Open Access   Article Go Back

Authentication of Study Material in E-Learning using Digital Signature Algorithms

A. Ghosh1 , S. Karforma2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 123-127, Jan-2019

Online published on Jan 20, 2019

Copyright © A. Ghosh, S. Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Ghosh, S. Karforma, “Authentication of Study Material in E-Learning using Digital Signature Algorithms,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.123-127, 2019.

MLA Style Citation: A. Ghosh, S. Karforma "Authentication of Study Material in E-Learning using Digital Signature Algorithms." International Journal of Computer Sciences and Engineering 07.01 (2019): 123-127.

APA Style Citation: A. Ghosh, S. Karforma, (2019). Authentication of Study Material in E-Learning using Digital Signature Algorithms. International Journal of Computer Sciences and Engineering, 07(01), 123-127.

BibTex Style Citation:
@article{Ghosh_2019,
author = {A. Ghosh, S. Karforma},
title = {Authentication of Study Material in E-Learning using Digital Signature Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {123-127},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=606},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=606
TI - Authentication of Study Material in E-Learning using Digital Signature Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - A. Ghosh, S. Karforma
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 123-127
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

Now-a-days ICT (Information and Communication Technology) is so much improved by using various network technologies so that any type of information can be send and received very easily. This information may be belongs to banking system, government oriented system or E-learning system. Security is highly needed to protect it from any unauthorized person. For security four things are required: confidentiality, integrity, authentication and non-repudiation. When a sender wants to send an electronic document to the receiver, an attacker can get it and modify it and send the altered document to that receiver. Digital Signature is applied to avoid such situations. Properly applied Digital Signature gives confident to the receiver that the document is reliable and was sent by the original sender. Thus Digital Signature provides not only the confidentiality and integrity of the document but also provides non-repudiation so that the signature can’t be denied by the signer. In this paper authors have discussed about the comparative study of different cryptographic Digital Signature algorithms such as RSA, DSA, ECDSA, GOST and ElGamal to achieve a better security for authenticity and integrity in E-Learning system during upload lecture notes between Teacher and Admin.

Key-Words / Index Term

ICT, Confidentiality, Integrity, Authentication, Non-repudiation, Digital Signature, RSA, DSA, ECDSA, GOST, ElGamal

References

[1] A.Kahate, “Cryptography and Network Security”, McGraw-Hill Publisher, India, pp.7-9,197-199, 2010.
[2] B. Schneier, “Applied Cryptography”, Wiley Publisher, India, pp. 476-478,495-496, 2007.
[3] W. Stallings, “Cryptography and Network Security Principles and Practices”, Pearson Publisher, India, pp.398-400, 2012.
[4] A. Roy, S. Karforma, “A Survey on digital signatures and its applications”, Journal of Computer and Information Technology Vol. 03 , No. 1 & 2, Pp- 45-69, August 2012.
[5] A. Ghosh, S. Karforma,” Object Oriented Modeling of DSA for Authentication of Student in E-Learning”, International Journal of Science and Research, Vol. 03, No. 07, pp. 2293-2297, July 2014.
[6] M. Kaur, N.Kaur, B. Singh, “Comparative Study of Different Cryptographic Algorithms”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 4, pp. 352-354, May 2017.
[7] C. Endrodi, “Efficiency Analysis and Comparison of Public Key Algorithms”, Presented in Conference of PhD Students in Computer Science, July 2002.
[8] A. Sarkar, “An Overview of Cryptographic Algorithms and Security Challenges in Big Data”, ACCENTS Transaction on Information Security, Vol. 1, pp. 7-14, 2016.
[9] R. Haddaji, R. Ouni, S. Bouaziz, A. Mtibba, “Comparison Digital Signature Algorithm and Authentication Schemes for H.264 Compressed Video”, International Journal of Advanced Computer Science and Applications, Vol.7, No. 9, pp.357-363, 2016.
[10] A. Khalique, K. Singh, S. Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications, Vol. 2, No. 2, pp. 21-27, May 2010.
[11] A. I. Ali, “Comparison and Evaluation of Digital Signature Schemes Employed in NDN Network”, International Journal of Embedded Systems and Applications, Vol. 5, No. 2, pp. 15-29, June 2015.
[12] M. Michels, D. Naccache, H. Petersen, “GOST 34.10- A Brief Overview of Russia’s DSA”, Published in Computers and Security, Vol. 15, No. 8, pp. 725-732, 1996.
[13] E. R. Weippl, ”Security in E-Learning”, Springer Publisher, India, 2005
[14] D. Johnson, A. Menezes, S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA)”, International Journal of Information Security, Vol. 1, No. 1, pp. 36-63, 2001.
[15] S. Karforma, S. Banerjee , “Object Oriented modeling of ElGamal Digital Signature for authentication of study material in E-learning system”, IJARSE, Vol..4, No.2, pp. 455-460 February 2015.
[16] S. Singh, Md. S. Iqbal, A. jaiswal, “Survey on Techniques developed using Digital Signature: Public Key Cryptography”, International Journal of Computer Applications, Vol. 117, No. 16 pp. 1-4, May 2015.
[17] A. H. Lone, M. Uddin, “Common Attacks on RSA and its Variants with Possible Countermeasures”, International Journal of Emerging Research in Management & Technology, Vol. 5, No. 5, pp. 65-70, May 2016.
[18] M. Repka, M. Varchola, M. Drutarovsky, “ Improving CPA Attack Against DSA and ECDSA”, Journal of Electrical Engineering, Vol. 06, No. 03, pp. 159-163, 2015.
[19] J. Schmidt, M. Medwed, “A Fault Attack on ECDSA”, In the Proceedings of the 2009 workshop on Fault Diagnosis and Tolerance in Cryptography, Lausanne, Switzerland, pp. 93-99,2009.
[20] N. Courtois, M. Misztal, “1st Differential Attack on Full 32-Round GOST”, International Conference on Information and Communications Security, Beijing, China, pp. 216-227, 2011.
[21] X. Li, X. Shen, H. Chen, “ElGamal Digital Signature Algorithm of Adding a Random Number ”, Journal of Networks, Vol. 06, No. 05, pp. 774-782, May 2011.