{"id":"https://openalex.org/W4411205759","doi":"https://doi.org/10.1109/isdfs65363.2025.11012090","title":"Analysis of the SHA Function Selection on the Security of a Digital Signature Scheme","display_name":"Analysis of the SHA Function Selection on the Security of a Digital Signature Scheme","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4411205759","doi":"https://doi.org/10.1109/isdfs65363.2025.11012090"},"language":"en","primary_location":{"id":"doi:10.1109/isdfs65363.2025.11012090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11012090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055178390","display_name":"Manuel Alejandro Cardona-L\u00f3pez","orcid":"https://orcid.org/0000-0001-8810-9921"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Manuel Alejandro Cardona-L\u00f3pez","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065981833","display_name":"Juan Carlos Chimal-Egu\u00eda","orcid":"https://orcid.org/0000-0001-7134-0190"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juan Carlos Chimal-Egu\u00eda","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065354713","display_name":"V\u00edctor Manuel Silva-Garc\u00eda","orcid":"https://orcid.org/0000-0003-1312-5294"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"V\u00edctor Manuel Silva-Garc\u00eda","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Centro de Innovaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico en C&#x00F3;mputo,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Centro de Innovaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico en C&#x00F3;mputo,Mexico City,Mexico","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050251589","display_name":"Rolando Flores-Carapia","orcid":"https://orcid.org/0000-0002-8557-9941"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rolando Flores-Carapia","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Centro de Innovaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico en C&#x00F3;mputo,Mexico City,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Centro de Innovaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico en C&#x00F3;mputo,Mexico City,Mexico","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055178390"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21101138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.5315999984741211,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.5315999984741211,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7729970216751099},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041875720024109},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6117727160453796},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.6005730032920837},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5878449082374573},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5833806991577148},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.45845550298690796},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.4454256594181061},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.41429680585861206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34311625361442566},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3205801248550415},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2507154941558838},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.24206319451332092},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17913320660591125}],"concepts":[{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7729970216751099},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041875720024109},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6117727160453796},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.6005730032920837},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5878449082374573},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5833806991577148},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.45845550298690796},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.4454256594181061},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.41429680585861206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34311625361442566},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3205801248550415},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2507154941558838},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.24206319451332092},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17913320660591125},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isdfs65363.2025.11012090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isdfs65363.2025.11012090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 13th International Symposium on Digital Forensics and Security (ISDFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2357744715","https://openalex.org/W2383202752","https://openalex.org/W2390942931","https://openalex.org/W2383222452","https://openalex.org/W2606299826","https://openalex.org/W2375435031","https://openalex.org/W2370174115","https://openalex.org/W1602342080","https://openalex.org/W1881844432","https://openalex.org/W2388194153"],"abstract_inverted_index":{"Hash":[0],"functions":[1],"are":[2],"essential":[3],"in":[4,27,45,149],"the":[5,37,63,67,74,124,129,137,144,162,165],"design":[6],"of":[7,40,136,146,157,164],"digital":[8,49,150],"signatures":[9],"due":[10,83],"to":[11,17,84],"their":[12,21],"computational":[13],"efficiency":[14],"and":[15],"resistance":[16],"post-quantum":[18],"attacks.":[19],"However,":[20],"fixed-length":[22],"output":[23],"can":[24,160],"introduce":[25],"vulnerabilities":[26],"certain":[28],"hash-based":[29],"signature":[30,50],"schemes.":[31],"In":[32,90,127],"this":[33],"study,":[34],"we":[35],"analyze":[36],"security":[38,108,163],"impact":[39],"replacing":[41],"SHA-512":[42,92],"with":[43],"SHA-160":[44,64,71],"a":[46,154],"previously":[47],"proposed":[48],"algorithm.":[51],"Our":[52],"experiment":[53],"involves":[54],"verifying":[55],"two":[56],"PDF":[57],"files,":[58],"whose":[59],"byte":[60],"representations":[61],"exploit":[62],"collision":[65],"from":[66],"SHAttered":[68],"attack.":[69],"When":[70],"is":[72,102],"used,":[73],"signature's":[75],"verification":[76,88],"parameter":[77],"remains":[78],"identical":[79],"for":[80],"both":[81],"messages":[82,117],"hash":[85,158],"collisions,":[86],"causing":[87],"failure.":[89],"contrast,":[91],"correctly":[93],"distinguishes":[94],"between":[95],"them,":[96],"ensuring":[97],"proper":[98],"validation.":[99],"This":[100],"vulnerability":[101],"not":[103],"consistently":[104],"detectable":[105],"through":[106],"stan-dard":[107],"assessments":[109],"like":[110],"entropy":[111],"analysis,":[112],"which":[113],"evaluate":[114],"multiple":[115],"signed":[116],"rather":[118],"than":[119],"identifying":[120],"specific":[121],"cases":[122],"where":[123],"weakness":[125],"occurs.":[126],"addition,":[128],"algorithm's":[130],"chaotic":[131],"properties":[132],"remain":[133],"unchanged":[134],"regardless":[135],"SHA":[138,147],"function":[139,159],"used.":[140],"These":[141],"findings":[142],"highlight":[143],"influence":[145,161],"selection":[148],"signatures,":[151],"indicating":[152],"how":[153],"single":[155],"choice":[156],"scheme.":[166]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
