Digital Signature Algorithm: A Hybrid Approach

被引:0
|
作者
Hegde, N. Prajwal [1 ]
Shastrimath, V. Veena Devi [1 ]
机构
[1] Nitte Deemed Univ, NMAM Inst Technol, Dept Elect & Commun Engn, Nitte, Karnataka, India
关键词
DSA; digital signature algorithm; hash function; public key; private key; RSA;
D O I
10.14569/IJACSA.2023.0140376
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the most important issues in layout of a Digital System. Communication these days is digital. Consequently, utmost care must be taken to secure the information. This paper specializes in techniques used to defend the facts from thefts and hacks the use of quit-to-cease encryption and decryption. Cryptography is the important thing technique related to Encrypting and Decrypting messages. We use Digital Signature preferred (DSS) and the Digital Signature Algorithm (DSA). The code for this algorithm is written in MATLAB. The DSA Algorithm is commonly used in cryptographic applications to provide services such as entity authentication, key transit, and key agreement in an authenticated environment. This structure is related with steady Hash Function and cryptographic set of rules the government groups in USA as it is taken into consideration to be one of the safest approaches of protection system. This fashion-able could have a top notch effect on all of the Government Agencies and Banks for protective the facts. also key Symmetric there messages
引用
收藏
页码:656 / 660
页数:5
相关论文
共 50 条
  • [41] The insecurity of the digital signature algorithm with partially known nonces
    Nguyen, PQ
    Shparlinski, IE
    JOURNAL OF CRYPTOLOGY, 2002, 15 (03) : 151 - 176
  • [42] A Modified RSA Algorithm to Enhance Security for Digital Signature
    Jaju, Sangita A.
    Chowhan, Santosh S.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [43] Proposed developments of elliptic curve digital signature algorithm
    Sadkhan, Sattar B.
    Hameed, Najlae Falah
    World Academy of Science, Engineering and Technology, 2010, 62 : 679 - 681
  • [44] An image identification algorithm based on digital signature method
    Li, Xiaofei
    Shen, Xuanjing
    Chen, Haipeng
    Lü, Yingda
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (06): : 1348 - 1356
  • [45] Study on an algorithm of ID-based digital signature
    Liu, Hong-Wei
    Xie, Wei-Xin
    Yu, Jian-Ping
    Zhao, Chao
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2008, 30 (06): : 1159 - 1162
  • [47] An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
    Lamba, Shweta
    Sharma, Monika
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 179 - 183
  • [48] Fast digital signature algorithm based on subgraph isomorphism
    Szollosi, Lorand
    Marosits, Tamas
    Feher, Gabor
    Recski, Andras
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 34 - +
  • [49] Java']Java model of DSA (Digital Signature Algorithm)
    Saini, S
    Ahmad, F
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 189 - 194
  • [50] Research on computing IP core for the digital signature algorithm
    Chu, JP
    Xu, YS
    Li, XJ
    Lai, ZS
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1329 - 1331