CFP last date
20 May 2024
Reseach Article

A Novel Approach for Developing a Secure and Optimized Algorithm for Implementation of Digital Signature

by Shivanshu Rastogi, Zubair Iqbal, Prabal Bhatnagar, Priyanka Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 22
Year of Publication: 2015
Authors: Shivanshu Rastogi, Zubair Iqbal, Prabal Bhatnagar, Priyanka Saxena
10.5120/20686-3541

Shivanshu Rastogi, Zubair Iqbal, Prabal Bhatnagar, Priyanka Saxena . A Novel Approach for Developing a Secure and Optimized Algorithm for Implementation of Digital Signature. International Journal of Computer Applications. 117, 22 ( May 2015), 18-23. DOI=10.5120/20686-3541

@article{ 10.5120/20686-3541,
author = { Shivanshu Rastogi, Zubair Iqbal, Prabal Bhatnagar, Priyanka Saxena },
title = { A Novel Approach for Developing a Secure and Optimized Algorithm for Implementation of Digital Signature },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 22 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number22/20686-3541/ },
doi = { 10.5120/20686-3541 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:06.136055+05:30
%A Shivanshu Rastogi
%A Zubair Iqbal
%A Prabal Bhatnagar
%A Priyanka Saxena
%T A Novel Approach for Developing a Secure and Optimized Algorithm for Implementation of Digital Signature
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 22
%P 18-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital signatures can be treated as a digital code that can be embedded with an electronically transmitted data and its property is that it uniquely identifies the sender and ensures that the data has not been modified after the process of digital signing of that data. There are various algorithms that have been proposed for the generation of digital Signature. In this paper we are proposing a novel approach for making secure and optimize algorithm than any other existing algorithm.

References
  1. Chen Hai-peng, Shen Xuan-Jing, Wei Wei, "Digital Signature Algorithm Based on Hash Round Function and Self-Certified Public Key System", Education Technology and Computer Science, 2009.
  2. Sombir Singh, Sunil K. Maakar, Dr. Sudesh Kumar, "Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques", IJARCSSE Volume 3, Issue 6, June 2013.
  3. Cse. iitkgp. ac. in/~deepdeep/courses_iitkgp/crypto/slides/symmetricciphers. pdf.
  4. Mandeep Singh, Narula Simarpreet Singh, "Implementation of Triple Data Encryption Standard using Verilog" ", IJARCSSE Volume 4, Issue 1, January 2014.
  5. www. ee. usyd. edu. au/people/philip. leong/userfiles/files/papers/crypt_usenix91. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signature DES Security.