2015
DOI: 10.5120/20635-3272
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Techniques Developed using Digital Signature: Public key Cryptography

Abstract: The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
2
0
1
Order By: Relevance
“…DIGITAL SIGNATURE Fig. 31 shows the current use of the digital signature workflow with one-way hash functions [48]. The purpose of a digital signature is to guarantee data integrity and authentication.…”
Section: Twhf Possible Usage Areasmentioning
confidence: 99%
“…DIGITAL SIGNATURE Fig. 31 shows the current use of the digital signature workflow with one-way hash functions [48]. The purpose of a digital signature is to guarantee data integrity and authentication.…”
Section: Twhf Possible Usage Areasmentioning
confidence: 99%
“…Cryptography is a branch of cryptology that deals with designing algorithms for encryption and decryption to ensure the confidentiality and/or authenticity of messages. In 1991, the DSA was proposed by the U.S. [3]. The growing use of services like e-commerce and open network communications has highlighted the crucial role of public key cryptosystems as security solutions [4].…”
Section: Related Workmentioning
confidence: 99%
“…DSA uses Public key to verify the sender's message, but verifying is complicated compared to RSA.DSA set of rules works on three steps like,  Key generation  Signing  Verification Fig. 3 shows how the Encryption of message sign is executed; the message sign is sent through Hash characteristic to generate a hash code [3]. Then the hash code and random variety 'okay' is given as an input for signature algorithm in conjunction with worldwide public key and sender's private key.…”
Section: B Dsa Algorithmmentioning
confidence: 99%
“…Algoritma MD5 ditujukan untuk aplikasi tanda tangan digital, di mana sebelum dienkripsi dengan kunci privat di bawah cryptosystem publickey seperti RSA, file besar harus dikompresi dengan cara yang aman. MD5 adalah fungsi hash paling populer yang menghasilkan 128-nilai hash bit atau 16 karakter [10]. MD5 umumnya digunakan untuk memeriksa integritas file.…”
Section: Message Digest 5 (Md5)unclassified