Digital Signature Algorithm: A Hybrid Approach

被引:0
|
作者
Hegde, N. Prajwal [1 ]
Shastrimath, V. Veena Devi [1 ]
机构
[1] Nitte Deemed Univ, NMAM Inst Technol, Dept Elect & Commun Engn, Nitte, Karnataka, India
关键词
DSA; digital signature algorithm; hash function; public key; private key; RSA;
D O I
10.14569/IJACSA.2023.0140376
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the most important issues in layout of a Digital System. Communication these days is digital. Consequently, utmost care must be taken to secure the information. This paper specializes in techniques used to defend the facts from thefts and hacks the use of quit-to-cease encryption and decryption. Cryptography is the important thing technique related to Encrypting and Decrypting messages. We use Digital Signature preferred (DSS) and the Digital Signature Algorithm (DSA). The code for this algorithm is written in MATLAB. The DSA Algorithm is commonly used in cryptographic applications to provide services such as entity authentication, key transit, and key agreement in an authenticated environment. This structure is related with steady Hash Function and cryptographic set of rules the government groups in USA as it is taken into consideration to be one of the safest approaches of protection system. This fashion-able could have a top notch effect on all of the Government Agencies and Banks for protective the facts. also key Symmetric there messages
引用
收藏
页码:656 / 660
页数:5
相关论文
共 50 条
  • [1] A New Approach of Digital Signature Verification based on BioGamal Algorithm
    Kasodhan, Rashmi
    Gupta, Neetesh
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 10 - 15
  • [2] A variant of Digital Signature Algorithm
    Dimitrios Poulakis
    Designs, Codes and Cryptography, 2009, 51 : 99 - 104
  • [3] IMPROVED DIGITAL SIGNATURE ALGORITHM
    YEN, SM
    LAIH, CS
    IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (05) : 729 - 730
  • [4] On the Security of the Digital Signature Algorithm
    Ian F. Blake
    Theodoulos Garefalakis
    Designs, Codes and Cryptography, 2002, 26 : 87 - 96
  • [5] On the security of digital signature algorithm
    Liu, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 362 - 367
  • [6] A New Digital Signature Algorithm
    Noorouzil, Erfaneh
    Haghighi, Amir Reza Estakhrian
    Peyravi, Farzad
    Zadeh, Ahmad Khadem
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 141 - 146
  • [7] A variant of Digital Signature Algorithm
    Poulakis, Dimitrios
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 51 (01) : 99 - 104
  • [8] On the security of the Digital Signature Algorithm
    Blake, IF
    Garefalakis, T
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 87 - 96
  • [9] Improved digital signature algorithm
    South China Univ of Technology, Guangzhou, China
    Tien Tzu Hsueh Pao, 4 (116-119):
  • [10] Digital signature algorithm for securing digital identities
    Kwon, T
    INFORMATION PROCESSING LETTERS, 2002, 82 (05) : 247 - 252