Loading

Secure Digital Signature Schemes Based on Hash Functions
Erfaneh Noroozi1, Salwani Mohd Daud2, Ali Sabouhi3

1Erfaneh Noroozi, PhD, Candidate Advanced Informatics School AIS, University Teknologi Malaysia, Kuala Lumpur Malaysia.
2Salwani Bt Mohd Daud, Lecture, Advanced Informatics School AIS, University Teknologi Malaysia, Kuala Lumpur Malaysia.
3Ali Sabouhi, Department of Computer Science, Kuala Lumpur Malaysia.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 321-325 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0583032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. The proposed algorithm introduces a novel technique for producing small-sized output of digital signature as a result; the new scheme is potentially practical: signing and verifying signatures are reasonably fast, and both speed and time are improved.
Keywords: Digital Signature, Hashed Message Algorithm, Public Key.

Scope of the Article: Digital Signal Processing Theory