首页 | 本学科首页   官方微博 | 高级检索  
     


GOST 34.10—A brief overview of Russia's DSA
Authors:Markus Michels  David Naccache  Holger Petersen
Affiliation:aTheoretical Computer Science and Information Security, University of Technology Chemnitz-Zwickau, 09111 Chemnitz, Germany;bGemplus Card International, Crypto Team, 95200 Sarcelles, France;cLaboratoire d'informatique, Ecole Normale Supérieure, 45 rue d'Ulm 75005 Paris, France
Abstract:GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of View the MathML source (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright
Keywords:Cryptography   Data security   Digital signature schemes   Hash function   Standardization   Russia
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号