Secure and Optimized Algorithm for Implementation of Digital Signature
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 131 | Monthly Hits: ⮙7

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

This Research work is based on a very important aspect of todays world i.e. Cryptography. Cryptography consists of protecting information by transforming it (also known as encryption) into a scribbled format, called cipher text. Only those who own a secret key can decode (also known as decryption) the message into original (plain) text. Sometimes encrypted messages can also be broken by cryptanalysis although modern cryptography techniques are virtually unbreakable. In this paper we have tried to implement the concept of a very popular field in Cryptography known as Digital Signature in a new and efficient manner. Since message authentication can only protect two parties from the third interfering party but it cannot protect the two parties against each other. So, Digital Signature has been introduced to provide a means for Message Authentication, Non-Repudiation and to check Integrity of the message after it has been received by the receiver. We studied various algorithms that are currently available to solve the problem of Digital Signature implementation, and after the analysis we found out that more efficient and secure algorithm can be developed by using positive aspects of various algorithms with some enhancements and by doing some good technical implementations in them. Proposed algorithm mainly focuses on reducing the time required for digitally signing of the document simultaneously providing enough security. After designing of the algorithm in the best possible manner we came out with many positive results and found that the proposed algorithm is feasible and valuable in creating and verifying the digital signature

Keywords: message digest, hash function, padding, parsing

Edition: Volume 2 Issue 6, June 2013

Pages: 329 - 334

Share this Article

How to Cite this Article?

Isha Jauhari, Jitendra Kumar, "Secure and Optimized Algorithm for Implementation of Digital Signature", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131151, Volume 2 Issue 6, June 2013, 329 - 334

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'message digest'

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Downloads: 117 | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2224 - 2226

Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt

Pradeep Singh Solanki, Vinit Agarwal

Share this Article

Downloads: 121 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 632 - 634

Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm

Jissmol T Antony, Gopal B

Share this Article

Downloads: 125 | Weekly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1201 - 1208

An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks

Sindu.B, S. Sathya Priya

Share this Article

Downloads: 125 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this Article

Similar Articles with Keyword 'hash function'

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2718 - 2725

Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing

Safa S. Abdul-Jabbar, Loay E. George

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this Article

Similar Articles with Keyword 'padding'

Downloads: 116 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1153 - 1155

A Brief Overview of Satellite Image Resolution Enhancement

Ruchita Choudhary, Anil Saroliya

Share this Article

Downloads: 131 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 329 - 334

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

Share this Article

Downloads: 170 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 402 - 405

Implementation of DES Algorithm in Python

Sakshi Agarwal, P K Bharti, Rajesh Kumar Pathak

Share this Article

Similar Articles with Keyword 'parsing'

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2291 - 2294

Prediction of Appraisal Groups for Movie Review Analysis

Nihalahmad R. Shikalgar, Dr. Arati M. Dixit

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1922 - 1929

Subclasses of Meromorphically Multivalent Functions Defined By a Differential Operator

Dr. Rajkumar Anandrao Sukne

Share this Article

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1780 - 1785

An Optimized Ranking Strategy for Expert Search on the Web with NLP Techniques

Kiran G. Shinde, S. B. Natikar

Share this Article

Downloads: 113 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1931 - 1935

SmartCrawler: For Site Locating and Balancing

Sphurti S. Bhosale, Dr. S. B. Sonkamble

Share this Article

Downloads: 119 | Monthly Hits: ⮙10

Research Proposals / Synopsis, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 180 - 181

An Overview on Implementation of Citation Parser Using Knowledge Base Techniques

Anand V. Saurkar, A. R. Itkikar

Share this Article



Top