Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012
…
5 pages
1 file
The purpose of introducing of this algorithm is a new method for designing a simple mechanism for producing a digital signature. Some applications like multi agent systems transfer messages with low size and capacity. The new algorithm minimizes the size of original file and gives us a dynamic and smaller size output. In this algorithm read the input file then hash the message and encode it. Finally modify the established code into a unique ID at Base 16. We concentrate on designing and implementation of functions of algorithm.
2012
This paper presents adoption of a new hash algorithm in digital signature. Digital signature presents a technique to endorse the content of the message. This message has not been altered throughout the communication process. Due to this, it increased the receiver confidence that the message was unchanged. If the message is digitally signed, any changes in the message will invalidate the signature. The comparison of digital signature between Rivest, Shamir and Adleman (RSA) algorithms are summarized.
People have traditionally used signatures as a means of informing others that the signature has read and understood a document. Digital signature in a document is bound to that document in such a way that altering the signed document or moving the signature to a different document invalidates the signature. This security eliminates the need for paper copies of documents and can speed the processes involving documents that require signatures. Digital Signatures are messages that identify and authenticate a particular person as the source of the electronic message, and indicate such persons approval of the information contained in the electronic message. Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptosystem as unique security solutions. On the other hand, these solutions clearly expose the fact, that the protection of private keys is a security bottleneck in these sensitive applications. This problem is further worsened in the cases where a single and unchanged private key must be kept secret for very long time (such is the case of certification authority keys, and e-cash keys). They help users to achieve basic security building blocks such as identification, authentication, and integrity.
2015
Nowadays, security plays a major role in communication. Security is the degree of resistance to, or protection from harm or viruses that corrupts the system. As there is tremendous increase in the use of internet and various communication channels , the issue of data or message security is arised. Digital signature is a technique that provides security to the data or message. In this paper we are going to survey on the digital signature. It is an electronic signature used to authenticate the identity of the sender and it assures that original content of the message or document received by the receiver is unchanged or same. The goal of the paper is to study the various digital signature methods proposed recently to secure the data transmission.
Advances in Science and Technology Research Journal, 2016
Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.
International Journal of Computer Applications, 2021
Network is a node collection. The network's basic aim is to transfer information from one location to another. This information must be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques that are Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, Digital Signatures convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA's most productive computerized signature calculation .This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks, the mark check of different computerized signature approaches.
International Journal of Computer Applications, 2015
The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography.
Aiming directly at the frequently used digital signature technologies, which are weak to Substitution Attack and Homeostasis Attack, this article performs the hash transformation on messages before signature. Using the method proposed by J.Seberry, a hash round function is constructed, which simultaneously satisfies the characters of balance, high nonlinearity, strict avalanche criterion and realization of software. Moreover, making use of the hash round function, a new hash algorithm named HRFA (Hash Round Function Algorithm) is contrived. On this basis, aiming at the defect that the existing digital signature algorithms are weak to active attack and impersonation attack, using the hash algorithm named HRFA and the self-certified public key method proposed by Girault, a new kind of digital signature algorithm named H-S DSA (Hash Round Function and Self-certified Public Key System Digital Signature Algorithm) is raised and realized. Finally, this article analyzes the H-S DSA from two aspects of security and time-complexity.
International Journal of Computer Network and Information Security, 2017
Digital Signature protects the document`s integrity and binds the authenticity of the user who have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure secrecy of the data. Techniques like encryption and decryption are needed to be used for this purpose. Biometric security has been a useful way for authentication and security as it provides a unique identity of the user. In this paper we have discussed the user authentication process and development of digital signatures. Authentication was based on hash functions which uses biometric features. Hash codes are being used to maintain the integrity of the document which is digitally signed. For security purpose, Encryption and Decryption techniques are used to develop a bio-cryptosystem. User information when gets concatenated with feature vector of biometric data, which actually justifies the sense of authentication. Various online or offline transaction where authenticity and integrity is the top most priority can make use of this development.
IOSR Journal of Computer Engineering, 2012
The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm. There are many other algorithms which are based on the hybrid combination of prime factorization and discrete logarithms, but different weaknesses and attacks have been developed against those algorithms. This Research paper presents a new variant of digital signature algorithm which is based on linear block cipher or Hill cipher initiate with Asymmetric algorithm using mod 37.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Proceedings of the 2017 International Conference on Education and Technology (2017 ICEduTech), 2018
IOSR Journal of Computer Engineering, 2013
Journal of Science and Technique Journal of Science and Technique , 2022
Journal of Science and Technique, 2020
IRA-International Journal of Technology & Engineering (ISSN 2455-4480), 2016
Lecture Notes in Computer Science, 2007
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
International Journal on Recent and Innovation Trends in Computing and Communication
International Research Journal of Modernization in Engineering Technology and Science, 2020
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.2, February 2017, 2017
An Introduction to Digital Signature Schemes, 2010
Encyclopedia of Cryptography and Security, 2011
Groups – Complexity – Cryptology, 2000
Arxiv preprint arXiv:1003.5787, 2010
International Journal of Computer Applications, 2013
International Journal of Computer Applications, 2013
International Review on Computers and Software, 2007
FAIR - NGHIÊN CỨU CƠ BẢN VÀ ỨNG DỤNG CÔNG NGHỆ THÔNG TIN 2015, 2016