IMPLEMENTATION OF DIGITAL SIGNATURE ALGORITHM USING BIG DATA
Journal: International Journal of Mechanical Engineering and Technology(IJMET) (Vol.9, No. 8)Publication Date: 2018-12-29
Authors : Navin Garg;
Page : 1420-1428
Keywords : Cloud; Digital Signature; Enhanced Digital Signature; Elliptic Curve; Signing Process; Verification Process and Comparison.;
Abstract
Signcryption techniques combine encryption and digital signature processes to reduce the overhead of doing these steps individually. This is why digital signatures are so important in systems where sensitive data has to be protected. Digital signatures based on elliptic curves may be used to increase application security at cheap cost. Experts are making every effort to make ECDSA more robust so that it can withstand a range of difficulties, despite the fact that it is the most novel of all asymmetric digital signature systems. If the signed message is intercepted and sent, the digital signature will not be able to stop a replay attack. The intruder may even forge the sender's digital signature in order to conceal their true identity. This method is an advancement in cryptography since it combines digital signatures and public encryption into a single system.
Other Latest Articles
- SOFTWARE RELIABILITY GROWTH MODELS WITH LEARNING BASED FAULT DETECTION RATE FUNCTION
- MITIGATE THE PROBLEMS FACED BY CURRENT INTRUSION DETECTION SYSTEM
- ROLE OF SECURITY METRICS AND IDENTIFY THE CURRENT PRACTICES AND PROCESSES INVOLVED IN THE SECURE SYSTEM DEVELOPMENT
- DEPLOYMENT AND SECURITY ISSUES OF THE NEXT GENERATION INTERNET PROTOCOL IPV6
- DESIGN AND DEVELOPMENT OF EFFICIENT KNOWLEDGE EXTRACTION SYSTEM
Last modified: 2023-05-23 21:43:37