CFP last date
20 January 2025
Reseach Article

Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data

by Dimple Bansal, Manish Sharma, Aayushi Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 5
Year of Publication: 2017
Authors: Dimple Bansal, Manish Sharma, Aayushi Mishra
10.5120/ijca2017913204

Dimple Bansal, Manish Sharma, Aayushi Mishra . Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data. International Journal of Computer Applications. 161, 5 ( Mar 2017), 43-45. DOI=10.5120/ijca2017913204

@article{ 10.5120/ijca2017913204,
author = { Dimple Bansal, Manish Sharma, Aayushi Mishra },
title = { Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 5 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number5/27148-2017913204/ },
doi = { 10.5120/ijca2017913204 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:42.784160+05:30
%A Dimple Bansal
%A Manish Sharma
%A Aayushi Mishra
%T Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 5
%P 43-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital signature methodology provides cryptographic services like entity authentication, authenticated key transmission and authenticated key agreement. A Digital Signature is used to provide authentication, non-repudiation & integrity over the digital data in data exchanged and to validate the recipient for the authorized identity over open network. The goal of a Digital signature algorithm is to provide security for message or data. The present paper focuses on a comparative study of some existing algorithms of digital signature on the basis of many hard problems.

References
  1. ES Ismail, NMF Tahat, and RR Ahmad. A New Digital Signature Scheme Based on Factoring and Discrete Logarithms. Journal of Mathematics and Statistics, 4(4):222{225, 2008.
  2. D. Boneh and H. Shacham. Fast variants of RSA. CryptoBytes (RSA Laboratories), 5:1{9, 2002.
  3. Ashish Vijay, Priyanka Trikha , Kapil Madhur,” A New Variant of RSA Digital Signature”https://www.ijarcsse.com/docs/papers/10_October2012/Volume_2_issue_10_October2012
  4. Kapil Madhur, Jitendra Singh Yadav,Ashish Vijay,” Modified ElGamal over RSA Digital Signature Algorithm (MERDSA)”https://www.ijarcsse.com/docs/papers/8_August2012/Volume_2_issue_8
  5. Kamal kumar Agrawal, Ruchi Patira, Kapil Madhur,” A Digital Signature Algorithm based on xthRootProblem”https://www.ijarcsse.com/docs/papers/11_November2012/Volume_2_issue_11_November2012
  6. Bernstein, Daniel J.; Duif, Niels; Lange, Tanja; Schwabe, Peter;Bo-YinYang (2012). "High-speedhigh-security signatures" . Journal of CryptographicEngineering. 2(2):7789. doi:10.1007/s13389-012-0027-1.
  7. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. Information Theory, IEEE Transactions on, 31(4):469{472, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Digital signature Authentication Non-repudiation Integrity