International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 131 | Views: 203

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari | Jitendra Kumar [24]

Abstract: This Research work is based on a very important aspect of todays world i. e. Cryptography. Cryptography consists of protecting information by transforming it (also known as encryption) into a scribbled format, called cipher text. Only those who own a secret key can decode (also known as decryption) the message into original (plain) text. Sometimes encrypted messages can also be broken by cryptanalysis although modern cryptography techniques are virtually unbreakable. In this paper we have tried to implement the concept of a very popular field in Cryptography known as Digital Signature in a new and efficient manner. Since message authentication can only protect two parties from the third interfering party but it cannot protect the two parties against each other. So, Digital Signature has been introduced to provide a means for Message Authentication, Non-Repudiation and to check Integrity of the message after it has been received by the receiver. We studied various algorithms that are currently available to solve the problem of Digital Signature implementation, and after the analysis we found out that more efficient and secure algorithm can be developed by using positive aspects of various algorithms with some enhancements and by doing some good technical implementations in them. Proposed algorithm mainly focuses on reducing the time required for digitally signing of the document simultaneously providing enough security. After designing of the algorithm in the best possible manner we came out with many positive results and found that the proposed algorithm is feasible and valuable in creating and verifying the digital signature

Keywords: message digest, hash function, padding, parsing

Edition: Volume 2 Issue 6, June 2013,

Pages: 329 - 334

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait