Open Access   Article Go Back

A Systematic Literature Review of Various Digital Signature Techniques

Namrata Vijay1 , Kaptan Singh2 , Amit Saxena3

Section:Review Paper, Product Type: Journal Paper
Volume-8 , Issue-9 , Page no. 33-37, Sep-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i9.3337

Online published on Sep 30, 2020

Copyright © Namrata Vijay, Kaptan Singh, Amit Saxena . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Namrata Vijay, Kaptan Singh, Amit Saxena, “A Systematic Literature Review of Various Digital Signature Techniques,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.9, pp.33-37, 2020.

MLA Style Citation: Namrata Vijay, Kaptan Singh, Amit Saxena "A Systematic Literature Review of Various Digital Signature Techniques." International Journal of Computer Sciences and Engineering 8.9 (2020): 33-37.

APA Style Citation: Namrata Vijay, Kaptan Singh, Amit Saxena, (2020). A Systematic Literature Review of Various Digital Signature Techniques. International Journal of Computer Sciences and Engineering, 8(9), 33-37.

BibTex Style Citation:
@article{Vijay_2020,
author = {Namrata Vijay, Kaptan Singh, Amit Saxena},
title = {A Systematic Literature Review of Various Digital Signature Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2020},
volume = {8},
Issue = {9},
month = {9},
year = {2020},
issn = {2347-2693},
pages = {33-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5208},
doi = {https://doi.org/10.26438/ijcse/v8i9.3337}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i9.3337}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5208
TI - A Systematic Literature Review of Various Digital Signature Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Namrata Vijay, Kaptan Singh, Amit Saxena
PY - 2020
DA - 2020/09/30
PB - IJCSE, Indore, INDIA
SP - 33-37
IS - 9
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
226 372 downloads 135 downloads
  
  
           

Abstract

Network is a node collection. The network`s basic aim is to transfer information from one location to another. This information must obviously be secured from access by third parties. The cryptography concept was based upon the necessity to secure critical data exchanged across an unsecured network. While using encryption the transmitter encrypts or encodes the information with a secret key so that only the tender recipient will understand it. Cryptanalysis, however, means unwanted access without the secret information key. The cryptography uses various techniques such as Diffie Hellman, AES, RSA, DES, IDEA, BLOWFISH, x.509, PKI, digital signatures to convert plain texts into the respective chipper text. In different circumstances all these algorithms are important. RSA`s most productive computerized signature calculation. This article presents a precise writing review of different computerized signature frameworks dependent on RSA. A basic report is completed on the key age, the creation of marks and the mark check of different computerized signature approaches.

Key-Words / Index Term

Digital Signature, RSA, Cryptography, Key Generation, signature creation, signature verification

References

[1] William Stallings “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.
[2] National Bureau of Standards, “Data Encryption Standard,” FIPS Publication 46, 1977.
[3] Dr. Mahmoud T. El-Hadidi, Dr. N. H. Hegazi and H. K Aslan, "Implementation of a Hybrid Encryption Scheme for Ethernet," in Proceedings of Computers and Communications IEEE Symposium, pp. 150-156, 1995.
[4] R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," in Advances in Cryptology - {CRYPTO} `98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, 23-27 pp. 13-25, August 1998.
[5] Louis Granboulan, "RSA hybrid encryption schemes," IACR Cryptology ePrint Archive, p. 110, 2001, [Online].
[6] Kaoru Kurosawa and Yvo Desmedt, "A New Paradigm of Hybrid Encryption Scheme," in Advances in Cryptology - {CRYPTO} 2004, Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, 15-19 pp. 426-442, August, 2004.
[7] "ISO/IEC 18033-1, Information technology - Security techniques - Encryption Algorithms - Part1: General," International Organization for Standardization, 2003.
[8] M. Ayoub Khan and Y.P.Singh, "On the security of Joint Signature and Hybrid Encryption," in Networks ,13th IEEE International Conference (Volume:1 ), 2005.
[9] Y. Wang and M. Hu, "Timing evaluation of the known cryptographic algorithms," in International Conference on Computational Intelligence and Security, pp. 233-237, 2009.
[10] Colin D. Walter, "Exponentiation Using Division Chains," IEEE transactions on Computers, vol. 47, no. 7, 1998.
[11] Noboru Kunihiro and Hirosuke Yamamoto, "New Methods for Generation of Short Addition Chains," IEICE Trans. Fundamental, vol. 83, no. 1, 2000.
[12] C. K. Koc, "High-speed RSA implementations," Technical notes TR 201, RSA Security Inc., Nov. 1994.
[13] C. K. Koc, "RSA hardware implementation," Technical Notes TR 801, RSA Security Inc., Aug. 1995.
[14] R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[15] Dorothy E. Denning, "Digital signature with RSA and other Publickey cryptosystems," Comm. of the ACM, vol. 27, no. 4, pp. 388-392, Apr. 1984.
[16] Burton S. Kaliski, "RSA Digital Signatures," Dr. Dobb`s Journal, May 2001, [Online]. http://www.drdobbs.com/rsa-digitalsignatures/184404605.
[17] Erfaneh Noorouzi1, Amir Reza Estakhrian Haghighi, Farzad Peyravi and Ahmad, "A new digital signature algorithm," in International Conference on Machine Learning and Computing, vol. 3, Singapore, pp. 141-146, 2011.
[18] Prakash Kuppuswamy, Peer Mohammad Appa and Saeed Q Y AlKhalidi, "A New Efficient Digital Signature Scheme Algorithm based on Block cipher," IOSR Journal of Computer Engineering, vol. 7, no. 1, pp. 47-52, Nov. 2012.
[19] Hemant Kumar, Ajit Singh, "An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key Cryptography," International Journal of Research Review in Engineering Science and Technology, vol. 1, no. 1, pp. 54-57, Jun. 2012.