Open Access   Article Go Back

A Comprehensive Study on Digital-Signatures with Hash-Functions

Arvind K.Sharma1 , Satish.K.Mittal 2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 604-607, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.604607

Online published on Apr 30, 2019

Copyright © Arvind K.Sharma, Satish.K.Mittal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arvind K.Sharma, Satish.K.Mittal, “A Comprehensive Study on Digital-Signatures with Hash-Functions,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.604-607, 2019.

MLA Style Citation: Arvind K.Sharma, Satish.K.Mittal "A Comprehensive Study on Digital-Signatures with Hash-Functions." International Journal of Computer Sciences and Engineering 7.4 (2019): 604-607.

APA Style Citation: Arvind K.Sharma, Satish.K.Mittal, (2019). A Comprehensive Study on Digital-Signatures with Hash-Functions. International Journal of Computer Sciences and Engineering, 7(4), 604-607.

BibTex Style Citation:
@article{K.Sharma_2019,
author = {Arvind K.Sharma, Satish.K.Mittal},
title = {A Comprehensive Study on Digital-Signatures with Hash-Functions},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {604-607},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4083},
doi = {https://doi.org/10.26438/ijcse/v7i4.604607}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.604607}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4083
TI - A Comprehensive Study on Digital-Signatures with Hash-Functions
T2 - International Journal of Computer Sciences and Engineering
AU - Arvind K.Sharma, Satish.K.Mittal
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 604-607
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
305 290 downloads 177 downloads
  
  
           

Abstract

From last three decades people from all around the world continuously using services provided by Information Technology industry most probably in every area, in order to fulfill the needs of business to personal activities, but from decade ago demand tremendously increased. Though as we have lots of benefits of using IT services which made our current life smoother, easier and less-hardworking as compare to past yet there is strong need arises to protect our digital world by managing Confidentiality, Integrity, Availability, Authenticity of our resources from those who unwantedly wants to look into ours privacy whether by passive or active attacks. Digital Signature is most important part from Public-key Cryptography that provides a set of security capabilities that would be difficult to implement in any other way especially for proving the authenticity of data.

Key-Words / Index Term

Algorithm, Authenticity, Avalanche-Effect, Certificates, Confidentiality, Digest, Firewall, Integrity, Hash Function, Non-Repudiation

References

[1]. Rivest, MIT Laboratory for Computer Science and RSA Data Security, Inc, Request for Comments : 1321, April 1992.
[2]. FIPS180-3, Secure Hash Standard (SHS), National Institute of Standards and Technology, US Department of Commerce, Washington D. C., 2008.
[3]. Junling Zhang, ‘A Study on Application of Digital Signature Technology’, 2010 International Conference on Networking and Digital Society, 2010 IEEE, Pg.: 498-501, Wenzhou China, 30-31 May, 2010.
[4]. RavneetKaur, ‘Digital Signature’, 2012 International Conference on Computing Science, 2012 IEEE, Pg.: 295-301, India, 14-15 Sep 2012.
[5]. PriyankaYadev, ‘Digital Signature’, International Journal of Engineering and Management Science, Vol. 3(2), Pg.: 115-118, Year 2012.
[6]. PayelSaha, ‘A Comprehensive Study on Digital Signature for Internet Security’, ACCENTS Transaction on Information Security, Vol. 1(1), Year 2016.
[7]. Arvind Sharma, “Comparative Analysis of Cryptographic Hash Function”, International Conference on Big Data, Computer Science and Information Technology (ICBDCSIT), Proceedings of 18th IRF International Conference, New Delhi, India, 09th September, 2018.
[8]. Arvind Sharma, “Attacks on Cryptographic Hash Function and Advances”, IJICS, Vol 5, Issue-11, 2018.
[9]. William Stallings “Cryptography and Network Security Principles”, 5th Edition.
[10]. Forouzan, “Data Communication and Networking”, 4th Edition, McGraw Hill Pg.: 961-1023
[11]. https://en.wikipedia.org/wiki/Digital_Signature_Algorithm