SciELO - Scientific Electronic Library Online

 
vol.20 issue2Sampling for quality control in the process of manufacturing metal containers for foodEffect of morphology on the hydrolytic degradation of segmented polyurethane-urea films author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Ingeniería, investigación y tecnología

On-line version ISSN 2594-0732Print version ISSN 1405-7743

Abstract

LIZAMA-PEREZ, Luis Adrián et al. Public hash signature for mobile network devices. Ing. invest. y tecnol. [online]. 2019, vol.20, n.2. ISSN 2594-0732.  https://doi.org/10.22201/fi.25940732e.2019.20n2.018.

In this work we have developed a digital signature protocol using hash functions that once implemented on mobile devices have demonstrated to be secure and efficient. It has been incorporated a model for a Certification Authority to exchange public keys between users. This work constitutes an experimental research, which bears a certain resemblance to theoretical research, but is not intended to propose a new theory, but to establish the behavior of a system to know its characteristics, in order to improve its knowledge and/or its performance.The hash signature system was tested on mobile communication devices. The experimental results show that the hash signature improves the efficiency to generate the cryptographic keys and the signing and verification processes when compared to ECC. Likewise, when generating 2048 keys, the hash signature is faster than RSA. In addition, the larger RSA keys consume a significative time, while the hash does not require to increase the size of the keys. Although we have not included here a formal analysis about the protocol, we highlight some points that improve the security of the proposed protocol. Finally, this work constitutes a new approach to public key cryptography based on hash functions that could be used to make digital signatures in electronic commerce. This method is suitable for mobile network devices due to the high speed and low hardware requirements of the hash functions. The method described here, which is compatible with hash functions, belongs to the field of post-quantum cryptography. The security of the method is based on the security of the hash cryptography, which is widely known and discussed.

Keywords : Hash function; hash chain; Merkle tree; digital signature; mobile devices.

        · abstract in Spanish     · text in English     · English ( pdf )