ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK

Authors

DOI:

https://doi.org/10.28925/2663-4023.2023.22.3953

Abstract

The significance of this research lies in safeguarding user information and data against unauthorized alterations and destruction. Throughout the study, key aspects were explored, including user identification and authen-tication methods, cryptographic authentication protocols, digital signature properties, and strategies to enhance the cryptographic robustness of digital signatures. These strategies involved scrutinizing authentication methods using the Saati technique and the RSA algorithm. The analysis revealed that the attributes employed for digital signature recognition are highly resistant to replication, and the verification process is notably efficient. The height-ened cryptographic resilience of the electronic signature achieved through the RSA algorithm stems from the incorporation of a public key certificate. Consequently, a larger encryption key size corresponds to heightened sys-tem reliability and electronic digital signature security. While the utiliza-tion of the RSA algorithm results in encrypted text that is approximately 10 times larger than the original, its stability is comparatively increased.

Downloads

Download data is not yet available.

References

Xuerui, W., et al. (2021). Attacks and defenses in user authentication systems: A survey. Journal of Network and Computer Applications, 188. https://doi.org/10.1016/j.jnca.2021.103080

Shen, X., Lin, X., & Zhang, K. (2020). User Authentication. Encyclopedia of Wireless Networks, 1–4. . https://doi.org/10.1007/978-3-319-78262-1_300683

Pant, M., et al. (2021). User Authentication in Big Data. Soft Computing: Theories and Applications 1053, 1–9. https://doi.org/10.1007/978-981-15-0751-9_36

Murray, H., & Malone, D. (2021). Quantum Multi-factor Authentication. Emerging Technologies for Authorization and Authentication 13136, 50–67. https://doi.org/10.1007/978-3-030-93747-8_4

Chia, J., Chin, J., & Yip, S. (2021). Pluggable Authentication Module Meets Identity-Based Identification. Advances in Cyber Security 1487, 155–175. https://doi.org/10.1007/978-981-16-8059-5_10

Tolbert, M., et al. (2022). Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems. Information and Communications Security 13407, 184–200. https://doi.org/10.1007/978-3-031-15777-6_11

Komarova, A., et al. (2018). Comparison of Authentication Methods on Web Resources. In: Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry”, 679. https://doi.org/10.1007/978-3-319-68321-8_11

Jain, J. (2022). Authentication. Learn API Testing, 31–39. https://doi.org/10.1007/978-1-4842-8142-0_3

Patel, S., et al. (2021). Survey on Graphical Password Authentication System. Data Intelligence and Cognitive Informatics. Algorithms for Intelligent Systems, 699–708. https://doi.org/10.1007/978-981-15-8530-2_55

Zaixing, Ch., & Shaofei, W. (2022). Research on Digital Identity Authentication Technology Based On Block Chain. Journal of Physics: Conference Series, 1802, 7–9. https://doi.org/10.1088/1742-6596/1802/3/032091

Boonkrong, S. (2021). Biometric Authentication. Authentication and Access Control, 107–132. https://doi.org/10.1007/978-1-4842-6570-3_5

On electronic digital signature, Law of Ukraine No.852-IV (2018) (Ukraine). https://zakon.rada.gov.ua/laws/show/852-15#Text, last accessed 2022/09/23

Sagar Hossen, M., (2021). Digital Signature Authentication Using Asymmetric Key Cryptography with Different Byte Number. Evolutionary Computing and Mobile Sustainable Networks, 53. https://doi.org/10.1007/978-981-15-5258-8_78

Metyolkin A., & Kardashuk V. (2018). Research methods to improve cryptographic stability. Bulletin of Volodymyr Dahl East Ukrainian National University, 6(247), 90–95.

Ravi, P., et al. (2021). Arvind Easwaran Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography. In: International Symposium on Circuits and Systems (ISCAS), 1–5. https://doi.org/10.1109/ISCAS45731.2020.9180847

Boyd, C., Mathuria, A., & Stebila, D. (2019). Authentication and Key Transport Using Public Key Cryptography. Protocols for Authentication and Key, 135–164. https://doi.org/10.1007/978-3-662-58146-9_4

Carminati, B. (2018). Digital Signatures. Encyclopedia of Database Systems, 1093–1099. https://doi.org/10.1007/978-1-4614-8265-9_131

Thiagarajan, K., et al. (2018). Encryption and decryption algorithm using algebraic matrix approach. Journal of Physics: Conference Series, 1000, 2–3. https://doi.org/10.1088/1742-6596/1000/1/012148

Downloads


Abstract views: 273

Published

2023-12-28

How to Cite

Chubaievskyi, V., Lutska, N., Savchenko, T., Vlasenko, L., & Synelnyk, K. (2023). ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(22), 39–53. https://doi.org/10.28925/2663-4023.2023.22.3953