We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security System for DNS using Cryptography

by Naveen Kumar Tiwari, Sanjay Khakhil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 17
Year of Publication: 2015
Authors: Naveen Kumar Tiwari, Sanjay Khakhil
10.5120/21318-4323

Naveen Kumar Tiwari, Sanjay Khakhil . Security System for DNS using Cryptography. International Journal of Computer Applications. 120, 17 ( June 2015), 12-15. DOI=10.5120/21318-4323

@article{ 10.5120/21318-4323,
author = { Naveen Kumar Tiwari, Sanjay Khakhil },
title = { Security System for DNS using Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 17 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number17/21318-4323/ },
doi = { 10.5120/21318-4323 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:27.729075+05:30
%A Naveen Kumar Tiwari
%A Sanjay Khakhil
%T Security System for DNS using Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 17
%P 12-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

DNS, Domain Name System is a protocol that resolves hostnames to IP Addresses over the Internet. DNS, being an open source, it is less secure and it has no means of determining whether domain name data comes from an authorised domain owner. So, these vulnerabilities lead to a number of attacks, such as, cache poisoning, cache spoofing etc. Hence, there is a need of securing DNS. Digital Signatures are a good way of authyenticating the domain owners. The paper presents the Domain Name System security concept,. Digital Signature algorithms helps in providing good level of security to DNS. Software like OpenDNSSEC, BIND, Secure64 etc. It involves the signing of DNS using cryptographical algorithms (e. g. , RSA, DSA etc. ). Further, ECDSA is one way that provides same level of security, as security provided by RSA for low power and portable devices. So, here we proposing a new ECDSA implementation that can be used to secure DNS.

References
  1. Hu Junru, "The Improved Elliptic Curve Digital Signature Algorithm", International Conference on Electronic & Mechanical Engineering and Information Technology, IEEE, 2011
  2. Casey Deccio, Jeff Sedayao and Krishna Kant, Prasant Mohapatra, "Quantifying and Improving DNSSEC Availability', IEEE, 2011.
  3. Ghanmy Nabil, Khlif Naziha, "Hardware implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) on Koblitz Curves" 8th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing, IEEE, 2012.
  4. A. Sakthivel, R. Nedunchezhian, " Improved The Execution Speed Of Ecdsa Over Gf(2n) Algorithm For Concurrent Computation" Journal of Theoretical and Applied Information Technology, 10th April 2013.
  5. Aqeel Khalique, Kuldip Singh, Sandeep Sood, "Implementation of Elliptic Curve Digital Signature Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 2 – No. 2, May 2010
  6. Vivek Kapoor, Vivek Sonny Abraham, Ramesh Singh, Elliptic Curve Cryptography, May 20-26, 2008. ACM Ubiquity, Volume 9, Issue 20.
  7. Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang, "High-speed high-security signatures", 2011.
  8. HONG Jingxin, "A New Forward-Secure Digital Signature Scheme", IEEE, 2007.
  9. El hadj youssef wajih, Machhout Mohsen, "A Secure Elliptic Curve Digital Signature Scheme for Embedded Devices", International Conference on Signals, Circuits and Systems, IEEE, 2008.
  10. Xue Sun, Mingping Xia, "An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography", International Conference on Computer and Communications Security, IEEE, 2009.
  11. Jonathan Petit, "Analysis of ECDSA Authentication Processing in VANETs", IEEE, 2009.
  12. Qingkuan Dong, Guozhen Xiao, "A Subliminal-Free Variant of ECDSA Using Interactive Protocol", IEEE, 2010.
  13. Jalel Ben-othman, Yesica Imelda Saavedra Benitez, "A light weight security scheme for HWMP protocol using Elliptic Curve Technique", 11th IEEE International Workshop on Wireless Local Networks, IEEE, 2011.
  14. M. Janagan, M. Devanathan, "Area Compactness Architecture for Elliptic Curve Cryptography", International Conference on Pattern Recognition, Informatics and Medical Engineering, March 21-23, IEEE, 2012.
  15. Zhang Youqiao ,Zhou Wuneng, "An ECDSA Signature Scheme Designs for PBOC 2. 0 Specifications", 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), IEEE, 2012.
  16. Ravi Kishore Kodali, "Implementation of ECDSA in WSN", International Conference on Control Communication and Computing (ICCC), IEEE, 2013.
  17. Nabil GHANMY, Lamia CHAARI FOURA TI, Lotfi KAMOUN, "Enhancement security level and hardware implementation of ECDSA", IEEE, 2013.
  18. Soumya Basu, M. Pushpalatha, "Analysis of Energy Efficient ECC and TinySec Based Security Schemes in Wireless Sensor Networks", IEEE, 2013.
  19. Shweta Lamba, Monika Sharma, "An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)", International Conference on Machine Intelligence Research and Advancement, IEEE, 2013.
  20. Noura Ben Hadjy Youssef, Wajih El Hadi Youssef , Mohsen Machhout, Rached Tourki, "A Low-Resource 32-bit Datapath ECDSA Design for Embedded Applications", IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

DNS RSA ECDSA ECDLP DNSSEC DSA and ECC.