Survey on Techniques Developed using Digital Signature: Public key Cryptography
Author(s) -
Shivendra Singh,
Mr.Y.Mohamed Iqbal,
Arunima Jaiswal
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/20635-3272
Subject(s) - computer science , key (lock) , digital signature , public key cryptography , signature (topology) , cryptography , computer security , encryption , mathematics , hash function , geometry
The digital signature technique is essential for secure transactions over open networks. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the originator's identity. Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. This architecture is related with secure Hash Function and cryptographic algorithm In this paper we are going to make review about all those technique that are developed within last 5-10 years. And which are developed with the help of digital signature and based on public key cryptography. These techniques provides a better platform for security of data using cryptography. General Terms Safety, Key, Hiding, Symmetric, Signature, Stream, Block, Security, Algorithms.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom