International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

This Research work is based on a very important aspect of todays world i.e. Cryptography. Cryptography consists of protecting information by transforming it (also known as encryption) into a scribbled format, called cipher text. Only those who own a secret key can decode (also known as decryption) the message into original (plain) text. Sometimes encrypted messages can also be broken by cryptanalysis although modern cryptography techniques are virtually unbreakable. In this paper we have tried to implement the concept of a very popular field in Cryptography known as Digital Signature in a new and efficient manner. Since message authentication can only protect two parties from the third interfering party but it cannot protect the two parties against each other. So, Digital Signature has been introduced to provide a means for Message Authentication, Non-Repudiation and to check Integrity of the message after it has been received by the receiver. We studied various algorithms that are currently available to solve the problem of Digital Signature implementation, and after the analysis we found out that more efficient and secure algorithm can be developed by using positive aspects of various algorithms with some enhancements and by doing some good technical implementations in them. Proposed algorithm mainly focuses on reducing the time required for digitally signing of the document simultaneously providing enough security. After designing of the algorithm in the best possible manner we came out with many positive results and found that the proposed algorithm is feasible and valuable in creating and verifying the digital signature

Keywords: message digest, hash function, padding, parsing

Edition: Volume 2 Issue 6, June 2013

Pages: 329 - 334


How to Cite this Article?

Isha Jauhari, Jitendra Kumar, "Secure and Optimized Algorithm for Implementation of Digital Signature", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131151, Volume 2 Issue 6, June 2013, 329 - 334

29 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'message digest'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1201 - 1208

An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks

Sindu.B, S. Sathya Priya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 317 - 324

A Novel Approach on RCDA with Deffie Hellman in Wireless Sensor Networks

Maheshwari D, Pavithradevi N

Share this article

Similar Articles with Keyword 'hash function'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 462 - 464

Enhancing Security of Database Stored in Cloud Environment

Rajeshkannan.R, T. Saranya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this article

Similar Articles with Keyword 'padding'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1153 - 1155

A Brief Overview of Satellite Image Resolution Enhancement

Ruchita Choudhary, Anil Saroliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 329 - 334

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 402 - 405

Implementation of DES Algorithm in Python

Sakshi Agarwal, P K Bharti, Rajesh Kumar Pathak

Share this article

Similar Articles with Keyword 'parsing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2291 - 2294

Prediction of Appraisal Groups for Movie Review Analysis

Nihalahmad R. Shikalgar, Dr. Arati M. Dixit

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1780 - 1785

An Optimized Ranking Strategy for Expert Search on the Web with NLP Techniques

Kiran G. Shinde, S. B. Natikar

Share this article

Research Proposals / Synopsis, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 180 - 181

An Overview on Implementation of Citation Parser Using Knowledge Base Techniques

Anand V. Saurkar, A. R. Itkikar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1922 - 1929

Subclasses of Meromorphically Multivalent Functions Defined By a Differential Operator

Dr. Rajkumar Anandrao Sukne

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 527 - 531

Deep Web Mining Using C# Wrappers

Rakesh Kumar Baloda, Praveen Kantha

Share this article

Top