Secure and Optimized Algorithm for Implementation of Digital Signature

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 6

Abstract

This Research work is based on a very important aspect of today’s world i.e. Cryptography. Cryptography consists of protecting information by transforming it (also known as encryption) into a scribbled format, called cipher text. Only those who own a secret key can decode (also known as decryption) the message into original (plain) text. Sometimes encrypted messages can also be broken by cryptanalysis although modern cryptography techniques are virtually unbreakable. In this paper we have tried to implement the concept of a very popular field in Cryptography known as Digital Signature in a new and efficient manner. Since message authentication can only protect two parties from the third interfering party but it cannot protect the two parties against each other. So, Digital Signature has been introduced to provide a means for Message Authentication, Non-Repudiation and to check Integrity of the message after it has been received by the receiver. We studied various algorithms that are currently available to solve the problem of Digital Signature implementation, and after the analysis we found out that more efficient and secure algorithm can be developed by using positive aspects of various algorithms with some enhancements and by doing some good technical implementations in them. Proposed algorithm mainly focuses on reducing the time required for digitally signing of the document simultaneously providing enough security. After designing of the algorithm in the best possible manner we came out with many positive results and found that the proposed algorithm is feasible and valuable in creating and verifying the digital signature

Authors and Affiliations

Keywords

Related Articles

Dispersion and Confinement Loss Analysis of Nonlinear Square Lattice Photonic Crystal Fibers Employing Air Holes in the Cladding Region

Dispersion and Confinement Loss Analysis of Nonlinear Square Lattice Photonic Crystal Fibers Employing Air Holes in the Cladding Region

The Influence of Reliatation Safety and Healthy Work to Work Productivity Employees at PT PLN (Persero) Jawa Barat and Banten

Realitation safety and health work effort observation to people. machine, mineral, and method including environment work not experience of the accident. While work productivity employees attitude of mind having the spiri...

An Assessment of Coping Strategies for Drought Induced Food Shortages in Fedis District, East Hararghe Zone, Ethiopia

The central theme of this study was to explore how the farm households cope with drought induced food shortage at Fedis Distrcit. In order to meet this objective, various data collection and analysis techniques were empl...

Evaluation of Adsorptive Capacity of Bioadsorbent in Removal of Congo Red from Aqueous Solution

Adsorption techniques are widely used to remove certain classes of pollutants from waters, especially those which are not easily biodegradable. Currently a combination of biological treatment and adsorption on activated...

A Study on 360-Degree Feedback In Educational University With Reference To Bhubaneswar, Odisha, India

Abstract: Managers and leaders within organizations use 360-degree feedback surveys to get a better understanding of their strengths and weaknesses. The 360-degree feedback system automatically tabulates the results and...

Download PDF file
  • EP ID EP336417
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

(2013). Secure and Optimized Algorithm for Implementation of Digital Signature. UNKNOWN, 2(6), -. https://europub.co.uk/articles/-A-336417