Secure Digital Signature Schemes based on Hash Functions
Abstract
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm.
Keywords
Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Full Text:
PDFReferences
Agrawal, Vikaram M., and Hiral Chauhan. "An Overview of security issues in Mobile Ad hoc Networks." INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES 1.1 (2015): 9-17.
DOI: http://dx.doi.org/10.26472/ijces.v1i1.18
Refbacks
Copyright (c) 2015 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.