To install StudyMoose App tap and then “Add to Home Screen”
Save to my list
Remove from my list
The various electronic services like E -Banking, E -Governance, E -Voting etc., and their success rate is directly dependent on the security measures, the authenticity services and the integrity2 management of the information being shared and transmitted between t he senders and the receivers. This requirement of security, integrity and authenticity led to the discovery of Digital Signatures in the field of Information Technology. In this case, the sensitive and confidential information to be shared is required to b e signed digitally by the original sender and in order to read the information, the receiver too has a key to decipher the information and verify it categorically.
This is achieved using highly complex algorithms of cryptography. These algorithms w hen applied on the plain text to be sent, make it unreadable before transmitting them. Various attributes like the size of the key and the block respectively, the complexities of the computations performed, the security parameters used, customizations spec ific to the application etc., determine the level of the performance by different types of digital signatures.
(Ijsr.in, 2019)
Digital Signature is a technique used in Computer Science to provide integrity and authenticity to the users sending and receiving critical and sensitive data. Digital Signature is basically asymmetric technique of cryptography which is based on the implem entation of mathematical formulas over a digital document. It derives its name from the literal signing of the document in order to assure the recipient the authenticity of the sender and his origin and that the message has not been tampered with while in the transit.
(Roy and Karforma, 201 2) Digital Signatures help helped achieve some of the most required safety features for the transition of digital data like:
A Digital Signature contains a sequence of bytes which may alternatively be referred as a code. The generation of the cod e is unique and different for each document and indicated to the signature of a sender or the signer. Digital Signature thus, is generated by combining the code generated for a document and is signed by a signer only.
The algorithms for generating digital signatures are based on mathematical formulae. The algorithms for the di gital signatures are usually made up of three main sub-phases namely:
The output text after signing the original text is called cipher text. The key used in the algorithm is a vital component that helps in determining what the cryptographic algorithm's functional output will be. (Saha, 2016) Further, there are two types of key generation cryptographic techniques:
Step 1: Calculation of the message digest (hash value assigned to the message) using one of the algorithms for cryptography (for instance, MD2, MD5 or any other). When even a single Message Hash Function Message Digest Signature Function Message Digital Signature4 bit of this fixed length , sequence of bits is made to change by the application of message digest algorithm, a new digest of the input message is formed. (Lyubashevsky and Micciancio, 2019)
Step 2: Calculation of the digital signature by encrypting the hash value obtained in step 1 using the private key of the digital signer. It is done using a mathematical algorithm for encryption like RSA (based on the theory of numbers), DSA (uses the discrete theory algorithms), ECDSA (applies the theory of elliptic curves)
Step 1: Calculating the current value of the hash function using the same algorithm which was used while digital signing by the sender. (Subramanya and Yi, 2006)
Step 2: Calculating the original value of the hash function by decrypting digital signature using same algorithm which was used for encryption while signing the message. A public key that corresponds to the private key while the signing process is used for decryption.
Step 3: Comparing current and original values of the hash function. Successful verification corresponds to both the values being same and is a proof that the public key used in the process of verification corresponds to the private key using which the message was signed. In case of a mismatch, the verifications fail, and digital si gnature is marked invalid.
Creating digital signatures needs to have a secure environment and this requires digital certification for managing, issuing, potentially storing and utilising the digital signatures. Such an environment is known as Public-Key-Infrastructure (PKI) which can either be managed locally in-house by the issuer of the service or managed externally by a provider of cloud solutions that can be accessed over the internet. (Gohel and Upadhyay, 2015) The digital signature services b y the providers must follow some basic pre -requisites irrespective of the cryptographic algorithm or theories. These are:
No legal acts or the service providers or users can change or alter these basics of the existing possibilities in engineering. The fulfilment of the above-mentioned conditions is an evidence of the sender of the message and hence, the verification of the original sender using digital signatures. It is always advisable to use a separate set of keys for the purpose of encrypting the message and signing it. Also, signing keys should not be backed up until and unless the destination of the backup is itself encrypted securely thereby ensuring the absence of foul play. Many new companies and providers with newer technologies as well the established providers are in the quest to diversify their network across the globe. Some of the providers in Europe are Opentrust, D -Trust; American providers are Adobe Echosign, ARX CoSign, DocuSign. In the Asian countries like India, EverSign, Fill are some of the companies offering dig ital signatures services. PleaseSign, Pandadoc are a few providers of digital signatures in Australia.
With the emerging world of technology, many traditional as well as newer applications and businesses have started carrying out electronic transactions in enormous amounts. This calls for security, authenticity, integrity, non -repudiation rules to be applied in place to ensure that the sensitiv e and confidential data is not maliciously altered. Alike the validation by physical signatures in verifying the paper documents, Digital signatures help in authenticating the electronic or digital documents. Though this is still an emerging technology, ye t a lot of6 providers and vendors have come across the globe to provide the services of digital signatures. (Darwish, 201 3)
Digital Signature: a Research Report. (2019, Aug 20). Retrieved from https://studymoose.com/document/research-report001
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment