Implementation of Digital Signature Using Hybrid Cryptosystem

  • Authors

    • Leela K
    • Smitha Vinod
    2018-06-25
    https://doi.org/10.14419/ijet.v7i3.4.14671
  • AES, Digital Signature, Hybrid encryption, RSA, Sha-256.
  • Security is a major concern when it comes to electronic data transfer. Digital signature uses hash function and asymmetric algorithms to uniquely identify the sender of the data and it also ensures integrity of the data transferred. Hybrid encryption uses both symmetric and asymmetric cryptography to enhance the security of the data. Digital Signature is used to identify the owner of the document but it does not hide the information while transferring the document. Anyone can read the message. To avoid this, data sent along with the signature should be secured. In this paper, Digital signature is combined with hybrid encryption to enhance the security level. Security of the data or the document sent is achieved by using hybrid encryption technique along with digital signature.

     

  • References

    1. [1] R. Dhagat and P. Joshi, "New approach of user authentication using digital signature," in Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1-3.

      [2] N. R. Dodda and K. R. Kumari, “Enhanced Security For Hybrid Encryption Strategies With Key Reausabilityâ€, IJSRST, vol. 3, no. 6, pp. 345–350, 2017.

      [3] M. Enriquez, D. W. Garcia, and E. Arboleda, “Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystemsâ€, Indian journal of science and technology, vol. 10, no. 27, July 2017.

      [4] G. Hanaoka, J. Shikata, Y. Zheng, and H. Imai, “Efficient Unconditionally Secure Digital Signatures,†IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E87–A, no. 1, pp. 120–130, January 2004.

      [5] K. Kaur and E. Seema, “Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devicesâ€, International Journal of Engineering Research and Applications, vol. 2, no. 5, pp. 914–917, September - October 2012.

      [6] M. Kaur, “Enhanced Security using Hybrid Encryptionâ€, International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no. 7, pp. 13001–13007, July 2016.

      [7] P. Khurana and P. Bindal, “Study and Comparative Analysis of Different Hash Algorithmâ€, Journal of Engineering Computers & Applied Sciences, vol. 3, no. 9, pp. 1-3, September 2014

      [8] V. V. Kumari, D. V. NagaRaju and K. Soumya “Secure Group Key Distribution Using Hybrid Cryptosystemâ€, in Second International Conference on Machine Learning and Computing, Bangalore, 2010, pp. 188-192.

      [9] P. Mahajan and A. Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Securityâ€, Global Journal of Computer Science and Technology Network, Web & Security, vol. 13, no. 15, 2013.

      [10] A. Mashatan and K. Ouafi, “Forgery-resilience for digital signature schemes,†Asiaccs, pp. 24–25, 2012.

      [11] O. Y. Owolabi, P. B. Shola, and M. B. Jibrin, “Improved Data Security System Using Hybrid Cryptosystemâ€, International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 3, pp. 90–93, 2017.

      [12] V. R. Pallipamu, T. R. K, and S. V. P, “Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithmâ€, International Journal of Emerging Technology and Advanced Engineering, vol. 4, no. 6, pp. 609–613, June 2014.

      [13] P. K. Panda and S. Chattopadhyay, "A hybrid security algorithm for RSA cryptosystem," in 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, 2017, pp. 1-6.

      [14] M. Sadeghpour, “Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keysâ€, International journal of computer, vol. 4523, pp. 43–55.

      [15] J. Raigoza and K. Jituri, "Evaluating Performance of Symmetric Encryption Algorithms," in International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, 2016, pp. 1378-1379.

      [16] E. Salim and I. Harba, “Secure Data Encryption Through a Combination of AES, RSA and HMACâ€, Engineering, Technology & Applied Science Research vol. 7, no. 4, pp. 1781–1785, 2017.

      [17] S. Saxena, “A Novel Digital Signature Algorithm based on Biometric Hashâ€, I. J. Computer Network and Information Security, no. 1, pp. 12-19, 2017.

      [18] J. Thakur and N. Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis,†vol. 1, no. 2, pp. 6–12, 2011.

  • Downloads

  • How to Cite

    K, L., & Vinod, S. (2018). Implementation of Digital Signature Using Hybrid Cryptosystem. International Journal of Engineering & Technology, 7(3.4), 34-37. https://doi.org/10.14419/ijet.v7i3.4.14671