Digital Signature Algorithm: A Hybrid Approach

被引:0
|
作者
Hegde, N. Prajwal [1 ]
Shastrimath, V. Veena Devi [1 ]
机构
[1] Nitte Deemed Univ, NMAM Inst Technol, Dept Elect & Commun Engn, Nitte, Karnataka, India
关键词
DSA; digital signature algorithm; hash function; public key; private key; RSA;
D O I
10.14569/IJACSA.2023.0140376
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the most important issues in layout of a Digital System. Communication these days is digital. Consequently, utmost care must be taken to secure the information. This paper specializes in techniques used to defend the facts from thefts and hacks the use of quit-to-cease encryption and decryption. Cryptography is the important thing technique related to Encrypting and Decrypting messages. We use Digital Signature preferred (DSS) and the Digital Signature Algorithm (DSA). The code for this algorithm is written in MATLAB. The DSA Algorithm is commonly used in cryptographic applications to provide services such as entity authentication, key transit, and key agreement in an authenticated environment. This structure is related with steady Hash Function and cryptographic set of rules the government groups in USA as it is taken into consideration to be one of the safest approaches of protection system. This fashion-able could have a top notch effect on all of the Government Agencies and Banks for protective the facts. also key Symmetric there messages
引用
收藏
页码:656 / 660
页数:5
相关论文
共 50 条
  • [31] The Elliptic Curve Digital Signature Algorithm (ECDSA)
    Don Johnson
    Alfred Menezes
    Scott Vanstone
    International Journal of Information Security, 2001, 1 (1) : 36 - 63
  • [32] A study on the proposed Korean digital signature algorithm
    Lim, CH
    Lee, PJ
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 175 - 186
  • [33] WalnutDSA™: a group theoretic digital signature algorithm
    Anshel, Iris
    Atkins, Derek
    Goldfeld, Dorian
    Gunnells, Paul E.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 260 - 284
  • [34] A New Dynamic Hash Algorithm in Digital Signature
    Noroozi, Erfaneh
    Daud, Salwani Mohd
    Sabouhi, Ali
    Abas, Hafiza
    ADVANCED MACHINE LEARNING TECHNOLOGIES AND APPLICATIONS, 2012, 322 : 583 - +
  • [35] Deniable ring signature scheme based on the ISRSAC digital signature algorithm
    Zhang, Yanshuo
    Yuan, Yuqi
    Liu, Ning
    Chen, Ying
    Dong, Youheng
    PeerJ Computer Science, 2024, 10
  • [36] A hybrid approach for log signature generation
    Pokharel, Prabhat
    Pokhrel, Roshan
    Joshi, Basanta
    APPLIED COMPUTING AND INFORMATICS, 2023, 19 (1/2) : 108 - 121
  • [37] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [38] Application of the Hybrid Arbitrated Digital Signature Scheme in CSCW
    Yu, Zhen
    Liu, Bing-wu
    Shen, Gui-cheng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [39] A Visualization Based Approach for Digital Signature Authentication
    Xu, Songhua
    Yang, Wenxia
    Lau, Francis C. M.
    COMPUTER GRAPHICS FORUM, 2009, 28 (03) : 935 - 942
  • [40] Visual digital signature scheme: A new approach
    Jaafar, Abdullah M.
    Samsudin, Azman
    IAENG International Journal of Computer Science, 2010, 37 (04)