Digital Signature Algorithm: A Hybrid Approach

被引:0
|
作者
Hegde, N. Prajwal [1 ]
Shastrimath, V. Veena Devi [1 ]
机构
[1] Nitte Deemed Univ, NMAM Inst Technol, Dept Elect & Commun Engn, Nitte, Karnataka, India
关键词
DSA; digital signature algorithm; hash function; public key; private key; RSA;
D O I
10.14569/IJACSA.2023.0140376
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the most important issues in layout of a Digital System. Communication these days is digital. Consequently, utmost care must be taken to secure the information. This paper specializes in techniques used to defend the facts from thefts and hacks the use of quit-to-cease encryption and decryption. Cryptography is the important thing technique related to Encrypting and Decrypting messages. We use Digital Signature preferred (DSS) and the Digital Signature Algorithm (DSA). The code for this algorithm is written in MATLAB. The DSA Algorithm is commonly used in cryptographic applications to provide services such as entity authentication, key transit, and key agreement in an authenticated environment. This structure is related with steady Hash Function and cryptographic set of rules the government groups in USA as it is taken into consideration to be one of the safest approaches of protection system. This fashion-able could have a top notch effect on all of the Government Agencies and Banks for protective the facts. also key Symmetric there messages
引用
收藏
页码:656 / 660
页数:5
相关论文
共 50 条
  • [21] An Advanced Hybrid Technique for Digital Signature Scheme
    Elkamchouchi, Hassan M.
    Takieldeen, Ali E.
    Shawky, Mahmoud A.
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONIC ENGINEERING (ICEEE), 2018, : 375 - 379
  • [22] An Approach to Shorten Digital Signature Length
    Moldovyan, Nikolay A.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2006, 14 (03) : 390 - 396
  • [23] Digital signature approach for image authentication
    Bausys, R.
    Kriukovas, A.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2008, (06) : 65 - 68
  • [24] Fast verification algorithm in elliptic curve digital signature algorithm
    Bai, Guoqiang
    Huang, Zhun
    Chen, Hongyi
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2003, 43 (04): : 564 - 568
  • [25] Audio Digital Signature Algorithm with Tamper Detection
    Yang, Xiaoyuan
    Wu, Xiang
    Zhang, Minqing
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 15 - 18
  • [26] An efficient implementation of RSA digital signature algorithm
    Fu, Chong
    Jiang, Huiyan
    Li, Hui
    Zhu, Weiyong
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 143 - 147
  • [27] Deniable ring signature scheme based on the ISRSAC digital signature algorithm
    Zhang, Yanshuo
    Yuan, Yuqi
    Liu, Ning
    Chen, Ying
    Dong, Youheng
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [28] An Efficient Implementation of RSA Digital Signature Algorithm
    Cao, Ying-yu
    Fu, Chong
    International Conference on Intelligent Computation Technology and Automation, Vol 2, Proceedings, 2008, : 100 - 103
  • [29] An improved Elliptic Curve Digital Signature Algorithm
    Fan Ai-wan
    Lu Shu-xi
    MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 1024 - 1027
  • [30] An Efficient Implementation of RSA Digital Signature Algorithm
    Fu, Chong
    Zhu, Zhi-liang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12509 - +