A comprehensive study on digital signature for internet security
Journal: ACCENTS Transactions on Information Security (TIS) (Vol.1, No. 1)Publication Date: 2016-01-19
Authors : Payel Saha;
Page : 1-6
Keywords : Cryptography; Digital Signature; RSA; MD5.;
Abstract
For secure transactions over open networks, the Digital Signature technique is essential. It is having varieties of applications in order to ensure the integrity of data exchanged or stored and to prove the identity of the originator to the recipient. Digital Signature schemes are commonlyused in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related to Cryptographic Algorithm and Hashing Algorithm. This Research paper presents a comprehensive study of Digital Signature and its Algorithm for Internet Security purpose.
Other Latest Articles
- Secure image data transmission and hiding technique: a survey
- Efficient Content based Image Retrieval (CBIR) Techniques: A Survey
- Knowledge Based System based on Fuzzy Logic for Digital Image Processing
- Design and Implementation of Frequency Modulated Transmission and Reception of Speech Signal and FPGA Based Enhancement
- Simulation of Spatial Concentration of Urban Built-up Lands through GIS and Remote Sensing Techniques: A Study of Mysore City, Karnataka, India
Last modified: 2016-08-13 17:20:50