scholarly journals Implementation of Digital Signature Using Hybrid Cryptosystem

2018 ◽  
Vol 7 (3.4) ◽  
pp. 34
Author(s):  
Leela K ◽  
Smitha Vinod

Security is a major concern when it comes to electronic data transfer. Digital signature uses hash function and asymmetric algorithms to uniquely identify the sender of the data and it also ensures integrity of the data transferred. Hybrid encryption uses both symmetric and asymmetric cryptography to enhance the security of the data. Digital Signature is used to identify the owner of the document but it does not hide the information while transferring the document. Anyone can read the message. To avoid this, data sent along with the signature should be secured. In this paper, Digital signature is combined with hybrid encryption to enhance the security level. Security of the data or the document sent is achieved by using hybrid encryption technique along with digital signature. 

2018 ◽  
Author(s):  
Junaidy Budi Sanger

Information exchange in a network could lead into some problems, such as privacy problem, authentication problem, data integrity problem, and non-repudiation problem. Thus, precise security acts are needed to solve those problems. Digital signature is a solution to solve those problems. Digital signature is basically just like a written signature, which is used to authenticate documents. The difference is that the written signature usually describes the name of a signer whereas the digital signature consists of cryptography codes of a message and a sender. Digital signature using hash function is one of the most used digital signatures. Unfortunately, this kind of digital signature can not solve all given problems, such as privacy problem and non repudiation problem. Therefore, RSA algorithm is needed to solve that problem. The result of this research is the implementation of digital signature along with RSA algorithm and MD5 hash function in a data transfer application.


2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


2021 ◽  
Vol 119 ◽  
pp. 07004
Author(s):  
Adil El Mane ◽  
Younes Chihab ◽  
Redouan Korchiyne

This report represents my researching work for a six-month internship in Lex Persona Enterprise. "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research. This project brings together many applications related to compliance with well-specified programming constraints to sign files electronically. The research has the goal of signing PDF documents digitally using the hash-and-sign method. The SHA-256 function as the hash function and RSA as encryption algorithm, accompanied with PKI certificates type X.509. The link between the applications and the certificates is the cryptographic API PKCS #11. This humbled work got dedicated to smartphones and computers. The use of WebView in all applications provides a taste of consistency. This article presents several processes carried out to accomplish this work.


2020 ◽  
Vol 4 (2) ◽  
pp. 108-114
Author(s):  
Sabina B. Gesell ◽  
Jacqueline R. Halladay ◽  
Laurie H. Mettam ◽  
Mysha E. Sissine ◽  
B. Lynette Staplefoote-Boynton ◽  
...  

AbstractBackground:Research Electronic Data Capture (REDCap) is a secure, web-based electronic data capture application for building and managing surveys and databases. It can also be used for study management, data transfer, and data export into a variety of statistical programs. REDcap was developed and supported by the National Center for Advancing Translational Sciences Program and is used in over 3700 institutions worldwide. It can also be used to track and measure stakeholder engagement, an integral element of research funded by the Patient-Centered Outcomes Research Institute (PCORI). Continuously and accurately tracking and reporting on stakeholder engagement activities throughout the life of a PCORI-funded trial can be challenging, particularly in complex trials with multiple types of engagement.Methods:In this paper, we show our approach for collecting and capturing stakeholder engagement activities using a shareable REDCap tool in one of the PCORI’s first large pragmatic clinical trials (the Comprehensive Post-Acute Stroke Services) to inform other investigators planning cluster-randomized pragmatic trials. Benefits and challenges are highlighted for researchers seeking to consistently monitor and measure stakeholder engagement.Conclusions:We describe how REDCap can provide a time-saving approach to capturing how stakeholders engage in a PCORI-funded study and reporting how stakeholders influenced the study in progress reports back to PCORI.


2018 ◽  
Vol 10 (3) ◽  
pp. 42-60 ◽  
Author(s):  
Sahar A. El-Rahman ◽  
Daniyah Aldawsari ◽  
Mona Aldosari ◽  
Omaimah Alrashed ◽  
Ghadeer Alsubaie

IoT (Internet of Things) is regarded as a diversified science and utilization with uncommon risks and opportunities of business. So, in this article, a digital signature mobile application (SignOn) is presented where, it provides a cloud based digital signature with a high security to sustain with the growth of IoT and the speed of the life. Different algorithms were utilized to accomplish the integrity of the documents, authenticate users with their unique signatures, and encrypt their documents in order to provide the best adopted solution for cloud-based signature in the field of IoT. Where, ECDSA (Elliptic Curve Digital Signature Algorithm) is utilized to ensure the message source, Hash function (SHA-512) is used to detect all information variations, and AES (Advanced Encryption Standard) is utilized for more security. SignOn is considered as a legal obligated way of signing contracts and documents, keeping the data in electronic form in a secure cloud environment and shortens the duration of the signing process. Whereas, it allows the user to sign electronic documents and then, the verifier can validate the produced signature.


Sign in / Sign up

Export Citation Format

Share Document