Concept
Discuss about the Digital Signatures For Communications Using Text-Independent.
In this article according to the researchers the digital signatures can be explained as the mathematical technique which is used for the process of the validating, authenticating the integrity of a message or any digital document (Collins et al. 2014). This is one of the most common and advanced technology that is used around the world for the purpose of encrypting file and securing it in the same. Digital signatures (DS) are the vital cryptographic aboriginal, which are been regularly used in e-commerce and other technical matters to ensure both the integrity and the origin of a communication The concept of the digital signatures came first in the year of the 1976 by Whitfield Diffie and Martin Hellman but the major concept was only theorised and not any practical value was provided at the time. Later in the late 2000s many of the major changes came into existence about the theory, and by the late 2008 the PDF file format turn out to be an open standard to the International Organization for Standardization (ISO) as ISO 32000 which included the digital signatures as integral part of format. Fortunately, QDS or the quantum digital signature provides some of ways of authenticating conventional communications with information-theoretic safekeeping contrary to forging and repudiation (de Freitas Neto et al. 2018). This reports describes about the basic concept of the digital signatures, the working of the same, the global importance of the concept and the different methodologies.
The article provides the best options for the ways of the securing processes that are used in the world of the internet and ecommerce. The digital signatures is one of the most complicated encryption method that is used for the purpose of securing any file. It has some of the most secured type of the encryption processes.
The working principal of the digital signatures are very much easy to use. The digital signatures works on the basics of the public key cryptography which is also known as the asymmetrical cryptography. IT uses the algorithms like the RSA. In order to create a digital signature the main requirement are the signing software and the reading software. Once on sign using the signing software, a hash key of the signature is generated (Dunjko, Wallden and Andersson. 2014). The encrypted hash along with the electronic data is known as the digital signature. If any of the changes are made in the signature it results to a different hash function. In order to decrypt the file, the same signature is to be made and once the authentication is done and the new hash value is same as the old one the file is decrypted.
Authentication
The digital application can be divided into three categories: namely the Authentication stage, the integrity stage and the non-repudiation stage.
It may happen that sometimes the right message is not sent to someone it is meant for, in this the digital signature helps in the process of authenticating the user. Authentication can be called as the process which is used for the purpose of verifying any information. IT can also be3 used for checking the origination of the document (Wang et al. 2015). It can help in the process of checking the identity of the sender, the date and time of the signature and the identity of the device that is used for the purpose of signature. All the information’s are stored in the private key of the user.
The digital signatures helps in the maintaining the integrity of the of the message tht one tries to send. That is, the value of the message that is sent is safe. The hash value of every signature that is done and are unique and if there is any minimal change in the sign or the message that is sent the entire hash value and the keys gets changed. Hence keeping the value of the message safe (Lo et al. 2014). Also any change in the document after it is signed becomes invalid. The digital signatures some of the best methods to keep the data integrity. There are certain algorithms that helps in changing the message without the consent of the user. Data integrity helps in the protection against such incidents. There is no possible way to change even a single word once the document is digitally signed.
It can be explained as the property which means that one who has signed the signature once cannot refuse the consent of signing it. It is one of the major aspects of the digital signatures, which protects the digital signatures from being misused. The person signing the document cannot refuse the property of the same.
The authors does some of the best tries that can be made for the purpose of destroying the digital signatures in order to get the maximum of the signatures and break the algorithm. These suggestions for significant digital signatures are the elementary structural blocks which only deal with the problematic of sending messages while no-forging and non-repudiation are guaranteed(Alam et al. 2015). Some of attacks that are used for the purpose of breaching the digital signatures in the paper are the c proposal attack. There are three tests done in the forgery1, forgery2, forgery3. This tests proves that the essentiality of the tests done for the purpose of the braking the digital signature.
Integrity
Some of the major uses of the digital signatures comes in the world of the commence. Other than the ecommerce now days all the email services uses the technique of the digital signatures for the process of securing the messages (Donaldson et al. 2016). The digital signatures can be used in all the leading fields in the world which includes the architecture, medical uses other than the use in the technical felids. One of the other major use is in the field is of the financial services. Digital signatures finding some of the best uses in the field of the cloud computing and data security. The best frequently used encryption standard is the AES or the Advanced Encryption Standard which is a Symmetric key encryption system. In this process, the same key can be used by the sender in order to encrypt the document and by the receiver to decrypt the encrypted document to obtain the original document (Hofheinz et al. 2016). Advanced Encryption Standard encryption system is a block cipher algorithm which can operates on 128- bit data blocks which supporting three different cipher key lengths of 128, 192 and 256 bits.
Conclusions:
Thus, concluding the topic it can be said that Digital signatures have huge scopes in the future of data security. Further, it can be said that in the recent future the algorithms can be made so strong that there would not be any possible way to break the digital signatures of the keys to alter such algorithms. In order to bring out the maximum of digital certificates one must always follow the rules of the making and securing the digital signatures. In this case the attempts that aware made to break the signatures came out be failures and code would not be done without possibly changing the original certificate. Hence, the author proposed that the digital signatures is one of the best way to secure any file.
References
Alam, S., Jamil, A., Saldhi, A. and Ahmad, M., 2015, March. Digital image authentication and encryption using digital signature. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in(pp. 332-336). IEEE.
Bansal, P.K., Begeja, L., Creswell, C.W., Farah, J., Stern, B.J. and Wilpon, J., AT&T Intellectual Property II LP, 2014. Digital signatures for communications using text-independent speaker verification. U.S. Patent 8,751,233.
Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., Jeffers, J. and Buller, G.S., 2014. Realization of quantum digital signatures without the requirement of quantum memory. Physical review letters, 113(4), p.040502.
de Freitas Neto, N., Freitas, M.A.N., Dantas, M.D.C.R. and de Medeiros Valentim, R.A., 2018. Digital Signatures Schemes: An Integrative Literature Review of Asymmetric Cryptography Usage as a Technical Method for Authenticity and Nonrepudiation on Remote Medical Reports for PACS. Anais do Encontro de Computação do Oeste Potiguar ECOP/UFERSA (ISSN 2526-7574), 2(1).
Donaldson, R.J., Collins, R.J., Kleczkowska, K., Amiri, R., Wallden, P., Dunjko, V., Jeffers, J., Andersson, E. and Buller, G.S., 2016. Experimental demonstration of kilometer-range quantum digital signatures. Physical Review A, 93(1), p.012329.
Dunjko, V., Wallden, P. and Andersson, E., 2014. Quantum digital signatures without quantum memory. Physical review letters, 112(4), p.040502.
Hofheinz, D. and Jager, T., 2016. Tightly secure signatures and public-key encryption. Designs, Codes and Cryptography, 80(1), pp.29-61.
Lo, H.K., Curty, M. and Tamaki, K., 2014. Secure quantum key distribution. Nature Photonics, 8(8), p.595.
Wang, T.Y., Cai, X.Q., Ren, Y.L. and Zhang, R.L., 2015. Security of quantum digital signatures for classical messages. Scientific reports, 5, p.9231.