |a https://ir.uitm.edu.my/id/eprint/69246/1/69246.pdf 
520 |a In cryptography, the key exchange protocol is very important before starting secure communication. Both parties will use an asymmetric key algorithm to exchange their keys for encryption and decryption. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol. DHKE allows both parties to exchange their keys over the insecure public channel safely. However, DHKE protocol does not authenticate the message, making it easily exposed to third-party interruptions like Man-in-the-Middle (MitM) attack. Therefore, Station to Station (STS) protocols was introduced after modifying the DHKE protocol and adding authentication elements. Thus, this paper proposes to provide the authentication of the STS protocol by using Lamport Digital Signature Scheme. Lamport Digital Signature Scheme, also known as Lamport one-time signature scheme, gives very strong security because it can be built from any cryptographically secure one-way function and usually uses a cryptographic hash function. The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. As a result, both parties will obtain a common key for encryption and decryption, in which both parties play a role by using their respective digital signature for verification within the STS of this protocol. 
546 |a en 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/69246/ 
787 0 |n https://mjoc.uitm.edu.my 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/69246/  |z Link Metadata