A Comprehensive Study on Digital Signature
Keywords:
Authentication, Cryptography, Digital Signature, VerificationAbstract
For secure and smart transactions over open networks, the Digital Signature Concept is necessary. It is having forms of programs with a view to make certain the integrity of information exchanged or saved and to show the identity of the originator to the recipient. Digital Signature techniques are usually used in cryptographic protocols to provide services like entity authentication, authenticated key delivery and authenticated key agreement. With using cellular devices as a client of internet, the risk of unauthorized and unauthenticated get admission to of crucial files (e.g. contracts, receipts, and so forth.) is growing every day. Although Digital Signature is supposed to be the solution for the unauthorized get right of entry to, its implementation isn't always good enough till now. The symmetric records transfer mechanism is used for the transfer of essential documents, but there's a want of a greater ready mechanism for safe transfer and verification of the documents. This Research paper presents a comprehensive study of Digital Signature and its benefits.
Downloads
References
Digital Signature Standard (DSS), FIPS PUB 186-3, 2009. [2] Abhishek roy And sunil karforma., ‘A survey on digital signatures and its applications’, J of Comp. and I.T. Vol.3(1&2) (2012).
Sur C., Roy A., Banik S., A Study of the State of E Governance in India, Proceedings of National Conference on Computing and Systems 2010 (NACCS 2010), January 29, 2010, pp- (a)-(h), organized by Department of Computer Science, The University of Burdwan, West Bengal, INDIA. ISBN 8190-774174.
http://en.wikipedia.org/wiki Digital signature Date of access – 24th March (2012).
Cryptography and E-Commerce, a Wiley Tech Brief, Jon C. Graff, Wiley Computer Publishing, ISBN- 0471-40574-4. [6] Public Key Cryptography for the Financial Services Industry,
the Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.62-2005.
A. Sun et al., “The QR-code reorganization in illegible snapshots taken by mobile phones," in Proc. Int. Conf. on Computational Sci. and its Applicant. 2007, pp.532-538.
Rajapakse HS. Barriers to the public key infrastructure (PKI) deployment and usage for authentic document transaction in Sri Lankan banking sector.2007:18-28.
Hartman B, Flinn DJ, Beznosov K, Kawamoto S. Mastering web services security. John Wiley & Sons; 2003.
Brickell EF, editor. Advances in cryptology-CRYPTO‟92: 12th Annual international cryptology conference, santa barbara, California, USA. Proceedings. Springer; 2003.
Sakib AN, Mahmud T, Mountain Munim S, Rahman MM. Secure authentication & key exchange technique for IEEE 802.16 e by using cryptographic properties.
Hartman B, Flinn DJ, Beznosov K, Kawamoto S. Mastering web services security. John Wiley & Sons; 2003.
Mauro Conti, Nicola Dragoni, and Viktor Lesyk , “A Survey of MAN-IN-THE-MIDDLE attacks” 2015 IEEE Communication Surveys & Tutorials.
Shivendra singh, Md. Sarfaraz iqbal, Arunima Jaiswal, “Survey on Techniques Developed using Digital Signature: Public key Cryptography,” International Journal of Computer Applications (0975 – 8887) Volume 117 – No. 16, May 2015.
Santi Jarusombat and Surin Kittitornkun, “Digital Signature on Mobile Devices based on Location,” 2014 IEEE conference.
Harigopal K.B. Ponnapalli and Ashutosh Saxena, “A Digital Signature Architecture for Web Apps”, Infosys, India, March/April 2013.
Carlisle Adams and Guy-Vincent Jourdan, “Digital Signatures for Mobile Users”, 2014 IEEE Conference, Toronto, Canada.