Visible to the public Observations on the Theory of Digital Signatures and Cryptographic Hash Functions

TitleObservations on the Theory of Digital Signatures and Cryptographic Hash Functions
Publication TypeConference Paper
Year of Publication2022
AuthorsBodapati, Nagaeswari, Pooja, N., Varshini, E. Amrutha, Jyothi, R. Naga Sravana
Conference Name2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT)
Keywordsauthentication, Computers, Cryptographic Hash Function, digital signature, digital signatures, Elliptic curve cryptography, Forgery, Hash-based, integrity, malicious, non-repudiation, pubcrawl, Reliable, resilience, Resiliency, Scalability
AbstractAs the demand for effective information protection grows, security has become the primary concern in protecting such data from attackers. Cryptography is one of the methods for safeguarding such information. It is a method of storing and distributing data in a specific format that can only be read and processed by the intended recipient. It offers a variety of security services like integrity, authentication, confidentiality and non-repudiation, Malicious. Confidentiality service is required for preventing disclosure of information to unauthorized parties. In this paper, there are no ideal hash functions that dwell in digital signature concepts is proved.
DOI10.1109/ICSSIT53264.2022.9716495
Citation Keybodapati_observations_2022