CFP last date
22 July 2024
Reseach Article

Modified RSA Digital Signature Scheme for Data Confidentiality

by Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 13
Year of Publication: 2014
Authors: Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal
10.5120/18579-9848

Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal . Modified RSA Digital Signature Scheme for Data Confidentiality. International Journal of Computer Applications. 106, 13 ( November 2014), 13-16. DOI=10.5120/18579-9848

@article{ 10.5120/18579-9848,
author = { Kamal Kr. Gola, Bhumika Gupta, Zubair Iqbal },
title = { Modified RSA Digital Signature Scheme for Data Confidentiality },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 13 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number13/18579-9848/ },
doi = { 10.5120/18579-9848 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:17.961588+05:30
%A Kamal Kr. Gola
%A Bhumika Gupta
%A Zubair Iqbal
%T Modified RSA Digital Signature Scheme for Data Confidentiality
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 13
%P 13-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As we know that digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature. This signature guarantees the source authenticity and integrity of a message. Digital signature provides three types of services such as authentication, message integrity and non-repudiation, but does not provide the confidentiality of data which is most important during data transfer because the data is very sensitive. In this paper, we proposed a modified RSA digital signature scheme for data confidentiality. The main purpose of this approach is to provide the data confidentiality during the data transfer. To achieve this we are using the concept of public key encryption.

References
  1. National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standards 186–3.
  2. National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information Processing Standards 180–3.
  3. Behrouz A. Forouzan, Cryptography and Network Security. Special Indian Edition 2007, Tata McGrawHill Publishing Company Limited, New Delhi.
  4. William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Education.
  5. Douglas Stinson, Cryptography Theory and Practice, by CRC Press, 1995.
  6. Aqeel Khalique, Kuldip Singh Sandeep Sood, Implementation of Elliptic Curve Digital Signature Algorithm, International Journal of Computer Applications, May 2010.
  7. Sushila Vishnoi, Vishal Shrivastava, International Journal of Computer Trends and Technology, ISSN: 2231-2803, 2012.
  8. Mr. Hemant Kumar, Dr. Ajit Singh, An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography, IJRREST, June 2012.
  9. Prakash Kuppuswamy, Peer Mohammad Appa, Dr. Saeed Q Y Al-Khalidithis, A new efficient digital signature scheme algorithm based on block ciphers, IOSR Journal of Computer engineering (IOSRJCE) ISSN: 227s8-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52
Index Terms

Computer Science
Information Sciences

Keywords

RSA digital signature scheme Public key private key prime number digital signature public key encryption plain text cipher text message (Data)