CINXE.COM

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" class="no-js"> <head> <meta content="text/html; charset=UTF-8" http-equiv="Content-Type" /> <meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible" /> <meta content="width=device-width; initial-scale=1.0; maximum-scale=1.0;" name="viewport" /> <link href="./inc/bootstrap/css/bootstrap.min.css" rel="stylesheet" type="text/css" /> <link href="./inc/css/select2.min.css" rel="stylesheet" type="text/css" /> <link rel="shortcut icon" href="./favicon.ico" /> <link rel="apple-touch-icon" href="./images/apple-touch-icon.png" /> <script type="text/javascript" src="inc/js/lang.js"></script> <script type="text/javascript"> _atrk_opts = { atrk_acct:"8dxdn1aMp410/9", domain:"ekb.eg",dynamic: true}; (function() { var as = document.createElement("script"); as.type = "text/javascript"; as.async = true; as.src = "https://certify-js.alexametrics.com/atrk.js"; var s = document.getElementsByTagName("script")[0];s.parentNode.insertBefore(as, s); })(); </script> <noscript><img src="https://certify.alexametrics.com/atrk.gif?account=8dxdn1aMp410/9" style="display:none" height="1" width="1" alt="" /></noscript><title>Security Evaluation of Different Hashing Functions with RSA for Digital Signature</title> <meta name="keywords" content="IOT,RSA,Hashing,Digital Signature, Security" /> <meta name="description" content="The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest鈥揝hamir鈥揂dleman (RSA) method, based on the Miller-Rabin technique, as a stream key generator with five distinct hashing functions to attain robust digital signatures. The RSA encryption method underwent a comprehensive battery of tests to assess its validity, and its encryption efficacy was evaluated through mathematical analysis. This research examines the assessment of digital signatures by utilizing five distinct hash functions in conjunction with RSA keys. Each signature file was assessed based on four tests: entropy, floating frequency, autocorrelation, and histogram analysis. The tests were conducted on a document with a size of 256 bytes. In addition, nine hash algorithms were utilized, namely SHA224, SHA256, SHA384, SHA512, BLAKE2B, BLAKE2S, MD5, MD2, and RIPEMD160. Different algorithms were used for varying key sizes and word counts for hashing. The experiment was repeated 100 times to obtain precise measurements of the average time and entropy. The findings indicate that when implemented with an appropriate key length, RSA exhibits both efficiency and sufficient security to be deployed in IoT networks." /> <meta name="title" content="Security Evaluation of Different Hashing Functions with RSA for Digital Signature" /> <meta name="googlebot" content="NOODP" /> <meta name="citation_title" content="Security Evaluation of Different Hashing Functions with RSA for Digital Signature" /> <meta name="citation_author" content="Badawy, Mahmoud" /> <meta name="citation_author_institution" content="Department of Computers and Control Systems Engineering, Faculty of Engineering, Mansoura, 46421, Egypt." /> <meta name="citation_abstract" content="The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest鈥揝hamir鈥揂dleman (RSA) method, based on the Miller-Rabin technique, as a stream key generator with five distinct hashing functions to attain robust digital signatures. The RSA encryption method underwent a comprehensive battery of tests to assess its validity, and its encryption efficacy was evaluated through mathematical analysis. This research examines the assessment of digital signatures by utilizing five distinct hash functions in conjunction with RSA keys. Each signature file was assessed based on four tests: entropy, floating frequency, autocorrelation, and histogram analysis. The tests were conducted on a document with a size of 256 bytes. In addition, nine hash algorithms were utilized, namely SHA224, SHA256, SHA384, SHA512, BLAKE2B, BLAKE2S, MD5, MD2, and RIPEMD160. Different algorithms were used for varying key sizes and word counts for hashing. The experiment was repeated 100 times to obtain precise measurements of the average time and entropy. The findings indicate that when implemented with an appropriate key length, RSA exhibits both efficiency and sufficient security to be deployed in IoT networks." /> <meta name="citation_id" content="310210" /> <meta name="citation_publication_date" content="2023/09/01" /> <meta name="citation_date" content="2023-09-01" /> <meta name="citation_journal_title" content="IJCI. International Journal of Computers and Information" /> <meta name="citation_issn" content="1687-7853" /> <meta name="citation_volume" content="10" /> <meta name="citation_issue" content="2" /> <meta name="citation_firstpage" content="99" /> <meta name="citation_lastpage" content="116" /> <meta name="citation_doi" content="10.21608/ijci.2023.208602.1108"> <meta name="DC.Identifier" content="10.21608/ijci.2023.208602.1108"> <meta name="citation_publisher" content="Minufiya University; Faculty of Computers and Information"> <meta name="citation_abstract_html_url" content="https://ijci.journals.ekb.eg/article_310210.html" /> <meta name="citation_pdf_url" content="https://ijci.journals.ekb.eg/article_310210_feb79b856deb4580ada84285bc52d22f.pdf" /> <meta name="DC.Title" content="Security Evaluation of Different Hashing Functions with RSA for Digital Signature"> <meta name="DC.Source" content="IJCI. International Journal of Computers and Information"/> <meta name="DC.Date" content="01/09/2023"> <meta name="DC.Date.issued" scheme="ISO8601" content="2023-09-01"> <meta name="DC.Format" scheme="IMT" content="application/pdf"/> <meta name="DC.Contributor" content="Badawy, Mahmoud" /> <link type="text/css" rel="stylesheet" href="./inc/css/font-opensans.css?v=1.005" /> <link type="text/css" rel="stylesheet" href="./inc/css/font-helvetica.css?v=1.005" /> <link type="text/css" rel="stylesheet" media="screen" href="./inc/css/jquery-ui-1.8.15.custom.css" /> <link type="text/css" rel="stylesheet" media="screen" href="./inc/css/jquery.loading.modal.min.css" /> <link type="text/css" rel="stylesheet" media="screen" href="./inc/css/style.css?v=0.1005" /> <link type="text/css" rel="stylesheet" media="screen" href="./inc/css/style_ltr.css" /> <link type="text/css" rel="stylesheet" media="screen" href="./inc/css/authority-control.css" /> <link type="text/css" rel="stylesheet" media="print" href="./inc/css/print.css" /> <link type="text/css" rel="stylesheet" media="all" href="./inc/css/media.css" /> <script type="text/javascript" src="inc/js/jquery/jquery.min.js"></script> <script type="text/javascript" src="inc/js/jquery/jquery.loading.modal.js"></script> <script type="text/javascript" src="inc/js/jquery/jquery.lazy.min.js"></script> <script type="text/javascript" src="inc/js/jquery/jquery.lazy.plugins.min.js"></script> <script type="text/javascript" src="./inc/js/font.resize.js?"></script> <script type="text/javascript" src="./inc/bootstrap/js/bootstrap.min.js"></script> <script type="text/javascript" src="./inc/js/select2.min.js?"></script> </head> <!--[if lt IE 7 ]> <body class="ie6"> <![endif]--> <!--[if IE 7 ]> <body class="ie7"> <![endif]--> <!--[if IE 8 ]> <body class="ie8"> <![endif]--> <!--[if IE 9 ]> <body class="ie9"> <![endif]--> <!--[if (gt IE 9)|!(IE)]><!--><body><!--<![endif]--> <div class="container" id="ds-main"> <div id="ds-header-wrapper"> <div class="clearfix" id="ds-header"> <a id="ds-header-logo-link" href="./"> <span id="ds-header-logo"> </span> <span id="ds-header-logo-text">iKNiTO Journal Management System</span> </a> </div> </div> <div id="ds-trail-wrapper"> <nav class="navbar navbar-default"> <div class="navbar-header"> <button type="button" data-target="#navbarCollapse" data-toggle="collapse" class="navbar-toggle"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> </div> <div id="navbarCollapse" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li class="actives"><a href="./">Home</a></li> </ul> </div> </nav> </div> <script type="text/javascript"> try { if(window.self !== window.top) { document.getElementById("ds-header-wrapper").style.display = "none"; document.getElementById("ds-trail-wrapper").style.display = "none"; } } catch (e) {} </script> <script type="text/javascript" src="inc/js/index.js?v=0.105"></script> <div id="ds-content-wrapper"> <div class="clearfix" id="ds-content"> <div class="row"> <div class="col-md-3"> <div id="left_site_bar"> <div class="column-side column-side-left"> <div id="Browse"> <div class="content" id="dv_subjects"> <ul class="" id="browse-revealed-menu"> <li><a href="list_0.html" id="all_ju" >All Journals</a></li> <li class="ltr "><a href="list_2838.html" class="">Agricultural Studies (89)</a></li><li class="ltr "><a href="list_556.html" class="">Archaeology (25)</a></li><li class="ltr "><a href="list_13.html" class="">Arts (21)</a></li><li class="ltr "><a href="list_8.html" class="">Basic Sciences (82)</a></li><li class="ltr "><a href="list_2836.html" class="">Business Studies (38)</a></li><li class="ltr "><a href="list_2847.html" class="">Childhood &amp; Kindergarten Studies (13)</a></li><li class="ltr "><a href="list_2769.html" class="">Computer Sciences (30)</a></li><li class="ltr "><a href="list_2841.html" class="">Dentistry (15)</a></li><li class="ltr "><a href="list_2767.html" class="">Economics and Political Science (27)</a></li><li class="ltr "><a href="list_2837.html" class="">Educational Studies (138)</a></li><li class="ltr "><a href="list_9.html" class="">Engineering Studies (45)</a></li><li class="ltr "><a href="list_985.html" class="">English Journals (539)</a></li><li class="ltr "><a href="list_10.html" class="">Humanities (18)</a></li><li class="ltr "><a href="list_2840.html" class="">Legal Studies (33)</a></li><li class="ltr "><a href="list_2771.html" class="">Literary Studies (141)</a></li><li class="ltr "><a href="list_2770.html" class="">Media Studies (22)</a></li><li class="ltr "><a href="list_11.html" class="">Medical Studies (109)</a></li><li class="ltr "><a href="list_2848.html" class="">Multidisciplinary (37)</a></li><li class="ltr "><a href="list_2768.html" class="">Nursing (18)</a></li><li class="ltr "><a href="list_2839.html" class="">Pharmaceutical Studies (16)</a></li><li class="ltr "><a href="list_2844.html" class="">Physical Education (34)</a></li><li class="ltr "><a href="list_2846.html" class="">Social Work Studies (22)</a></li><li class="ltr "><a href="list_2845.html" class="">Special Education &amp; Home Economy (14)</a></li><li class="ltr "><a href="list_2842.html" class="">Tourism (18)</a></li><li class="ltr "><a href="list_2843.html" class="">Veterinary Medicine (20)</a></li><li class="rtl rtlfont "><a href="list_984.html" class="rtlfont">丕賱丿賵乇蹖丕鬲 丕賱毓乇亘蹖丞 (478)</a></li> </ul> </div> </div> <div id=""></div> </div> <div class="column-side column-side-left"> <div class="box box-style-2"> <div class="header"> <h3>Statistics</h3> </div> <div class="section"> <table class="table table-hover"> <tr><td>Number of Journals</td><td>1,017</td></tr><tr><td>Number of Issues</td><td>30,688</td></tr><tr><td class="sts_lb">Number of Articles</td><td>372,592</td></tr><tr valign="top"><td class="sts_lb">Article View</td><td dir="ltr">116,801,846</td></tr><tr valign="top"><td class="sts_lb">PDF Download</td><td dir="ltr">191,600,905</td></tr> </table> </div> </div> </div> </div> </div> <div class="col-md-9"> <script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js" ></script><script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jqueryui/1.8.7/jquery-ui.min.js" ></script> <script type="text/javascript" src="https://crossmark.crossref.org/javascripts/v1.4/crossmark.min.js"></script><a id="open-crossmark" href="#" style="padding: 3px 0 13px 0;"><img height="42" id="crossmark-icon" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_square_no_text.svg" /></a> <div id="crossmark-dialog" style="display: none;" title=""><iframe id="crossmark-dialog-frame" frameborder="0"></iframe></div> <div style="display: none;"> <div id="cite_apa"><div dir="ltr">Badawy, M. (2023). Security Evaluation of Different Hashing Functions with RSA for Digital Signature. <em>EKB Journal Management System</em>, 10(2), 99-116. doi: 10.21608/ijci.2023.208602.1108</div></div><div id="cite_mla"><div dir="ltr">Mahmoud Badawy. "Security Evaluation of Different Hashing Functions with RSA for Digital Signature". <em>EKB Journal Management System</em>, 10, 2, 2023, 99-116. doi: 10.21608/ijci.2023.208602.1108</div></div><div id="cite_harvard"><div dir="ltr">Badawy, M. (2023). 'Security Evaluation of Different Hashing Functions with RSA for Digital Signature', <em>EKB Journal Management System</em>, 10(2), pp. 99-116. doi: 10.21608/ijci.2023.208602.1108</div></div><div id="cite_vancouver"><div dir="ltr">Badawy, M. Security Evaluation of Different Hashing Functions with RSA for Digital Signature. <em>EKB Journal Management System</em>, 2023; 10(2): 99-116. doi: 10.21608/ijci.2023.208602.1108</div></div> </div> <div id="dvContent" class="article_info"> <table cellpadding="0" cellspacing="2" width="98%" dir="ltr"> <tr valign="top"> <td width="5" style="padding: 0"><input type="checkbox" id="ar_310210" checked="checked" style="display: none;" name="article_code" value="310210"></td> <td class="arial" width="100%"><h1 class="citation_title">Security Evaluation of Different Hashing Functions with RSA for Digital Signature</h1></td></tr> <tr><td colspan="2">IJCI. International Journal of Computers and Information</td></tr> <tr><td colspan="2" style="padding: 7px 5px 0 5px"> <a href="./issue_38310_42584_.html">Volume 10, Issue 2</a>, September 2023<span id="sp_ar_pages">, Page <span dir="ltr">99-116</span></span> &nbsp;<a style="display: noned;" href="./?_action=xml&amp;article=310210" title="XML" target="_blank"><img alt="XML" src="images/icon/xml1.png" border="0" style="vertical-align: middle;"/></a> <span class="spdf"><a href="./article_310210_feb79b856deb4580ada84285bc52d22f.pdf" target="_blank" class="pdf">PDF (<span class="ft_pdf_size">1.23 MB</span>)</a></span> </td></tr> <tr> <td colspan="2" style="padding: 0 5px 2px 5px" id="ar_tp">Document Type: Original Article</td> </tr> <tr><td colspan="2" style="padding: 1px 5px 5px 5px">DOI: <span dir="ltr" id="ar_doi"><a href="https://dx.doi.org/10.21608/ijci.2023.208602.1108">10.21608/ijci.2023.208602.1108</a></span></td></tr> <tr><td colspan="5" id="dv_scinito" title="View on SCiNiTO"><a href="https://app.scinito.ai/resolver?doi=10.21608/ijci.2023.208602.1108" target="_blank"><img alt="View on SCiNiTO" src="./images/scinito_logo.png" align="top" height="20"/> View on SCiNiTO</a></td></tr> <tr><td colspan="2" style="padding: 1px 5px 1px 5px" class="arial"><b>Author</b></td></tr> <tr><td colspan="2" style="padding: 1px 5px 1px 5px"> <a class="citation_author" href="./?_action=article&amp;au=684189&amp;_au=Mahmoud++Badawy">Mahmoud Badawy <sup><a href="mailto:engbadawy@mans.edu.eg" title="Email to Corresponding Author"><img alt="email" src="images/icon/mail.gif" border="0"/></a></sup> <sup><a href="https://www.orcid.org/0000-0002-0120-3235" title="ORCID: 0000-0002-0120-3235" target="_blank"><img alt="orcid" align="top" src="./images/orcid.gif"/></a></sup> </a> </td></tr> <tr><td colspan="2" style="padding: 1px 5px 1px 5px"><sup id="au"></sup>Department of Computers and Control Systems Engineering, Faculty of Engineering, Mansoura, 46421, Egypt.</td></tr> <tr><td colspan="2" style="padding: 5px 5px 0 5px" class="arial"><b>Abstract</b></td></tr> <tr><td colspan="2" id="abs_en" class="article_abstract">The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest&ndash;Shamir&ndash;Adleman (RSA) method, based on the Miller-Rabin technique, as a stream key generator with five distinct hashing functions to attain robust digital signatures. The RSA encryption method underwent a comprehensive battery of tests to assess its validity, and its encryption efficacy was evaluated through mathematical analysis. This research examines the assessment of digital signatures by utilizing five distinct hash functions in conjunction with RSA keys. Each signature file was assessed based on four tests: entropy, floating frequency, autocorrelation, and histogram analysis. The tests were conducted on a document with a size of 256 bytes. In addition, nine hash algorithms were utilized, namely SHA224, SHA256, SHA384, SHA512, BLAKE2B, BLAKE2S, MD5, MD2, and RIPEMD160. Different algorithms were used for varying key sizes and word counts for hashing. The experiment was repeated 100 times to obtain precise measurements of the average time and entropy. The findings indicate that when implemented with an appropriate key length, RSA exhibits both efficiency and sufficient security to be deployed in IoT networks.</td></tr> <tr><td colspan="2" style="padding: 15px 5px 0 5px" class="arial"><b>Keywords</b></td></tr> <tr><td colspan="2" style="padding: 1px 5px"> <a href="./?_action=article&amp;kw=105468&amp;_kw=IoT">IoT</a>; <a href="./?_action=article&amp;kw=55355&amp;_kw=RSA">RSA</a>; <a href="./?_action=article&amp;kw=436257&amp;_kw=Hashing">Hashing</a>; <a href="./?_action=article&amp;kw=436258&amp;_kw=Digital+Signature%2C+Security">Digital Signature, Security</a> </td></tr> <tr><td colspan="2"> </td> </tr> <tr><td colspan="2"> </td> </tr> <tr> <td colspan="3" style="padding: 15px 5px 0 5px"> <div class="arial bold">Statistics</div><div>Article View: 246</div><div>PDF Download: 329</div> </td> </tr> <tr> <td colspan="2"> </td> </tr> </table> </div> </div> </div> </div> <!-- END: BodyWrapper --> </div> <div id="ds-footer-wrapper"> <div id="ds-footer"> <img style="height: 40px; float: left; padding-right: 10px" src="./images/js_footer_logo.png" alt="js" /> <div id="ds-footer-left"> <a href="./">iKNiTO JS (Journal Management System)</a> copyright 漏 2024 <a target="_blank" href="http://www.notionwave.com/">NotionWave Inc.</a> </div> <div id="ds-footer-right"> </div> <div id="ds-footer-links"><br/> <a href="/contact">Contact Us</a> | <a xmlns:i18n="http://apache.org/cocoon/i18n/2.1" href="/feedback">Send Feedback</a> </div> <a xmlns:i18n="http://apache.org/cocoon/i18n/2.1" class="hidden" href="/htmlmap"> </a> </div> </div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10