• Tidak ada hasil yang ditemukan

ANALYSIS AND DESIGN OF A PARAMETRICAL SECURITY MODEL FOR DIGITAL SIGNATURES

N/A
N/A
Protected

Academic year: 2024

Membagikan "ANALYSIS AND DESIGN OF A PARAMETRICAL SECURITY MODEL FOR DIGITAL SIGNATURES"

Copied!
3
0
0

Teks penuh

(1)

785 | P a g e

ANALYSIS AND DESIGN OF A PARAMETRICAL SECURITY MODEL FOR DIGITAL SIGNATURES

Mrs. B.Anandapriya

1

, Mrs.) Ananthi Sheshasaayee

2

1

Head / Asst. Prof, Dept. of B.C.A, Patrician College, Chennai , (India)

2

Head, Dept. of Computer Science, Quide-Millath College, Chennai, (India)

ABSTRACT

Digital signature authentication scheme provides secure communication between two users. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity).The focus of this paper is to discuss how to protect communications that occur in a transaction so as to guide against fraudsters and in other cases where it is important to detect forgery or tampering

.

Keywords: Digital Signatures, Decryption Encryption, Electronic Commerce, Hash Functions and RSA Key Pair Generator, Secure Electronic Transaction.

I. INTRODUCTION

Digital signature authentication schemes provide secure communication with minimum computational cost for real time applications such as electronic commerce, electronic voting etc. Implementation of cryptographic algorithms to protect identification, authentication or data storage has been the prime focus in cryptographic arena specially for smaller handheld devices.

The sender generates the signature of a given message using his secret key; the receiver then verifies the signature by using sender’s public key. And cryptography is the science which is used to achieve these security goals. Cryptography encrypts the static or travelling information so that unauthorised access to the information is not possible, regarding authentication ,cryptography is also used to make sure that rightful candidates from multiple parties attempting to get access to a system are authenticated properly and subsequently given access to system.

1.1 Objectives

To perform a formal and holistic study of the security threats on digital signatures and to find the security measures in digital signatures. To check the flaws with digital signatures in symmetric key algorithms and to analyze and understand the remedial security practices through cryptography

1.2 Literature Review

RSA is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography . Digital Signature Algorithm (DSA) which provides digital signature

(2)

786 | P a g e capability for the authentication of messages. Elliptic Curve Cryptography (ECC) is a Public Key Cryptography(PKC) algorithm is based upon elliptic curves and which is used to be designed for devices with limited computation power and/or memory, such as smartcards and PDAs.

1.3 Parametrical model for Digital signatures

Security means the protection of the information from any sort of unauthorised access or manipulation through eavesdropping or guessing, mathematical or probabilistic algorithms, ciphers and other methods. Platform is using Python and online based .The implementation based on python programming saves time and space and be used for prototyping compared to programming in C, C++ and others. Domain challenges includes security and cryptography. The main concerns of cryptography include Confidentiality, Integrity and Availability.

The main characteristic requirements are its reliability & timeliness and the technologies are mainly to implement parametrical model. The algorithm is to be designed to secure the digital signatures are mainly for the implementation of mathematical / probabilistic algorithms

II. RESEARCH METHODOLOGY

To design and development of an algorithm for implementing Security measures using Python programming language with online based. The algorithm is to be designed for Efficient Calculations and Analysis. Python Cryptography Toolkit is a collection of number of different algorithms such as Encryption algorithms, Hash algorithms and Public key algorithms. Python code is to be trivial to replace one algorithm with another which modules that implement a particular class of algorithm share identical interfaces, and variables parameterizing the module's characteristics are available to help in programming portably.

2.1 Selection of Digital Signatures

The best digital signature systems can perform the following functions and prove themselves to be useful to Verify recipients outside of an organization , to enable employees to sign documents while travelling, cross platform capabilities and enable the use of numerous applications.

2.2 Working of Cryptography algorithm

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.

While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication (breaching security measures). Cryptanalysts are also called attackers.

Cryptology embraces both cryptography and cryptanalysis. A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process. This mathematical function works in combination with a key a very large number and to encrypt the plaintext (the original message).

Data that can be read and understood without any special measures is called plaintext or clear text. Data which requires some special function to be performed on it before it can be read and understood, is called cipher text.

The same plaintext, encrypted by using different keys, will result in different cipher text. The security of encrypted data is entirely dependent

(3)

787 | P a g e on two things: the strength of the cryptographic algorithm and the

secrecy of the key. A cryptographic algorithm, plus all possible keys and all the protocols that make it work comprise a cryptosystem.

Encryption is used to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting cipher text to its original plaintext is called decryption.

III. CONCLUSION

The conclusion comes out that the digital signatures reduce time as well as efforts by increasing the security.

Just as signatures facilitate validation and verification of the authenticity of paper documents, digital signatures serve the purpose of validation and authentication of electronic documents.

The limitations are that restricting research area to encryption technology only based on cost and service and comparing symmetric Algorithms and Cryptography algorithms and finding results are time consuming.

The main scope of this research are enhances Network Security and cryptography ensures Data Integrity &

Authentication.

REFERENCES

Journal Papers:

[1] International Journal of Computer Science and Information Technology Research (IJCSITR) Vol. 1, Issue 1, pp: (51-57), Month: October-December 2013

Books:

[2] M. Bishop, Introduction to Computer Security. Reading, MA:Addison-Wesley, 2005.

[3] Ecommerce - Legal Issues authored by Rohas Nagpal, conducted by Asian School of Cyber Laws [4] W. Stallings, Cryptography and Network Security, 3rd ed. Englewood Cliffs, NJ: Prentice-Hall, 2002.

[5] Anderson, R., Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, ISBN 0470068523, John Wiley & Sons, New York, NY, 2008

[6] Enhancing the reliability of digital signatures as non-repudiation evidence under a holistic threat model Author: Jorge L´opez Hern´andez-Ardieta Supervisor: Prof. Dr. Ana Isabel Gonz´alez-Tablas Ferreres COMPUTER SCIENCE

Proceedings Papers:

[7] Proceedings of the International Conference on Software Engineering and Intelligent Systems 2010, July 5th-9th, Ota, Nigeria SEIS 2010. Vol 1.

Referensi

Dokumen terkait

Formulating this model is necessary to determine the required response time of active firewall. Upon completing the detection process, agent-based security module send the

Keywords: digital services; Finland; home-dwelling; life-based design; memory disorder; sense of security Introduction A key goal in Finnish social and health policy is to promote

and Zhao H, ―Data Security and Privacy protection Issues in Cloud Computing‖, In Proceedings of the International Conference on Computer Science and Electronics Engineering,

Figure 2: Basic Geometry and Boundary Conditions 75% of the tool is fixed 2A: tool geometry with selected tool signatures as per design 2B: Thrust and cutting load implementation on

ix DESIGN AND BUILD SAFE SECURITY USING A COMBINATION OF PASSWORD AND FINGERPRINT BASED ON ARDUINO UNO Name of Student : Friska Yoseva Tamba Register Number : 3103181153

This study aims to assess biometric authentication under different conditions, identify facial and fingerprint security levels, and evaluate the architectural security and spoofability

FOUNDATION OF COOPERATIVE SECURITY Creation of Symbiotic Community Cooperative Security Human security Food security Energy security Creation of economic block Creation of

Comparison with Taiwan The analysis of theory of planned behavior to determine informal workers’ intention to join the social security using SEM-PLS, shows that attitude towards