CFP last date
20 December 2024
Reseach Article

Easing PAIN with Digital Signatures

by M. Tariq Banday
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 2
Year of Publication: 2011
Authors: M. Tariq Banday
10.5120/3533-4822

M. Tariq Banday . Easing PAIN with Digital Signatures. International Journal of Computer Applications. 29, 2 ( September 2011), 46-56. DOI=10.5120/3533-4822

@article{ 10.5120/3533-4822,
author = { M. Tariq Banday },
title = { Easing PAIN with Digital Signatures },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 2 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 46-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number2/3533-4822/ },
doi = { 10.5120/3533-4822 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:19.559106+05:30
%A M. Tariq Banday
%T Easing PAIN with Digital Signatures
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 2
%P 46-56
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Different forms of encryption techniques are being used to ensure privacy of data transmitted over Internet. Digital signature which uses Public Key Encryption (PKE) ensures privacy of conversation, integrity of data, authenticity of sender and non-repudiation of sender. Several applications on desktops, mobiles and other devices use it to secure data of various applications, services and access to devices. Digital signature exists as a file on some storage device or is embedded in hardware devices. Digital signature certificates are digital signatures that are signed by some third party certifying authority. This paper describes working of digital signature through illustrations and explains various procedures and algorithms involved in signings the data through use of digital signature. It introduces an open source software tool that can be used to study processes, procedures and algorithms used in digital signatures. It also presents information about different types of digital signature certificates currently available, file formats used therein and programming support of digital signature in .NET languages. Further, it presents an excerpt of digital signature scenario in Indian Government.

References
  1. Gladney, H. 2007. Preserving Digital Information, Springer, ISBN 978-3-642-07239-0.
  2. Katz, J. 2010. Digital Signature, Springer, ISBN 978-0-387-27711-0.
  3. John E. Canava, (2001). Fundamentals of Network Security, Artech House, London, ISBN 1-58053-176-8.
  4. Schneier. B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, John Wiley & Sons, Inc. ISBn: 0-471-12845-7.
  5. Zheng. Y., Imai. H. and Imai, H. (Ed.). 2007. Public Key Cryptography, Springer, ISBN: 9783540656449.
  6. CGI Group Inc. (2004). Public Key Encryption and Digital Signature: How do they work? CGI Group Inc. http://www.cgi.com/files/white-papers/cgi_whpr_35_pki_ e.pdf.
  7. SHA, (1995). Federal Information Processing Standards Publication 180-1, available online at: http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  8. R. Rivest (1992).The MD5 Message-Digest Algorithm, IETF RFC 1321, available online at: http://www.ietf.org/rfc/rfc1321.txt.
  9. RIPE (1995). Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040)," LNCS 1007, Springer-Verlag, 1995.
  10. Ross Anderson and Eli Biham (1996). Tiger: A Fast New Hash Function, Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag, pp. 89—97.
  11. FIPS (1996). Digital Signature Standard (DSS), FIPS PUB 186-3, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-890, available online at: http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf.
  12. RSA (2002). RSA Cryptography Standard, RSA Security Inc, available online at: ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf.
  13. ANSI X9.62, (1999). Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.
  14. MSDN. (2010). .NET Framework Cryptography Model, MSDN Library. http://msdn.microsoft.com/en-us/library/0ss79b2x.aspx.
  15. Hongjie Zhu, Daxing Li. (2008). Research on Digital Signature in Electronic Commerce. In proceedings of the International MultiConference of Engineers and Computer Scientists, 2008 Vol I, IMECS 2008, 19-21 March, 2008, Hong Kong.
  16. ITU. (2008). Information Technology – Open systems interconnection – The Directory: Public-key and attribute certificate frameworks, ITU, http://www.itu.int/rec/T-REC-X.509-200811-I/en.
  17. CCA. (2009). Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act, CCA India, version 2.4 updated on 14th June 2011, http://cca.gov.in/rw/resource/dsc _guidelines_r2_4.pdf.
  18. IT ACT. (2000), The Information Technology Act, 2000, Government of India, http://www.mit.gov.in/sites/ upload_files/dit/files/downloads/itact2000/itbill2000.pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature Digital Signature Certificate Public Key Private Key Electronic Signature Privacy and Authentication