A Systematic Literature Review of Various Digital Signature Techniques

Authors

  • Namrata Vijay Dept. of Computer Science & Engineering TIEIT Bhopal, India
  • Kaptan Singh Dept. of Computer Science & Engineering TIEIT Bhopal, India
  • Amit saxena Dept. of Computer Science & Engineering TIEIT Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v8i9.3337

Keywords:

Digital Signature, RSA, Cryptography, Key Generation, signature creation, signature verification

Abstract

Network is a node collection. The network's basic aim is to transfer information from one location to another. This information must obviously be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques such as Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, digital signatures to convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA's most productive computerized signature calculation. This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks and the mark check of different computerized signature approaches.

References

[1] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.

[2] National Bureau of Standards, “Data Encryption Standard,” FIPS Publication 46, 1977.

[3] Dr. Mahmoud T. El-Hadidi, Dr. N. H. Hegazi and H. K Aslan, "Implementation of a Hybrid Encryption Scheme for Ethernet," in Proceedings of Computers and Communications IEEE Symposium, pp. 150-156, 1995.

[4] R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," in Advances in Cryptology - {CRYPTO} `98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, 23-27 pp. 13-25, August 1998.

[5] Louis Granboulan, "RSA hybrid encryption schemes," IACR Cryptology ePrint Archive, p. 110, 2001, [Online].

[6] Kaoru Kurosawa and Yvo Desmedt, "A New Paradigm of Hybrid Encryption Scheme," in Advances in Cryptology - {CRYPTO} 2004, Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, 15-19 pp. 426-442, August, 2004.

[7] "ISO/IEC 18033-1, Information technology - Security techniques - Encryption Algorithms - Part1: General," International Organization for Standardization, 2003.

[8] M. Ayoub Khan and Y.P.Singh, "On the security of Joint Signature and Hybrid Encryption," in Networks ,13th IEEE International Conference (Volume:1 ), 2005.

[9] Y. Wang and M. Hu, "Timing evaluation of the known cryptographic algorithms," in International Conference on Computational Intelligence and Security, pp. 233-237, 2009.

[10] Colin D. Walter, "Exponentiation Using Division Chains," IEEE transactions on Computers, vol. 47, no. 7, 1998.

[11] Noboru Kunihiro and Hirosuke Yamamoto, "New Methods for Generation of Short Addition Chains," IEICE Trans. Fundamental, vol. 83, no. 1, 2000.

[12] C. K. Koc, "High-speed RSA implementations," Technical notes TR 201, RSA Security Inc., Nov. 1994.

[13] C. K. Koc, "RSA hardware implementation," Technical Notes TR 801, RSA Security Inc., Aug. 1995.

[14] R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of the ACM, vol. 21, no. 2, pp. 120-126, 1978.

[15] Dorothy E. Denning, "Digital signature with RSA and other Publickey cryptosystems," Comm. of the ACM, vol. 27, no. 4, pp. 388-392, Apr. 1984.

[16] Burton S. Kaliski, "RSA Digital Signatures," Dr. Dobb`s Journal, May 2001, [Online]. http://www.drdobbs.com/rsa-digitalsignatures/184404605.

[17] Erfaneh Noorouzi1, Amir Reza Estakhrian Haghighi, Farzad Peyravi and Ahmad, "A new digital signature algorithm," in International Conference on Machine Learning and Computing, vol. 3, Singapore, pp. 141-146, 2011.

[18] Prakash Kuppuswamy, Peer Mohammad Appa and Saeed Q Y AlKhalidi, "A New Efficient Digital Signature Scheme Algorithm based on Block cipher," IOSR Journal of Computer Engineering, vol. 7, no. 1, pp. 47-52, Nov. 2012.

[19] Hemant Kumar, Ajit Singh, "An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography," International Journal of Research Review in Engineering Science and Technology, vol. 1, no. 1, pp. 54-57, Jun. 2012.

Downloads

Published

2020-09-30
CITATION
DOI: 10.26438/ijcse/v8i9.3337
Published: 2020-09-30

How to Cite

[1]
N. Vijay, K. Singh, and A. saxena, “A Systematic Literature Review of Various Digital Signature Techniques”, Int. J. Comp. Sci. Eng., vol. 8, no. 9, pp. 33–37, Sep. 2020.