Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
Nowadays, security plays a major role in communication. Security is the degree of resistance to, or protection from harm or viruses that corrupts the system. As there is tremendous increase in the use of internet and various communication channels , the issue of data or message security is arised. Digital signature is a technique that provides security to the data or message. In this paper we are going to survey on the digital signature. It is an electronic signature used to authenticate the identity of the sender and it assures that original content of the message or document received by the receiver is unchanged or same. The goal of the paper is to study the various digital signature methods proposed recently to secure the data transmission.
Proceedings of the 2017 International Conference on Education and Technology (2017 ICEduTech), 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution where the authenticity of the message will be verified to prove that the received message is the original message without any change, Ong-Schnorr-Shamir is the algorithm are used in this research and the experiment are perform on the digital signature scheme and the hidden channel scheme.
People have traditionally used signatures as a means of informing others that the signature has read and understood a document. Digital signature in a document is bound to that document in such a way that altering the signed document or moving the signature to a different document invalidates the signature. This security eliminates the need for paper copies of documents and can speed the processes involving documents that require signatures. Digital Signatures are messages that identify and authenticate a particular person as the source of the electronic message, and indicate such persons approval of the information contained in the electronic message. Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptosystem as unique security solutions. On the other hand, these solutions clearly expose the fact, that the protection of private keys is a security bottleneck in these sensitive applications. This problem is further worsened in the cases where a single and unchanged private key must be kept secret for very long time (such is the case of certification authority keys, and e-cash keys). They help users to achieve basic security building blocks such as identification, authentication, and integrity.
International Journal of Computer Applications, 2015
The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography.
The success rate of various electronic mechanisms such as E-Governance, E-Learning, E-Shopping, E-Voting, etc. is absolutely dependent on the security, authenticity and the integrity of the information that is being transmitted between the users of sending end and the users of receiving end. To attain all these parameters, these sensitive information must be digitally signed by its original sender which should be verified categorically by its intended receiver. Since digital signature schemes are basically various complex cryptographic algorithms which are embedded with the plain text message, the performance level of these E-services vary based on certain attributes like key size, block size, computational complexities, security parameters, application specific customizations, etc. In this paper the authors have made a thorough study of the industry standard digital signature schemes to obtain optimum security level for the electronic mechanisms and explored its probable applications in various domains.
2015
— With the computerized message systems replacing the physical transport of paper and ink documents, an effective solution for authentication of the electronic data is necessary. In situation where there is not complete trust between sender and receiver, something more than authentication is needed.The most attractive solution to this problem is the digital signature. While the nature of the transaction these documents are meant to support has not changed, the environment in which the transaction is made is changing. To support the new environment we must provide rules and practices that employ electronic and digital signature technology to achieve and surpass the functionality historically expected from paper based documents with ink signatures. Compared to the tedious and labour-intensive paper methods such as checking specimen signature cards, digital signatures yield a high degree of assurance without adding greatly to the resources required for processing documents. Digital sig...
2017
The increasing use of electronic mail for identity theft and unsolicited marketing and frequent presence of viruses as well, reduced the credibility of email as a communication tool. Authentication of the sender is well known defense against such attacks. One of the methods to ensure that authentication, secure communication via e-mail, is the use of digital signature.
With the use of mobile devices as a client for Internet, the threat of unauthorized and unauthenticated access of crucial documents is increasing day by day. Although Digital Signature is meant to be the solution for the unauthenticated access, its implementation is not adequate till now. Symmetric Data Transfer mechanism is used for the transfer of significant documents, but there is need of a more competent mechanism for safe transfer, authentication as well as verification of the documents. In this paper, we contemplate Asymmetric Data Transfer mechanism for the transfer of documents on Smartphones. But Asymmetric Cryptographic algorithms require complex computations and consume lot of power for execution. Hence a new technique is suggested in the paper, which is merely based on the concept of Asymmetric Cryptography but is feasible for smartphones. The paper also presents some research about the pre-existing techniques for implementation of Digital Signature technology.
The European Commission identified the need for electronic signature as a key issue for electronic commerce and issued Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. According to the Directive "Member States shall bring into force the laws, regulations and administrative provisions necessary to comply with this Directive before 19 July 2001." During the preparation of Slovak e-signature law some key problems determining the philosophy of the law were identified. The other problems appeared when the public key infrastructure (PKI) was discussed. The paper addresses some of these problems and proposes possible solutions.
Electronic signatures are not a new invention; the theory behind them has been around for more than 25 years. Yet, their practical application has not become massively widespread to the present day, and Hungary constitutes no difference in that respect. In addition to providing an outline of the present context of electronic signatures, the study goes thoroughly into the conditions of applicability, from a functional point of view, and fitted into the conditions of Hungarian society. A separate chapter examines the issue of security, as one of the most important conditions of applicability. Security is explored also from an encryption and IT perspective, demonstrating the fact that there is yet enough to be done until full acceptance is achieved.
International Journal for Research in Applied Science and Engineering Technology IJRASET, 2020
Running towards the best technology and using technology for everything is now a trend. Usage of internet is the easiest and accessible technology we are having. The Information Technology Act 2000 (IT Act), Indian law dealing with cybercrime and electronic commerce, describes digital signatures as a means of authentication and security of electronic documents. Digital signature refers to an electronic receipt that creates link between an entity and data record, serving the purpose of verification and authentication of an electronic document. Verification of an electronic document means the process of certifying the contents of the document, while authentication means the process of certifying the sender of the document. Any handwritten signature when used in its electronic version referred as a digital signature. A valid digital signature creates believe that the message was created by a known sender, that the sender cannot deny that he sent the message and that the message was not changed in transit. This helped in increasing the use of digital technology in daily life which has increased technology dependency. Confidential messages, software distribution, cases where it is important to detect forgery or tampering are the fine examples where the digital signature has its use. It provides the services of verification, authentication and data integrity.
Due to the rapid growth of online transactions on the Internet, authentication, non-repudiation and integrity are very essential security requirements for a secure transaction. To achieve these security goals, digital signature is the most efficient cryptographic primitive. Many authors have proposed this scheme and prove their security and evaluate the efficiency. In our paper, we present comprehensive study of conventional digital signature schemes based on RSA, DSA and ECDSA (Elliptic Curve Digital Signature Algorithm) and the improved version of these scheme.
International Journal of Computer Applications, 2021
Network is a node collection. The network's basic aim is to transfer information from one location to another. This information must be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques that are Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, Digital Signatures convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA's most productive computerized signature calculation .This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks, the mark check of different computerized signature approaches.
The Information Technology Act 2000 (IT Act) dictates digital signatures as a means of authentication and security of electronic documents. Digital signature is an electronic token that creates binding between an entity and a data record. They serve the purpose of validation and authentication of electronic documents .Validation refers to the process of certifying the contents of the document, while authentication refers to the process of certifying the sender of the document. It can be said that a digital signature is an electronic version of a handwritten signature. The signing process is implemented with the help of public key cryptography; the signatory uses her private key to create a digital signature for a document. It is used to ensure that the original content of the message or document that has been sent is unchanged. Its varied nature has provided easy, faster, accurate and convenient mechanism for creating, storing, transmission and retrieval of data without involving traditional paper based formalities. This has increased the use of digital technology in day to day life which has led the world to go online that in turn has increased techno-dependency. Increasingly the business dealings, communication, official data and commercial transactions are being carried out in cyberspace. There has been transformation of world from paper based to digital based work. In the last few years, there has been a rapidly growing demand for a working digital signature framework for both public and public sector. The study revolves around the maximum information on digital signature, the future of Information Technology.
An Introduction to Digital Signature Schemes, 2010
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user’s validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper, different types of schemes are compared based on security level, efficiency, difficulty of algorithm and so on. Results show that best scheme depends on security, complexity and other important parameters. We tried simply to define the schemes and review them in practice.
IRA-International Journal of Technology & Engineering (ISSN 2455-4480), 2016
The access to digital data by the users has increased in recent times with the advent of data communication technologies and its popularization. The data which is in digital form has to pass through insecure channels, for example when a user accesses the Internet, the privacy of data becomes a major issue. The area of Information Security has to play a crucial role when it comes to protecting the privacy of digital data. Cryptography is one such part of Information Security field where a sender's message gets encrypted and the message gets decrypted at the receiver's end. From time to time, various cryptographic schemes have been developed among which the Private Key Cryptography and Public Key Cryptography techniques are prominent. Moreover many special Signature Schemes which are part of cryptographic protocols have been providing security in dealing with digital transactions. This paper focuses on the use of modern cryptographic schemes and their importance in digital data communication system.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.