Digital Signature Verification Based on Biogamal, SHA and Elgamal Algorithms

Sakshi Walke

Abstract


Nowadays, in our day-to-day life online services are playing a very crucial role. Online services also have some certain security challenges in communication network. Security aspects consists of confidentiality of data/information, authentication of users and integrity of data. To achieve all these parameters, the information must be digitally signed by the original sender and verified by the intended recipient. Thus, research digital signatures should be further developed to improve the data authenticity and security of the transferred data. In this paper, a secured digital signature algorithm has been designed. Design of secure digital signature uses the concept of DNA encryption/decryption technique, hybridization of secure hash code and elgamal encryption/decryption techniques. Use of SHA algorithm generates a secure hash code and reduces the computational complexity and is then compared with existing Play Gamal algorithm with respect to time complexity.

Keywords


Component, formatting, style, styling, insert

Full Text:

 Subscribers Only

References


Abdul Ghofar, Muhamad Hardi, Muhammad Nuur Firdaus, Guruh Fajar Shidik. Digital Signature Based on PlayGamal Algorithm. International Seminar on Application for Technology of Information and Communication (iSemantic), IEEE, Oct. 2017, pp. 58–65.

Kadek Dwi Budi Utama, M. Rizqia Al-Ghazali Q., Leonardus Irfan Bayu Mahendra, Guruh Fajar Shidik. Digital Signature using MAC Address based AES128 and SHA-2 256-bit. International Seminar on Application for Technology of Information and Communication (iSemantic), IEEE, Oct. 2017, pp. 72–78.

Sergei G. Chernyi, Aslamin A. Ali, Vycheslav V. Veselkov, Ivan L. Titov, Vlad Yu. Budnik. Security of Electronic Digital Signature in Maritime Industry. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Feb 2017, pp. 29–32.

S. Alam, A. Jamil, A. Saldhi, and M. Ahmad. Digital Image Authentication and Encryption using Digital Signature. International Conference on Advances in Computer Engineering and Applications (ICACEA), March 2015, pp. 332–336.

S.A. Jaju and S.S. Chowhan. A Modified RSA Algorithm to Enhance Security for Digital Signature. in International Conference and Workshop on Computing and Communication (IEMCON), Oct 2015, pp. 1–5.

M.C.A. Kioon, Z. Wang, S.D. Das. Security Analysis of MD5 algorithm in Password Storage. International Symposium on Computer, Communication, Control and Automation, 2013, pp. 0706–0709.

Prakash Kuppuswamy, Peer Mohammad Appa, Saeed QY Al-Khalidi. A New Efficient Digital Signature Scheme Algorithm based on Block cipher. IOSR Journal of Computer Engineering (IOSRJCE) Volume 7, Issue 1, Nov.–Dec. 2012; 47–52.

Minh H. Nguyen, Duy N. HOi, Dung H. Luu, Alexander A. Moldovyan, and

Nikolay A. Moldovyan. On Functionality Extension of the Digital Signature Standards. International Conference on Advanced Technologies for Communications (ATC 2011).

Zuguang Xuan, Zhenjun Du, Rong Chen. Comparison Research on Digital Signature Algorithms in Mobile Web Services. National Natural Science Foundation of China, IEEE, Sept. 2009.

Qiuxia Zhang, Zhan Li, Chao Song. The Improvement of digital signature algorithm Based on elliptic curve cryptography. International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), IEEE, August 2011, pp.1689–1691.




DOI: https://doi.org/10.37591/tmd.v7i3.4957

Refbacks

  • There are currently no refbacks.