Secure Digital Signature Schemes based on Hash Functions

PRACHI PRAVINKUMAR PATEL

Abstract


One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm.

Keywords


Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.

Full Text:

PDF

References


Agrawal, Vikaram M., and Hiral Chauhan. "An Overview of security issues in Mobile Ad hoc Networks." INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES 1.1 (2015): 9-17.




DOI: http://dx.doi.org/10.26472/ijces.v1i1.18

Refbacks



Copyright (c) 2015 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.