Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of Digital Signatures

Category: Computer Sciences Paper Type: Report Writing Reference: IEEE Words: 1400

Digital Signature is a guaranteed process of converting or transferring message from one side to another without any interruption. Using a private or public key pair, of the content of the message that you add a one-way hash, is signed by you and the server digitally. The signature that only the server’s key can decrypt that can be read by your client anytime. It works with an efficient and a proper procedure of coding, considering the file and then make it possible to be done properly is with the languages and codes makes it work properly so that the client can read a signature digitally.

In order to prove that the document is accurate or not or it is specifically a Geneon document, without any alteration. In legal matters this thing is very much important to be considered carefully that all the documents should be original and legal. The digital signature is actually that saved version of the thing that has to be done legally with the perspective of doing it electronically. Digital signature processing actually depends on the language and the hash code that makes it runs properly. [1]

Requirements of Digital signatures

Digital signatures are the electronic fingerprints that ensure safety and authenticity. It acts as a coded message which ensures transaction of a message from one to another. A standard and accepted format is used by digital signatures, which is known as PKI. It stands for Public Key Infrastructure. PKI is widely accepted and ensures security [2].

Advantages and available hash functions used in digital signature

The working of digital signature is unique. Every hand written signature is different from another similarly every digital signature is different from another. DocuSign is the provider of Digital signature and it follows a protocol which is PKI. Mathematical algorithm is used to generate two long numbers known as keys. One key is private while other one is for public. When a document is signature electronically, this signature is generated by the use of private key of signer. This key is always kept private by the signer for security purpose [2]. Here, hash is created when the mathematical algorithm acts like cipher and matching signature is created. After creation of hash the data is encrypted. Time is also marked to signify that document is signed. In case of changing the document after signature, digital signature becomes invalid. PKI requires digital signature to be properly created, then conduct it and save it in a proper manner. This can sometimes require proper authentication from a reliable source such as Certificate Authority (CA).

What digital signatures do

Digital signatures can help to develop the authentication features; however, the digital signature is based on authenticity and there is integrity that helps making sure that the content is altered or not as it was a digitally signed. Through focus on the non-reputation:- The digital signatures help validating to all parties, the source of the signed content. Repudiation refers to take action of a signer denying any associate with the signed content. This helps to establish the originator of the file the true originator and not somebody else, separately from the state of the signer. A signer not able to repudiate the signature on that file without repudiating his key, so other documents signed with that key.

Why do we need a digital signature?

It is an electronic document which is issued by CA. It is specific for every signer and every recognized organization. CA is needed to ensure security and confirms that the public key belongs to an organization and is safe. CA guarantees the security of the document.

Digital signatures development

In the research practical is conducted for the purpose of providing evidence about the methods and used in the configurations of the certificates in the PKI enabled applications. In the practical research Microsoft Certificate services is also used for configurations of the digital signatures. 

Advantage and disadvantage of digital signature

There are some advantages and disadvantages of the digital signatures; as some big advantages include that message cannot be modified through using the digital signatures. The document or the memo cannot be encrypted, moreover, it can confirm the individuality of the sender therefore, and other person cannot copy it. It is analyzed that there is automatic date and period stamps on the digital signature. Digital Signatures also has some disadvantages as it can be utilized to produce the digital signature.

Digital signatures evaluation

The practical was conducted through the use of modern software and programs commonly used for configurations of the certificates in the private key infrastructure. Digital signatures used in the e-mails and websites are also a private key infrastructure (PKI). Practical also covered the configuration of the digital signature in a comprehensive way. There are several ways of evaluating the various types of certificates however the methodology used in the practical was the most appropriate and authentic in regards to accuracy and reliability of the results [3] 

Ethical Issues of Digital Signatures

Digital signature has some issues related to ethics and social values. While conducting research that legal and ethical values are taken into considerations to avoid illegal and un-ethical actions. The data collected in the research will not be shared without the permission of the participants. In the research only legally allowed and valid licensed certificates are used. Digital signatures used in the research are licensed legally by the authorities. In the whole research social values and security related issues are also given importance. While research is also based on the BCS terms and regulations. 

Algorithm of digital signature

For the algorithm of digital signature can be explained as the “mathematical concept of modular exponentiations”; it is a free algorithm that are made for the digital signature under some hash functions. These digital signatures are cryptographic hash and made under some algorithms MD5 and SHA1 encrypt. These are some algorithms that are utilized to transit the data. The digital signatures are made under protection measures known as the RSA encryption; it is the authentication system that also has some mathematical function based on the public and private keys:

RSA example of Digital Signatures


SSL certifications of Digital Signatures

SSL certifications of the digital pen are under some internet communications protocols. RSA system could be explained as the hybrid cryptosystems; there are some symmetric algorithms that are considered under the internet communications protocols example, S/WAN, S/MIME and SSL are some symmetric algorithms.

Design of a secure PKI

PKI technology is most demanding as it also has proper mathematical algorithm; it is based on the encrypted data; which follows the PKI requirements for safe digital signing. For the safety in the digital signature PKI technology is concerned; as PKI based digital signatures are safe.

Conclusion on Digital Signatures

The research was conducted to get the practical knowledge about the private key configurations and the certificates of the configurations of digital signatures. Through the research I learnt a new knowledge that increase my previous knowledge about the private key infrastructures (PKI) and the software used for configurations.      

Recommendations for Further Improvements

The product can be improved through following these recommendations:

·         The product should be improved through providing solutions to the problems raised in the project while conducting the practical, as limited information about the software was problems that need attention for removal.  

 Appendix of Digital Signatures

 

 References of Digital Signatures

[1]

W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 2006.

[2]

Dartmouth.edu, "Applications Enabled by PKI," 2018. [Online]. Available: http://www.dartmouth.edu/~deploypki/materials/modules/applications/appsmenu.htm. [Accessed 11 11 2018].

[3]

Docusign.com, "Understanding digital signatures," 2008. [Online]. Available: https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq.

[4]

J. P. Davidson, Project Management, Breathing Space Institute, 2000, p. 182.

[5]

Acrobat.adobe.com, "What are digital signatures?," 2018. [Online]. Available: https://acrobat.adobe.com/us/en/sign/capabilities/digital-signatures-faq.html.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed

University Coursework Help

ONLINE

University Coursework Help

1722 Orders Completed

Supreme Essay Writer

ONLINE

Supreme Essay Writer

1890 Orders Completed