Comparison of MAC and Digital Signature
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019

Comparison of MAC and Digital Signature

G. Pranitha

A Message Authentication Code is what we get from symmetric cryptography A MAC is used to prevent Intruder from creating a new message and inserting it in to original message. Signatures are generally used for verifying all the financial documents such as stamp papers for registration, payment receipts and for personal identification like Identity cards, marks reports. As all of these will have transactions of money and identity verification, it should be genuine in nature. Digital signature helps to identify the identity as well as to protect the integrity of message. In this paper, we compare the importance of digital signature and message authentication code for certification.

Keywords: Message authentication code, digital signature, key, Hash

Edition: Volume 8 Issue 2, February 2019

Pages: 50 - 52

Share this Article

How to Cite this Article?

G. Pranitha, "Comparison of MAC and Digital Signature", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194317, Volume 8 Issue 2, February 2019, 50 - 52

256 PDF Views | 159 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Message authentication code'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 781 - 784

Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking

Snehal M. Shewale, Prof. Y. B. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Survey Paper, Computer Science & Engineering, Tanzania, Volume 4 Issue 9, September 2015

Pages: 391 - 396

A Study of Security Challenges and Solutions in Mobile Ad-Hoc Network

Thangaraj E, Dinesh Ruban J

Share this Article

Similar Articles with Keyword 'digital signature'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Similar Articles with Keyword 'key'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2253 - 2256

Survey on Hubness - Based Clustering Algorithms

Nikita Dhamal, Antara Bhatttacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Similar Articles with Keyword 'Hash'

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article
Top